Forgot your password?
typodupeerror
Security

Nmap 5.00 Released, With Many Improvements 73

iago-vL writes "The long-awaited Nmap Security Scanner version 5.00 was just released (download)! This marks the most important release since 1997, and is a huge step in Nmap's evolution from a simple port scanner to an all-around security and networking tool suite. Significant performance improvements were made, and dozens of scripts were added. For example, Nmap can now log into Windows and perform local checks (PDF), including Conficker detection. New tools included in 5.00 are Ncat, a modern reimplementation of Netcat (with IPv6, SSL, NAT traversal, port redirection, and more!), and Ndiff, for quickly comparing scan results. Other tools are in the works for future releases, but we're still waiting for them to add email and ftp clients so we can finally get off Emacs!"
The Military

Hitler's Stealth Fighter 582

DesScorp writes "Aviation Week reports on a television special from the National Geographic Channel on what may have been the world's first true stealth fighter, the Horten Ho 229, a wooden design that was to include a layer of carbon material sandwiched in the leading edge to defeat radar. Northrop Grumman, experts at stealth technology from their Tacit Blue and B-2 programs, have built a full-size replica of the airframe and tested it at their desert facilities where they determined that the design was indeed stealthy, and would have been practically invisible to Britain's Chain Home radar system of WWII."
Math

47th Mersenne Prime Confirmed 89

radiot88 writes to let us know that he heard a confirmation of the discovery of the 47th known Mersenne Prime on NPR's Science Friday (audio here). The new prime, 2^42,643,801 - 1, is actually smaller than the one discovered previously. It was "found by Odd Magnar Strindmo from Melhus, Norway. This prime is the second largest known prime number, a 'mere' 141,125 digits smaller than the Mersenne prime found last August. Odd is an IT professional whose computers have been working with GIMPS since 1996 testing over 1,400 candidates. This calculation took 29 days on a 3.0 GHz Intel Core2 processor. The prime was independently verified June 12th by Tony Reix of Bull SAS in Grenoble, France..."
Networking

How To Keep Rats From Eating My Cables? 1032

An anonymous reader writes "I am curious to know what vermin prevention/eradication methods are used in other locations. I am working at a dealership and we have an exterminator man who puts out glue traps and bait stations, but they still come and eat my cable. The latest was a couple of fiber runs — very expensive. I have threatened my boss with a cat for the server room (my office), going so far as to cruise the local Humane Society's website and eye-balling a nice Ragdoll-Siamese mix. Even if I do feel like dealing with a litter box, cat hair in the equipment and pouncings on my keyboards (and I'm not sure I do), that only covers the server room. We have multiple buildings on the campus which get locked up to prevent theft, but it isn't secure enough to keep out the critters and the latest chew spot was in the ceiling. Any ideas?"
Games

Violence in Games, Once Again, Not That Compelling 191

One of the great arguments of the digital age has been over the effects of video games on aggression — especially if you have ever heard the name Jack Thompson. A recent study suggest the counterpoint once again, that violent video games really don't have that much impact. "The authors performed six studies in total, but they were in broad agreement, so we'll only discuss the more compelling ones here. For the experimental portion, these involved playing an essentially identical game with different degrees of violent content. One group of participants was randomly assigned to play the game House of the Dead 3 on the different extremes of its gore settings, while a second was split between those who played the normal version of Half-Life 2, and a those who played a modified version that turned the adventure into an elaborate game of tag. In both cases, the primary influences on enjoyment were the sense of competence and satisfaction, along with the immersive nature of the game. Generally, females rated immersion as more important, while males went for competence (and consistently rated their own expertise very highly). Violence didn't register when it came to enjoyment, even for those with pre-existing violent tendencies."
Censorship

Afghan Student Gets 20 Years For Blasphemy 618

Invisible Pink Unicorn writes "Despite nationwide public support for his initial death sentence, a three-judge appeals court has reduced the sentence of Sayed Parwez Kambakhsh to 20 years in prison. Kambakhsh was charged with circulating an article on women's rights that he found online. From the article: 'Family members have said Kambakhsh was beaten and threatened with death until he signed a confession and that local journalists who expressed support for him were warned they would be arrested if they persisted.'"
Security

TSA Employee Caught With $200K Worth of Stolen Property 655

The plane moves me or I move the plane? writes "After years of people complaining about their luggage locks being broken in the name of the Transportation Security Administration, and after countless properly-stowed utilities and tools had been scrutinized from a paranoid point of view, an employee of the TSA (which is part of the Department of Homeland Security) has been captured with evidence of over $200,000 worth of stolen property he was selling on eBay. With the help of local police and the USPS, a search of his house found a great deal of property pilfered from the un-witnessed searches that occurred after luggage had been checked, where the rightful owner was not allowed. 'Among the items seized were 66 cameras, 31 laptop computers, 20 cell phones, 17 sets of electronic games, 13 pieces of jewelry, 12 GPS devices, 11 MP3 players, eight camera lenses, six video cameras and two DVD players, the affidavit said.'"
The Courts

