Forgot your password?
typodupeerror

Comment This is an exploit for virtual servers (Score 5, Informative) 393

As many have pointed out, there's no real point to "exploiting" a machine that you already have full (root) access to - with one exception: virtual servers.

The whole 'danger' of this exploit is that it enables a virtual server's "privileged" "root" user to gain hypervisor access, which is equivalent to taking over the entire physical machine and any/all other virtual servers hosted on said machine.

If you don't run a virtual server farm, this exploit means absolutely nothing to you. If you do, it's a very easy, scary way whereby any of your "clients" can take over your physical machines and access all of the other virtual servers hosted on the same piece of hardware.

Comment Re:many are back but see dates of last update (Score 4, Interesting) 505

I think you are right, because I checked again, and only 10 or so domains currently are owned by the State of Kentucky. Yesterday, the number was much higher - over half - and it wasn't a matter of registrar compliance (I don't think the individual registrars had a say in the matter), ICANN was the one who handed control of the domains to the State.

Government

Submission + - State of Kentucky steals 141 domain names

ashmodai9 writes: "In a rather interesting (read: insane) decision, a district judge in the State of Kentucky has awarded control of 141 online gambling domain names to the governor of the state. Most of these are hosted offshore, and very few are registered under US domain name registrars, let alone registrars in the State of Kentucky (are there any?). You can check out the press release here, and confirm that the Commonwealth of Kentucky does in fact now "own" these domain names by performing a WHOIS search on any of the domains listed here."

Slashdot Top Deals

There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence. -- Jeremy S. Anderson

Working...