Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission + - 4,300 Publicly Reachable Servers Are Posing a New DDoS Hazard To the Internet (arstechnica.com)

An anonymous reader writes: DDoS mitigation provider Netscout said on Wednesday that it has observed DDoS-for-hire services adopting a new amplification vector. The vector is the Datagram Transport Layer Security, or D/TLS, which (as its name suggests) is essentially the Transport Layer Security for UDP data packets. Just as TLS prevents eavesdropping, tampering, or forgery of TLS packets, D/TLS does the same for UDP data. DDoSes that abuse D/TLS allow attackers to amplify their attacks by a factor of 37. Previously, Netscout saw only advanced attackers using dedicated DDoS infrastructure abusing the vector. Now, so-called booter and stressor services—which use commodity equipment to provide for-hire attacks—have adopted the technique. The company has identified almost 4,300 publicly reachable D/LTS servers that are susceptible to the abuse.

The biggest D/TLS-based attacks Netscout has observed delivered about 45Gbps of traffic. The people responsible for the attack combined it with other amplification vectors to achieve a combined size of about 207Gbps. [...] The 4,300 abusable D/TLS servers are the result of misconfigurations or outdated software that causes an anti-spoofing mechanism to be disabled. While the mechanism is built in to the D/TLS specification, hardware including the Citrix Netscaller Application Delivery Controller didn’t always turn it on by default. Citrix has more recently encouraged customers to upgrade to a software version that uses anti-spoofing by default.

Besides posing a threat to devices on the Internet at large, abusable D/TLS servers also put organizations using them at risk. Attacks that bounce traffic off one of these machines can create full or partial interruption of mission-critical remote-access services inside the organization’s network. Attacks can also cause other service disruptions. Netscout’s Hummel and Dobbins said that the attacks can be challenging to mitigate because the size of the payload in a D/TLS request is too big to fit in a single UDP packet and is, therefore, split into an initial and non-initial packet stream.

Comment Regarding Flash (Score 2, Insightful) 1348

"the fragmentation of the Linux platform and the hurdles presented by..."alpha-quality" drivers for audio and video hardware made success elusive for the [Linux] Flash development team."

Okay, fair enough. But how does Adobe/Macromedia then explain the failure to deliver a decent plug-in on the two other major platforms, Mac OS X and Windows?

Comment Re:Maybe she can answer in hindsight (Score 5, Insightful) 651

In fairness, the fact that someone can crack a "your mum" joke in this discussion scares me a lot less than some of the other posts here that suggest "your life = your salary."

The truth is your life is worth more than your salary. For starters, even if you only wanted to focus on money, it's not just your salary that matters but your potential future salary. However this thinking is still severely flawed, humans do a lot of activities that aren't costed. They care for people, fall in love, contribute to the cultural and political life of society, write open source software, complete volunteer work and provide social engagement for others.

We should never underestimate the value of surviving, surviving is what humans do, everything else (including sex) is just a footnote.

Internet Explorer

Firefox Now Serious Threat to IE in Europe 384

Tookis writes "Mozilla's Firefox web browser has made dramatic gains on Microsoft's Internet Explorer throughout Europe in the past year with a marked upturn in FF use compared to IE over the past four months, according to French web monitoring service XiTiMonitor. A study of nearly 96,000 websites carried out during the week of July 2 to July 8 found that FF had 27.8% market share across Eastern and Western Europe, IE had 66.5%, with other browsers including Safari and Opera making up the remaining 5.7%. In some key European markets FF has already reached parity and is threatening to overtake IE as the market leading browser."
Google

Submission + - The darkside of Google taking over your ISP's emai

SlinkySausage writes: "Google is offering ISPs the opportunity to turn over their entire email system to Google, with all customer email hosted as Gmail accounts. This would allow Google to rapidly grow its userbase (it trails a distant third to Yahoo Mail with only 51million users compared to Yahoo's 250million and Hotmail's 228 million users.) There are some obvious benefits to end users — Google is offering ISPs mailboxes of up to 10GB per user. But APCMag.com has posted an interesting piece looking at the "dark side" of the deal, not least the fact that it simply reinforces the attachment people have to their ISP's email address, making it much harder to change ISPs if a better deal comes up. Question is: is a 10GB ISP mailbox for every ISP user a sufficient benefit to outweigh the numerous downsides?"
Power

Submission + - Harnessing High Altitude Wind Power

jakosc writes: The Economist this week has an interesting article about increasing the efficiency of wind-powered generators by turning them into Flying Wind Farms. These tethered generators would harness high speed jet stream winds above 15,000 ft and in theory could give outputs of 40MW per generator (pdf) The developer's website has more details of some of the safety, technological and economic issues.
Security

Submission + - What tech to backpack around the world with?

