Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Kinky Sex Comes To The Wii (

RedEaredSlider writes: Ubisoft is taking video games into an uncharted territory: sex and kink.

A game for Nintendo's Wii and Sony's PS3 called "We Dare," is being advertised in what's sure to soon be a viral video, already making rounds on the Internet. As part of game play, the commercial shows players spanking the Wii controller which is tucked in another player's pants in order to score points. It also shows two players kissing their Wii controller for points.


Submission + - Remote SMB Exploit: Crashing Windows 7 and Server ( 1

danielkennedy74 writes: Python code was posted today by Laurent Gaffie on his blog, demonstrating a much too easy way to remotely crash a Windows 7 or Windows Server 2008 machine. The crash is caused by sending a NetBIOS header which specifies that the SMB packet is 4 bytes smaller or larger than it actually is.

In this code sample, you can see that the header has the length of the packet set to 9a rather than 9e (4 bytes smaller).

On Open BSD, Mac OSX, and Linux 2.6 workstations, we ran the python code and had it listen on port 445. I would have had a Windows server run the listening server, but SMB on Windows already listens on port 445 and for the purpose of the demonstration it was easier to run it on machines that do not listen on this port by default. From the Windows 7 and Windows Server 2008 victim machines, we simply attempt any type of SMB connection to the bad hosts listening with the Python code. This can be done by simply doing a directory command (dir) to a non-existent share (dir \\ip-address\share).

The screenshot below shows the command window with the dir command used to attempt a connection to a host ( which is running the Python code, ready to send that SMB packet over. As soon as the connection is attempted, the whole machine freezes. I had resource monitor and task manager running and every counter, even the ticking of uptime, stopped dead. In some cases, I left the machine in this state for a significant amount of time. Also, the host was no longer pingable, so once the crash occurred, it was off the network and no longer attempting any more SMB traffic.

Slashdot Top Deals

You are always doing something marginal when the boss drops by your desk.