Follow Slashdot stories on Twitter


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Forensics: "File System Spoofing." (

iiiears writes: Currently, Casper may select fake root file system image on evidentiary media (e.g. HDD), because there are no authenticity checks performed (except optional UUID check for a possible live file system), and this fake root file system image may be used to execute malicious code during the boot with root privileges.

Submission + - Hardware Threat BIOS Rootkit. "Mebromi" (

iiiears writes: Mebromi and contains a bit of everything: a BIOS rootkit specifically targeting Award BIOS, a MBR rootkit, a kernel mode rootkit, a PE file infector and a Trojan downloader. At this time, Mebromi is not designed to infect 64-bit operating system and it is not able to infect the system if run with limited privileges.

Submission + - Malware Deniers (

iiiears writes: Ed Bott has been around a while. He did some useful work tracking down a report that 50% of PCs in the world were infected with malware.

Slashdot Top Deals

"The algorithm to do that is extremely nasty. You might want to mug someone with it." -- M. Devine, Computer Science 340