ryrw writes: I'm planning to spend a year backpacking around the world and the hardest question I have to answer is: What technology do I take with me? Aside from the obvious (digital camera, ipod, et. al.) what technological devices would you you take? Specifically, I wonder if I should bring my nice and shiny MacBook Pro. I can think of lots of uses for it (offloading pix, updating blog, email, etc.), but I'm worried it will be lost or stolen along the way. Does anyone have experience with travel while toting technology?
Businesses

Is Switching Jobs Too Often a Bad Thing? 208

Career Hot Potato asks: "I've been out of school for little more than a year and I have only good things to say about the job market. So far, there doesn't seem to be any lack of demand for a good .NET developer. I've got to admit, though, I feel a little disloyal at this point. Several great job offers have come my way and I've taken them. My resume is starting to make me look a bit restless and it worries me. Until now I've just chalked it up to 'I'm just settling in,' but now another opportunity has been dropped into my lap. Would I be digging my own grave by taking this job? It'd be my fourth job in 16 months but each offered a promotion and a 30% to 40% raise. I know better than to put a price on job satisfaction but I'm pretty certain I'd be happy there. Is being branded as a 'hot potato' enough to keep you from switching? What's your price on this stigma?"
Programming

Submission + - Introduction to Linden Scripting Language

prostoalex writes: "Dr. Dobb's Journal runs a lengthy introduction to Linden Scripting Language, the language behind avatars and their interaction in Second Life: "LSL is a scripting language that runs server-side, on a piece of software called the simulator. The simulator does just what it's name implies — it simulates the virtual world of Second Life. Each simulator runs everything for 16 acres of virtual land — buildings, physics, and of course, scripts. While you manipulate the script text in a form that is somewhat easy to read, the actual code that runs on the simulator is compiled. A compiler is a piece of software that takes the text version of the script and converts it into something that can actually run. In the case of LSL, the compiler exists within the Second Life viewer itself. In the future, it is likely that the compiler will move from the viewer into the Second Life simulators, but where the code is compiled isn't very important. What matters is that the text is converted into a form that can run on the simulators.""
Networking

Submission + - Improvements to the Download Process

ant_tmwx writes: Metalinks collect information about files in an XML format used by programs that download. The information includes mirror lists, ways to retrieve the file on P2P networks, checksums for verifying and correcting downloads, operating system, language, and other details. Using Metalinks details the Free Software programs you can use to download them with. There are also clients on Mac and Windows. With a list of multiple ways to download a file, programs can switch to another method if one goes down. Or a file can be downloaded from multiple mirrors at once, usually making the download go much faster. Downloads can be repaired during transfer to guarantee no errors. All this makes things automatic which are usually not possible or at least difficult, and increases efficiency, availability, and reliability over regular download links. OpenOffice.org, openSUSE, and other Linux/BSD distributions use them for large downloads.
Software

Submission + - Software Deletes Files to Defend Against Piracy

teamhasnoi writes: "Back in 2004, Slashdot discussed a program that deleted your home directory on entry of a pirated serial number. Now, a new developer is using the same method to protect his software, aptly named Display Eater. In the dev's own words, "There exist several illegal cd-keys that you can use to unlock the demo program. If Display Eater detects that you are using these, it will erase something. I don't know if this is going to become Display Eater policy. If this level of piracy continues, development will stop." Is deleting user data ever acceptable, even when defending one's software from piracy?"
The Courts

Sweden to Make Denial of Service Attacks Illegal 108

paulraps writes "Sweden is to pass legislation making Denial of Service attacks illegal. The offense will carry a maximum jail term of two years, and is thought to be a direct response to the attack which crashed the Swedish police's web site last summer. Nobody was charged for that, but the fact that it came shortly after a raid on the Pirate Bay's servers was thought by many to be not entirely coincidental. Sweden's move follows the UK, which is even tougher on web attackers — there the sentence can be over five years in prison."
Biotech

Grid Computes 420 Years Worth of Data in 4 Months 166

Da Massive writes with a ComputerWorld article about a grid computing approach to the malaria disease. By running the problem across 5,000 computer for a total of four months, the WISDOM project analyzed some 80,000 drug compounds every hour. The search for new drug compounds is normally a time-intensive process, but the grid approach did the work of 420 years of computation in just 16 weeks. Individuals in over 25 countries participated. " All computers ran open source grid software, gLite, which allowed them to access central grid storage elements which were installed on Linux machines located in several countries worldwide. Besides being collected and saved in storage elements, data was also analyzed separately with meaningful results stored in a relational database. The database was installed on a separate Linux machine, to allow scientists to more easily analyze and select useful compounds." Are there any other 'big picture' problems out there you think would benefit from the grid approach?

Slashdot Top Deals

Work without a vision is slavery, Vision without work is a pipe dream, But vision with work is the hope of the world.

Working...