Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Hackers watching 'Hackers' (the movie) (

An anonymous reader writes: In honor of Hackers turning 20 this year, we assembled a group of actual hackers (from Hack Manhattan) to watch the cult classic and comment amongst other things: misconceptions about hacking, wearable technology, its nuanced view on law and order, and why 90s fashion had so many pockets.

"HACKER 2: I think one of the most unrealistic parts is taking a floppy that you wrote on a machine, putting it in another one, and all of the files had no read errors.

H&F: Or pulling it out of the trash and still having it work.

  HACKER 2: Yeah, with the gum on it.

  HACKER 3: Floppies were resilient!

  HACKER 2: No, they were not!”

"HACKER 5: Why don't you see more Hackers-era Angelina Jolie cosplays?

HACKER 1: I cringe watching this movie because I'm so embarassed at how much I modeled myself after Cereal Killer when I was like 16.

HACKER 5: 90s was such a pragmatic fashion. So many pockets!"

"H&F: I think the one thing that sets it apart was the styling, the outfits are really good, even kinda believable for the 90s. Not enough leather dusters though.”

Submission + - Petulant Penguin Hackers use Antarctica as Base (

chicksdaddy writes: Security Ledger reports on a new and sophisticated cyber crime campaign dubbed “Petulant Penguin” that is using compromised computers at Antarctic research bases to launch targeted attacks on government agencies in the U.S. and Europe. (

“To say we were surprised is an understatement,” said Matt Flinders, a security researcher at the firm Crowdstrike, which was among a handful to identify the attack. “We’re used to seeing attacks with ties back to countries like Russia, China – even Brazil. But Antarctica? Nobody expected that.”

Crowdstrike issued a report ( that provides information on the attacks Wednesday. Its profiles of sophisticated hacker groups include names like “Deep Panda” (a Chinese hacking crew with links to the People’s Liberation Army), “Energetic Bear,” (a group with its base in the Russian Federation) and “Flying Kitten” (with links to the Islamic Republic of Iran).

Antartica is connected to the Internet and even has its own top-level domain, .AQ. But data access for the icy continent is spotty and heavily reliant on satellites. Internet access to the Amundsen-Scott South Pole Station is provided by access via NASA’s TDRS-F1, GOES & Iridium satellite constellation. The South Pole’s TDRS relay (named South Pole TDRSS Relay or SPTR) was upgraded recently to support a data return rate of 50 Mbit/s. That accounts for more than 90% of the South Pole’s data capability and is primarily used to relay scientific data from the many research stations.

Working through NASA and other agencies, researchers were eventually able to trace the malicious traffic back to research installations at the South Pole including the Amundsen-Scott base, Concordia Station (a joint Italian and French research base) and Japan’s Dome Fuji station. Interestingly, the attackers were apparently able to work around the continent’s spotty access to the Internet and limited bandwidth: scheduling their malicious activities for seasons and periods in which the stations enjoyed strong and reliable Internet access.

Slashdot Top Deals

Space is to place as eternity is to time. -- Joseph Joubert