Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Okay, I have a question (Score 1) 153

If it's like master pages in Expression Web, then that's not quite right... Instead of calling a separate file for the header/footer/etc when the page is generated, the page is kept static.

When you modify the master page, there are areas of the page that you designate as editable regions, and so when anything outside these editable regions is updated in the master page, the change is replicated on to each associated page.

This is assuming these master pages are similar in functionality to the 'dynamic web templates'...
Security

Submission + - Cracked linux boxes used to weild windows botnets (computerworld.co.nz)

m-stone writes: From ComputerWord:

"The vast majority of the threats we saw were rootkitted Linux boxes, which was rather startling. We expected Microsoft boxes," said Dave Cullinane, eBay's chief information and security officer, speaking at a Microsoft-sponsored security symposium at Santa Clara University.

Because Linux is highly reliable and a great platform for running server software, Linux machines are desired by phishers, who set up fake websites, hoping to lure victims into disclosing their passwords.

"We see a lot of Linux machines used in phishing," said Alfred Huger, vice president for Symantec Security Response. "We see them as part of the command and control networks for botnets, but we rarely see them be the actual bots. Botnets are almost uniformly Windows-based."

Privacy

Submission + - Scientist make quantum encryption breakthrough

Madas writes: "Scientists working in Cambridge, England have managed to make quantum encryption completely secure by putting decoy pulses in the key transmission stream. According to the story this paves the way for safe, encrypted high-speed data links. Could this allow completely private transmission of data away from snooping eyes and ears? Or will it mean film studios can stop movies from being copied when travelling on the internet?"
Security

Who Pays For Credit Card Breaches? 313

PetManimal writes "A scheme to steal customers' credit and debit card information at a New England supermarket chain highlights a little-understood fact about credit card security: Customers still think that the credit-card companies have to eat fraudulent charges, but since the PCI DSS standards were adopted, it's actually the merchant banks and merchants who have to pay up. And, according to the blogger writing in the latter article, it's a good thing." "The main reason PCI exists is that there are tens of thousands of merchants who don't understand the basics of information security and weren't even taking the very minimum steps to secure their networks and the credit card information they stored... PCI pushes that burden downstream and forces merchants to... put in a properly configured firewall, encrypt sensitive information and maintain a minimum security stance or be fined by their merchant banks... [T]he credit card companies have taken the bulk of the financial burden off of themselves and placed it on the merchants, which is where much of it belongs...'"

Feed Aussies Ban Old-Style Bulbs (wired.com)

Australia decrees a nationwide replacement of incandescent light bulbs with energy-efficient flourescents, one step, it says, in the battle against global warming. By the Associated Press.


Movies

Don't Believe What You See at the Movies 441

MattSparkes writes "Many images you see in a magazine are Photoshopped, and it's getting less and less likely that what you see at the cinema is any more genuine. In the film 'Blood Diamond', tears were added to Jennifer Connolly's face after a scene was shot. According to The Times, digital effects artists can even change actors' expressions. 'Opening or closing eyes; making a limp more convincing; removing breathing signs; eradicating blinking eyelids from a lingering gaze; or splicing together different takes of an unsuccessful love scene to produce one in which both parties look like they are enjoying themselves.' The article mentions the moral qualms digital effects people have over performing these manipulations, and the steps actors are taking to protect their digital assets."

Slashdot Top Deals

Live within your income, even if you have to borrow to do so. -- Josh Billings

Working...