Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:So stupid it's got to be official. (Score 4, Informative) 106

I know it's bad form to RTFA, but here's the part where they talk about their current inability to properly decrypt the payload:

The malware uses that configuration to generate a key to unlock the payload and unleash it. Once it finds the configuration itâ(TM)s looking for, it uses that configuration data to perform 10,000 iterations of MD5 to generate a 128-bit RC4 key, which is then used to decrypt the payload. âoeUnless you meet these specific requirements, youâ(TM)re not going to generate the right key to decrypt it,â Schoewenberg says.

Comment Not quite true (Score 3, Informative) 245

What actually happened was that the State Department purchased some anti-Al-Qaeda ads to run when certain key terms were also on the screen, similar to how AdWords works. It's a pretty interesting concept, really - the necessity of displaying advertising on a site can open the door for alternative messages/realities to reach the viewer.

Comment Nice discussion... (Score 1) 338

What I used to love about slashdot was the discussions that would result from articles and questions. But now everyone just jumps down the submitter's throat (though part of that is deserved in this case, especially coming from a brand-new account) if the question isn't phrased properly. Yes, censorship is bad, clandestine monitoring is bad, we should all trust each other, etc. but we all know that isn't the case. Only by offering solutions can we help improve our collective level of problem-solving. For example, I'm already thinking about several ways around this: is there any way to stop a user from using a VPN (or use your monitoring solution to impersonate one), and how are you going to deal with SSL traffic?

Comment Simple solution (Score 1) 78

Yes, it's too simple to actually work, but after data breaches like this, Epsilon should be required to publish all the data that was compromised. It devalues the data held by the malicious entity (a deterrent against future attacks), and allows security personnel to more accurately gauge the risk and present additional strategies for mitigation. Any action that reduces the value of these databases is a step in the right direction.

Comment Re:Open Office Gave Up "Anonymous" Alex Tapanaris (Score 1) 263

I don't think it's a matter of being "well-intentioned" software. One nice feature to add to publishing software would be a "redact metadata" option for publishers. Also, the type of metadata in this case is laughably easy to spoof and cannot be relied upon - why wouldn't I register my desktop publishing software with the name of an enemy?
Data Storage

Building a Searchable Literature Archive With Keywords? 211

Sooner Boomer writes "I'm trying to help drag a professor I work with into the 20th century. Although he is involved in cutting-edge research (nanotechnology), his method of literature search is to begin with digging through the hundreds of 3-ring binders that contain articles (usually from PDFs) that he has printed out. Even though the binders are labeled, the articles can only go under one 'heading' and there's no way to do a keyword search on subject, methods, materials, etc. Yeah, google is pretty good for finding stuff, as are other on-line literature services, but they only work for articles that are already on-line. His literature also includes articles copied from books, professional correspondence, and other sources. Is there a FOSS database or archive method (preferably with a web interface) where he could archive the PDFs and scanned documents and be able to search by keywords? It would also be nice to categorize them under multiple subject headings if possible. I know this has been covered ad nauseum with things like photos and the like, but I'm not looking at storage as such: instead I'm trying to find what's stored."
Portables

2nd Generation "$100 Laptop" Will Be an E-Book Reader 286

waderoush writes "At a conference sponsored by the One Laptop Per Child Foundation this morning, OLPC founder unveiled the design for the foundation's second-generation laptop. It's actually not a laptop at all — it's a dual-screen e-book reader (we've got pictures). Negroponte said the foundation hopes that the cost of the new device, which is scheduled for production by 2010, can be kept to $75, in part by using low-cost displays manufactured for portable DVD players."

Comment Tinfoil hat time (Score 1) 332

So Comcast offers ultra-fast speeds at a ridiculous price. Rich p2p pirates purchase this service, get tracked, and get sued.

This could also lead to "harder" GB caps at lower tiers, encouraging users to bump up to a more expensive service.

While I think better last-mile speeds are important, I can't see many "residential" customers willing to pay $100 more per month for increased bandwidth - if you really need that much, you probably already have a business account. There just aren't existing net applications which gain significant performance advantages at these speeds (though I'm sure they're coming).
Government

Best Super Tuesday Candidate for Technology? 549

Petey_Alchemist writes "With Super Tuesday coming up and the political field somewhat winnowed down, the process of picking the nominees for the next American President is well underway. At the same time, the Internet is bustling through a period of legal questions like Copyright infringement, net neutrality, wireless spectrum, content filtering, broadband deployment. All of these are just a few of the host of issues that the next President will be pressured to weigh in on during his or her tenure. Who do you think would be the best (or worst) candidate on Internet issues?"
The Internet

Is Copy Protection Needed or Futile? 392

Hugh Pickens writes "Columnist Saul Hansell is hosting a debate about copyright issues and technology on his blog at the New York Times . On one side Rick Cotton, the general counsel of NBC Universal, says that anyone who is intellectually honest must 'acknowledge, confront and speak to the tidal wave of unlawful, wholesale reproduction and distribution of copyrighted content that is currently occurring in the digital world' and that we should be 'identify workable, flexible and effective approaches that reduce piracy without being intrusive and that fully respect other interests such as privacy and fair use.' Tim Wu, a professor at Columbia Law School, responds that 'locks will be broken, and so a business model that depends on locking is very vulnerable' adding that locks may form a part of certain successful business models but 'too much reliance on locking can seriously backfire.' Wu and Cotton will respond to each other and to comments by readers today." As for the man on the street, Panaqqa wrote us with word that the Question Copyright site has posted an interesting video of ordinary people explaining why they think copyright exists. It's pretty clear that most people don't understand it at all.
The Internet

Startup Building Floating Data Centers 256

1sockchuck writes "A Bay Area startup is planning to build data centers on cargo container ships, which would be docked at piers in major Internet markets. The company, known as IDS (International Data Security) says it plans to use biodiesel to power its generators and use heat from equipment to manage temperature on board the ships, reducing their reliance on grid power. IDS is telling prospects that it hopes to eventually have more than 20 floating data centers docked at ports around the U.S."
Media

Three MythTV Linux Distros Compared 176

An anonymous reader writes "Linux.com has a comparison article up looking at three MythTV-focused Linux distributions. The piece looks at Mythdora, Mythbuntu, and KnoppMyth, with an eye towards ease of installation and the actual utility of the install. From the article: 'For regular system maintenance, KnoppMyth simply isn't in the same ballpark as MythBuntu and MythDora. The live CD heritage of Knoppix means you cannot update individual packages, which is fine if you like that, but for an always-on system like a MythTV back end, I'd prefer flexibility and configurability of a mainline distro. When all is said and done, if I were building my TiVo replacement today, I would do it with MythDora. MythBuntu shows a lot of promise, and I will give the final 7.10 release another look (in part because I run Ubuntu on my desktop machines), but it isn't ready yet.'" Linux.com and Slashdot are both owned by SourceForge.

Slashdot Top Deals

The Wright Bothers weren't the first to fly. They were just the first not to crash.

Working...