Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:An article in search of a problem (Score 1) 729

Yes. Plug and Pray- I mean Play was the biggest selling point of W95 (in addition to a 32bits kernel).

Since ISA doesn't support PnP, it went away very quickly. But even with PCI, you will have to pray that your 16 IRQs won't conflict, you have enough memory address (and the right part of addresses!), and DMA (usually not a problem.)

Comment Nice try, but with 3 potential problems (Score 3, Insightful) 102

The software detects the behavior of an application. The detection is probably like 'if a process accesses each image file (OpenFile/CreateFile) , read it, create a new file with "same_name+.encrypted", then delete the original image file.' x 10 times, then that process is likely guilty.

1. What happens if the malware instead use MapFileView and 10 others potential Win32/kernel32 APIs combination? This quickly become a arms race and is going to be terrible in terms of system overhead, not to mention the time gap between a new method appearing and the detection software catching it.

2. What about Windows' internal processes that, for example, shadow copy the file? Would the detection software catches it? What about false detection of, say, the disk defragmentation software?

3. Since the system is already compromised, what stops the malware from detecting the countermeasure and just delete all the files in the system straight out? If that's too obvious, then how about write a random byte per x bytes offset to all files? Even if you killed the malware process, you can't be sure that there no other malware running on the system that can go into revenge mode.

Comment Re:God I hate to say this, but (Score 1) 562

I want to add some on top of what you said.

Do you remember any new movie set piece in The Force Awaken?

When people talk about Star Wars, new movie set pieces immediately come to mind.

For A New Hope, it's the Star Destroyers and the Death Star.
For The Empire Strikes back, it's the snowy mountain filled with AT Walkers, then the City in the Cloud.
For The Return of the Jedi, it's more AT walkers in forest, the rebellion fleet, and the half completed Death Star.

For The Force Awaken. it's the...? The new not-Death Star? The Bridge? X-Wings? Desert/Forest/Snow/Snowy forest?

My point is, the new movie recycles all the old pieces from the original movies. As Lucas said, this is what makes this movie bland.

Comment Re:God I hate to say this, but (Score 3, Insightful) 562

>[Kylo Ren] was less of a badass, and more like a bipolar emo kid with daddy issues.

That's exactly the point.

http://io9.gizmodo.com/kylo-re...

The Star Wars movies have always featured villains who are cold, calculating and in control of their emotions. Vader, the Emperor, Dooku, Maulâ"the Sith always acted with a chilling precision. But Kylo Ren is anything but precise. Heâ(TM)s brash, raw, sullen, and just bursting with emotion. This is something we've seen before in the Expanded Universe of books and comics, but never in the movies.

Kylo Ren howls and loses his mind, whenever anything goes wrong.

Kylo Ren harbors a bitter resentment for the expectations thrust upon him in his former life as Ben Solo, Jedi-in-training and a son of legends. Even his lightsaber itself is unstable and angry, flickering with sparks and heat-just like its owner.

Comment Re:The first windows to have a TCP/IP stack. (Score 1) 284

[code]You got a couple of things wrong.

1. It did have a TCP/IP stack...along with a NetBUEI and a IPX/SPX stack. MS made sure all the well known LAN protocols are supported.

2. Windows 95 did not have QuickBASIC built in. I don't know where you got that idea from

3. The 3dfx Banshee came out on 1998, a good 3 years after Windows 95's release.

4. Windows 95 did not have Internet Explorer built in. It wasn't until Windows 95 OSR2, released in 1997, that IE 3 was in. Perhaps you are think about Windows Plus! for 95 and its IE1, which you had to purchase separately?

5. It has some form of memory protection in the form of virtual memory. Compare to Windows 3.1, the MMU and the preemptive scheduling make it the first true consumer OS to have memory protection.

6. KDE and Gnome basically copied Windows 95's gui all the way to year 2000. I am not sure why you would think that if it's not for Win95, the year of Linux on the desktop could come earlier.[/code]

Comment Re: Good for greece (Score 3, Insightful) 1307

>Eu has been very cruel to Greece and the Greek people.

In much the same way a rehab clinic is cruel to drug addicts.

Before you say that rehab clinics don't withhold living essentials (eg. food) from drug addicts, have you considered asking EU for those items, instead of asking EU to 'give us free money' (by way of forgiving loans).

I think, at this point, they would rather give you living essentials to shut the pensioners up, instead of giving them any more money.

Comment As a exploit kit researcher.... (Score 3, Interesting) 31

This tool looks very intriguing, so I gave it some malicious code for a spin (all codes are from malicious drive-by sites in the last 24 hours.)
 