Palin E-mail Hacker Indicted 846

doomsdaywire writes "A University of Tennessee student who is the son of a Memphis legislator has been indicted by a federal grand jury on charges of hacking Republican vice presidential candidate Sarah Palin's personal e-mail. [...] If convicted, [David C.] Kernell faces a maximum of five years in prison, a $250,000 fine and a three-year term of supervised release. A trial date has not been set."
Security

Report Says China Will Demand Source Code 305

An anonymous reader alerts us to a two-week-old story that hasn't gotten much traction in the press to date. A Japanese newspaper and the AP report that China plans to demand source code from hardware manufacturers, and ban the sale of products from companies that don't comply. China is calling this an "obligatory accreditation system for IT security products." The plan is to go into effect next May, according to sources. "Products expected to be subject to the system are those equipped with secret coding, such as [a] contactless smart card system developed by Sony Corp., digital copiers, and computer servers. The Chinese government said it needs the source code to prevent computer viruses taking advantage of software vulnerabilities and to shut out hackers. However, this explanation is unlikely to satisfy concerns that disclosed information might be handed from the Chinese government to Chinese companies. There also are fears that Chinese intelligence services could exploit such confidential information by making it easier to break codes used in... digital devices."
Software

Norwegian Standards Body Members Resign Over OOXML 208

tsa writes "Ars Technica reports that 13 of the 23 members from the technical committee of the Norwegian standards body, the organization that manages technical standards for the country, have resigned because of the way the OOXML standardization was handled. We've previously discussed Norway's protest and ISO's rejection of other appeals. From the article: 'The standardization process for Microsoft's office format has been plagued with controversy. Critics have challenged the validity of its ISO approval and allege that procedural irregularities and outright misconduct marred the voting process in national standards bodies around the world. Norway has faced particularly close scrutiny because the country reversed its vote against approval despite strong opposition to the format by a majority of the members who participated in the technical committee.'"
The Courts

Michael Robertson Sued Over Missing Linspire Cash 65

An anonymous reader writes "Blogger and ex-Linspire CEO Kevin Carmony reports that Michael Robertson has been sued by a Linspire shareholder to get to the bottom of what happened to Linspire's assets. One hundred shareholders have been left uninformed as to what happened to the company and its assets after Linspire was sold to Xandros a few months back."
Communications

Russian Google Competitor Embraces Open Source Messaging 127

rm writes "Internet search and mail provider Yandex, which many view to be Google's main competitor in Russia, has recently added an instant messaging capability to its mail notifier application Ya.Online. As it turns out, the IM service is based on the open XMPP protocol, with connectivity to all other public Jabber servers available from day one. MacOS X and GNU/Linux versions of the app were also released (complete with sources under the GPL) and are determined to be based on the Psi IM client. Yandex looks to be a firm believer in open-source, also running a mirror site for FOSS and actively promoting its branded version of Firefox. Here's hoping that its affair with XMPP will help eliminate ICQ's enormous foothold in Russia."
Security

The Inside Story On the San Francisco Network Hijacking 471

snydeq writes "A source with direct knowledge of San Francisco's IT infrastructure has tipped off Paul Venezia to the real story behind Terry Childs' lockout of San Francisco's network, providing a detailed account of the city's FiberWAN, interdepartmental politics, and Terry Childs himself. Childs pleaded not guilty to charges of tampering yesterday and is being held on $5 million bail. According to the source, Childs' purview was limited to the city's FiberWAN — a network he himself built and, believing no one competent enough to touch the network but himself, guarded religiously, sharing details with no one, including routing configuration and log-in information. Childs was so concerned about the network's security that he refused even to write router and switch configurations to flash. But what may prove difficult for the prosecution in its case against Childs is that his restricted access to the network was widely known and accepted among managers and the city's other network engineers. Venezia, who has been suspicious of the official story from the start, suspects that the Childs case may be that 'of an overprotective admin who believed he was protecting the network — and by extension, the city — from other administrators whom he considered inferior, and perhaps even dangerous.' Further evidence is that fact that the network, from what Venezia understands, has been running smoothly since Childs' arrest."

Comment Product placement ads are like new taxes (Score 1) 286

I had originally hoped product placement would replace the ~20 minutes of commercial breaks during an hour of network TV. But after a lengthly debate with a friend, I've come to realize that product placement is like a new tax; however unpalatable it may be, once they get the public to accept it and start seeing the additional money roll in, it's there for good.

Slashdot Top Deals

Thus mathematics may be defined as the subject in which we never know what we are talking about, nor whether what we are saying is true. -- Bertrand Russell

Working...