Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Security

CERT Releases Basic Fuzzing Framework 51

infoLaw passes along this excerpt from Threatpost: "Carnegie Mellon University's Computer Emergency Response Team has released a new fuzzing framework to help identify and eliminate security vulnerabilities from software products. The Basic Fuzzing Framework (BFF) is described as a simplified version of automated dumb fuzzing. It includes a Linux virtual machine that has been optimized for fuzz testing and a set of scripts to implement a software test."
Science

Submission + - Scientists Create Artificial Life (guardian.co.uk)

causality writes: "Craig Venter and his team have built the genome of a bacterium from scratch and incorporated it into a cell to make what they call the world's first synthetic life form. Scientists have created the world's first synthetic life form in a landmark experiment that paves the way for designer organisms that are built rather than evolved. The controversial feat, which has occupied 20 scientists for more than 10 years at an estimated cost of $40m, was described by one researcher as "a defining moment in biology". Craig Venter, the pioneering US geneticist behind the experiment, said the achievement heralds the dawn of a new era in which new life is made to benefit humanity, starting with bacteria that churn out biofuels, soak up carbon dioxide from the atmosphere and even manufacture vaccines. However critics, including some religious groups, condemned the work, with one organisation warning that artificial organisms could escape into the wild and cause environmental havoc or be turned into biological weapons. Others said Venter was playing God." A video is also available here and an alternate news source here. What could possibly go wrong?
Education

Submission + - The Evolution Of Linux (linnewbies.com) 3

kickar writes: "Ev-o-lu-tion — "A process in which something changes into a different and usually better form!" In April 1991, Linus Torvalds, then 21 years old, started working on some simple ideas for an operating system. He started with a task switcher in Intel 80386 assembly language and a terminal driver. Then, on 26 August 1991, Torvalds posted to comp.os.minix: read more>> P.S. The Website is Still UNDER CONSTRUCTION!!"
Government

Submission + - Hackers get serial numbers of new U.S. passports

schwit1 writes: Fox News has an AP story on a SF Hacker driving around and needing as little as 20 minutes to be successful in acquiring a passport number.

Zipping past Fisherman's Wharf, his scanner detected, then downloaded to his laptop, the unique serial numbers of two pedestrians' electronic U.S. passport cards embedded with radio frequency identification, or RFID, tags. Within an hour, he'd "skimmed" the identifiers of four more of the new, microchipped PASS cards from a distance of 20 feet.

Meanwhile, Homeland Security has been promoting broad use of RFID even though its own advisory committee on data integrity and privacy warned that radio-tagged IDs have the potential to allow "widespread surveillance of individuals" without their knowledge or consent.

In its 2006 draft report, the committee concluded that RFID "increases risks to personal privacy and security, with no commensurate benefit for performance or national security," and recommended that "RFID be disfavored for identifying and tracking human beings.
Security

Submission + - Now Hackers Can Steal Data via Electrical Outlet 1

Ponca City, We love you writes: "NetworkWorld reports that security consultants Andrea Barisani and Daniele Bianco are preparing to unveil their methodology at the Black Hat USA conference for stealing information typed on a computer keyboard using nothing more than the power outlet to which the computer is connected. When you type on a standard computer keyboard, electrical signals run through the cable to the PC. Those cables aren't shielded, so the signal leaks via the ground wire in the cable and into the ground wire on the computer's power supply. The attacker connects a probe to a nearby power socket, detects the ground leakage, and converts the signal back into alphanumeric characters. So far, the attack has proven successful using outlets up to about 15 meters away. The cost of the equipment to carry out the power-line attack could be as little as $500 and while the researchers admit their hacking tools are rudimentary, they believe they could be improved upon with a little time, effort and backing. "If our small research was able to accomplish acceptable results in a brief development time (approximately a week of work) and with cheap hardware," they say. "Consider what a dedicated team or government agency can accomplish with more expensive equipment and effort.""
The Almighty Buck

Our ATM Is Broken, Go To Jail 575

Actually, I do RTFA writes "This community recently discussed possible criminal prosecution for people who took advantage of faulty slot machine software. At the time, many here drew an analogy to a hypothetical ATM that dispensed too much money. Well, apparently, that too may result in criminal charges. Although they suspect that someone may have tampered with the ATM, they are considering charging anyone who got extra money from it." Here is an editorial musing on the morality of such unexpected windfalls.
Censorship

Submission + - NASA Contractors Censoring Saturn V Info 1

cybrpnk2 writes: Get ready to surrender your data sheets, study reports and blueprints of the Saturn V to stay in compliance with ITAR. Armed guards are reportedly enforcing a takedown and shredding of old Saturn V posters from KSC office walls that show rough internal layouts of the vehicle, and a website that is a source for various digitized blueprints has been put on notice it may well be next. No word yet if the assignment of a Karl Rove protege to oversee NASA has any connection...
Security

US Blocks Entry For German Black Hat Presenter 348

bushwhacker2000 alerts us to the dilemma of Thomas Dullien, a prominent security researcher who has been a fixture at the annual Black Hat security conference. Dullien was denied entry into the US on his way to this year's conference. Dullien, a German reverse-engineering expert known in hacker circles as "Halvar Flake," said he was blocked from entering the US on the technicality that he had (years ago) signed a contract with Black Hat as an individual, not as his company. Customs agents said he would need an H1-B visa to perform the contracted two days of training at Black Hat, and put him on the next plane back to Germany.
GNU is Not Unix

Microsoft Seeks Open Source Certification 220

eldavojohn writes "Microsoft is applying for OSI certification for its Shared Source Initiative. The move is described in a blog post by an MS OSS lab worker: 'Today, we reached another milestone with the decision to submit our open licenses to the OSI approval process, which, if the licenses are approved, should give the community additional confidence that the code we're sharing is truly Open Source. I believe that the same voices that have been calling for Microsoft products to better interoperate with open source products would voice their approval should the Open Source Initiative itself open up to more of the IT industry.' According to PC World, reaction from the community has been mostly positive."
Enlightenment

Submission + - Why terrorists do not 'make' terror in the US ? (womacknewspapers.com)

An anonymous reader writes: Researchers at Duke University and the University of North Carolina at Chapel Hill will then use the information to recommend policies for reducing the likelihood that the United States experiences the type of homegrown terrorism seen recently in Europe. The study do not point that the summer in some places of the US is FAR more humanitarian than the summer in the middle east. The article can be found HERE

Slashdot Top Deals

The longer the title, the less important the job.

Working...