 

/** @type {function (string): *} */
e = eval;
/** @type {string} */
v = "0" + "x";
/** @type {number} */
a = 0;
try {
  a *= 2;
} catch (q) {
/** @type {number} */
  a = 1;
}
if (!a) {
  try {
    document["bod" + "y"]++;
  } catch (q$$1) {
/** @type {string} */
    a2 = "_";
  }
  z = "2f_6d_*snip*"["split"](a2);
/** @type {string} */
  za = "";
/** @type {number} */
  i = 0;
  for (;i < z.length;i++) {
    za += String["fromCharCode"](e(v + z[i]) - sa);
  }
  zaz = za;
  e(zaz);
}
/**
  * @param {string} n
  * @param {string} k
  * @param {number} v
  * @param {string} reason
  * @return {undefined}
  */
function SetCookie(n, k, v, reason) {
/** @type {Date} */
  var defaultCenturyStart = new Date;
/** @type {Date} */
  var expiryDate = new Date;

Sort of useful, I guess. But ultimately not an essential feature for malicious javascript analysis. I think the tool would be more useful to legitmate JS reverse-engineering tasks as their obfuscated JS are much much bigger.

Submission + - Facebook analysis shows that Princeton's dismiss is imminent

guardiangod writes: In a cheeky response to Princeton's article that Facebook is dying, Facebook in house researchers published an research article of what most of us has suspected- Princeton's frame and admission rate is dying, and the researchers verified this by using the Princeton researchers' plague mathematical model.

Like many of you, we were intrigued by a recent article by Princeton researchers predicting the imminent demise of Facebook. Of particular interest was the innovative use of Google search data to predict engagement trends, instead of studying the actual engagement trends. Using the same robust methodology featured in the paper, we attempted to find out more about this "Princeton University" — and you won't believe what we found! In keeping with the scientific principle "correlation equals causation," our research unequivocally demonstrated that Princeton may be in danger of disappearing entirely.

Comment Re:Different approaches to aid (Score 1) 196

Maybe, but from what I've heard, Africans much prefer western aids.
 
Westerners just drop their pile of money on the Africans' door and tell the Africans to save themselves with it.
 
Chinese on the other hand distributes/build the aids themselves with lots of strings attach (nothing evil, mind you, just enough to make sure that both the Chinese and Africians get their money's worth.)
 
To the Africans, they see Chinese' policy as an intrusion.

Comment Re:"That's what you get for money laundering". (Score 5, Informative) 173

Do you know the definition of Ponzi scheme? Because I don't think that term means what you think it means.
 
Bitcoin is many things, but it is as much of a Ponzi scheme as gold, real estate, or stock speculations. ie. not a Ponzi scheme at all.

While one can argue that Bitcoin is a scam (and most definitely a bubble), it does not fit the formal definition of a ponzi scheme.

http://www.sec.gov/answers/ponzi.htm

>>A Ponzi scheme is an investment fraud that involves the payment of purported returns to existing investors from funds contributed by new investors. Ponzi scheme organizers often solicit new investors by promising to invest funds in opportunities claimed to generate high returns with little or no risk. In many Ponzi schemes, the fraudsters focus on attracting new money to make promised payments to earlier-stage investors and to use for personal expenses, instead of engaging in any legitimate investment activity.

The key point here is the "solicit new investors by promising to invest funds in opportunities claimed to generate high returns" section. In a normal Ponzi Scheme, the previous investors would attempt to guarantee newcomers that profit is certain.

In comparison, Bitcoin promises no such thing. While it is true that the profit of previous investors (or speculators) do indeed come from newcomers, the newcomers are not promised anything beyond their belief that the price will continue to rise.

This key difference makes the Bitcoin phenomenal a 'Bubble', not a 'Ponzi Scheme'.

Comment Re:Geeze.. (Score 1) 214

That gives me a patent idea:

A patent on using a smart phone device as a chisel to open pain cans. After the phone is inserted into the crack, the vibrator would turn on rhythmically and attempt to loosen the lid.

I am sure this idea is novel, and is about as obvious as the patent mentioned in the summary.

Comment Re:Something I've been watching... (Score 2) 926

Just something to add.

I am not sure if this has been reported in the western world, but for the first time ever in China, the price of corn (per weight) has exceeded the price of rice.

Think about this for a second. It's China, where people eat rice daily. Yet corn, a staple food for livestock, is now more expensive than rice itself. Leaving aside it takes 10x more energy to raise cattle than plant, this is a dramatic reversal of fortune.

Also, Americans like to whine how China has them by the balls- Hell no. If America stops selling food to China tomorrow, you can guarantee that there is going to be massive starvation within a week(and revolution, and probably WW3) in China.

Slashdot Top Deals

Real programmers don't write in BASIC. Actually, no programmers write in BASIC after reaching puberty.

Working...