Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:SSH Tunnels... (Score 1) 208

yes indeed. I've been tunneling all my outbound traffic over a localhost SSH SOCKS proxy for years precisely because I don't want anybody else on the LAN (wireless or otherwise) to be able to sniff that traffic. my ISP sniffing, well, I'm stuck with that for non-HTTPS traffic - but I can prevent the rest. To wit: and if you can't get out on anything but tcp/443, see also:

Comment Re:In other words, 61% think... (Score 4, Insightful) 398

THIS. the very concept of an "Internet killswitch" is nonsense on the face of it. Think about it: what, exactly, will the President shut off? MAE-EAST? Google datacenters? Sprint core routers? Facebook webservers? All of Comcast's residential netblocks? Undersea fiber between San Francisco and Australia? The most fundamental aspect of the Internet is its decentralization, designed specifically to PREVENT any single entity from shutting down the network. The entire discussion consists of uninformed blathering from morons and those who hope to make a truckload of money selling them nonsense solutions.

Comment Re:Uh, no, you can't have my network (Score 1) 505

This is a logical step to secure critical infrastructure in the event of an attack. Not some paranoid bill that will allow big brother to sneak in unaware and monitor/control every aspect of the internet.

sure - there's no point in passing redundant legislation when warrantless wiretaps are already a well-established precedent.

Submission + - Is Windows 7 designed to spy on us? 11

freakxx writes: "An article on has invited some concerns about spying nature of Windows 7 in form of a comment. His claims seems to be quite genuine as he is asking others to confirm it by checking themselves. In his words:

What I did notice was that Windows 7 is the NSA's most comprehensive Spyware Platform to date.. Thats why Russia, France, China, Cuba and most other Countries are moving to Open Source for Security! Thats why Microsoft needs to scare you off of XP Thats why Outgoing Data is not blocked by default in the firewall Thats why antiviruses like AVG were rewritten to prevent you from blocking Internet access by programs on your computer like Firefox for example! (You no longer get popups from your firewall asking if you want firefox and other programs to connect to the Internet — they just connect without your OK) Thats why encryption programs rewritten for Vista and Windows 7 give you no indication of trouble yet trusted encryption programs give you warning that the contents of RAM are being copied to your hard drive ONLY after you open an encrypted disk and thereby compromising your encryption key which was located in RAM. Thats why Windows 7 runs to the Internet to find a solution to the problem listed above after rebooting from a bluescreen! To aquire your encryption keys! Download Drivecrypt 4.0 from 2cows if you doubt me and test it yourself. DC-4.0 Installs correctly without errors, creates an encrypted volume without errors and only Bluescreens AFTER your encryption key is in RAM and can be copied to your hard drive to be transferred accross the Internet the next time you have Net access! Thats why Windows 7 can send your wireless network encryption key accross the Internet as well as your disk encryption keys stated above. By transferring your wireless encryption key without your knowledge, local authorities can access your wireless network and access your encrypted data even after you disconnect from the Internet Thats why wireless networking hardware will soon be built into future netbooks and notebooks to prevent removal Thats why nobody is even covering these problems in the press but instead are removing my posts from over 50% of other sites on the Internet If they doubt me, they should at least investigate these problems, don't you think?

I think this is indeed something that should be checked by the Slashdot community to shed more light on legitimacy of the claim, because if it is true, it's a very big concern for everyone. The article is here and the comment is here. The user, who is making the claim, has his profile here. He is also claiming that his comments are getting regularly deleted on Internet by the admins."


Submission + - Microsoft's can't handle the load 1

ydodger writes: "This site is just a disaster. From the very beginning I couldn't create my invite, when I finally did, I couldn't tell whether it had mailed anything and then realized it had lost all my edits. Now, anyone who tries to RSVP gets an invalid code. Many others are seeing the same thing. Finally, once you do get it to work, you have to agree to their Terms of Service and Release just to RSVP! I'm not even RSVPing to my own party with those restrictions!"

CJKV Information Processing 2nd ed. 52

stoolpigeon writes "At the end of last year, I made a move from an IT shop focused on supporting the US side of our business to a department that provides support to our operations outside the US. This was the first time I've worked in an international context and found myself, on a regular basis, running into long-time assumptions that were no longer true. My first project was implementing a third-party, web-based HR system for medium-sized offices. I found myself constantly missing important issues because I had such a narrow approach to the problem space. Sure, I've built applications and databases that supported Unicode, but I've never actually implemented anything with them but the same types of systems I'd built in the past with ASCII. But a large portion of the world's population is in Asia, and ASCII is certainly not going to cut it there. Fortunately, a new edition of Ken Lunde's classic CJKV Information Processing has become available, and it has really opened my eyes." Keep reading for the rest of JR's review.

Submission + - Car video system (

carvideosystem writes: "Instead of the current Car-Audio-Systems is an integrated set of capabilities in the visible and hidden, they see that the old systems. Today, the video resolution is much less clear and produce glare, DVDs and games functions directly to the iPod and MP3 storage capacity are increasingly being. Phone receiver is increasingly standard."

Submission + - 'Tiny chance' of planet collision (

desolation angel writes: Astronomers calculate there is a tiny chance that Mars or Venus could collide with Earth — though it would not happen for at least a billion years.

Writing in the journal Nature, a team led by Jacques Laskar shows there is also a chance Mercury could strike Venus and merge into a larger planet. The researchers carried out more than 2,500 simulations. They found that in some, Mars and Venus collided with the Earth.


Submission + - Eight Videogame Places You're Not Supposed to Go ( 1

Ssquared22 writes: The eight far-off realms in this article exist for different reasons. They could be developer test areas, or forgotten pieces of landscape that somehow made their way into the final code. Whatever their reason for being, they all have one thing in common: They weren't meant to be explored by the likes of you and me. But through persistence, hacks or some combination of the two, you can take in these rare delights for yourself. Pack your bags.

Submission + - New attack exploits virtually all intranets, VPNs ( 1

redsoxh8r writes: Security researcher Robert Hansen, known as Rsnake, has developed a new class of attacks that abuses a weakness in many corporate intranets and most browsers to compromise remote machines with persistent JavaScript backdoors. Threatpost reports: "The attacks rely on the long-term caching policies of some browsers and take advantage of the collisions that can occur when two different networks use the same non-routable IP address space, which happens fairly often because the amount of address space is quite small. The bottom line is that even a moderately skilled attacker has the ability to compromise remote machines without the use of any vulnerability or weakness in the client software. "If you're even vaguely clever, developing this might take you two hours. It's not that difficult," said Robert Hansen, the researcher who wrote about the attacks in a white paper published this week, called "RFC1918 Caching Security Issues."

Submission + - Red giant Betelgeuse to become a supernova?

KindMind writes: "According to an article on Fox News, Betelgeuse may be close to becoming a supernova. From the article: "A nearby, well-known and very bright star may soon explode in a supernova, according to data released by U.C. Berkeley researchers Tuesday. The red giant Betelgeuse, once so large it would reach out to Jupiter's orbit if placed in our own solar system, has shrunk by 15 percent over the past decade in a half, although it's just as bright as it's ever been." Betelgeuse of course is known to The Hitchhiker's Guide to the Galaxy fans as Zaphod Beeblebrox's home system."

Slashdot Top Deals

A list is only as strong as its weakest link. -- Don Knuth