Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Ethical Hacking Tutorials (kyrionhackingtutorials.com)

kyrion.in writes: Hello Friends,

We are Kyrion Digital Securities.

Kyrion Digital Securities at Kyrion Technologies Pvt. Ltd. is an IIT Delhi Alumni venture, founded by a group of IT

Security Experts. It has laid a foundation in the field of Ethical Hacking & Information Security.

Kyrion Digital Securities has conducted workshop on Ethical Hacking and Information Security in Top Engineering

colleges of India such as IISc Bangalore, IIT Kanpur, IIT Kharagpur, IIT Madras, IIT Delhi, IIT Roorkee, IIT

Guwahati, NIT Calicut, NIT Warangal, NIT Jalandhar, IIIT Allahabad, VIT Vellore, NIT Silchar, NIT Hamirpur,

etc. and has reached out to an excess of 10,000 students and tutors in different cities across the country.

We have come up with a very Fresh, New and Latest Ethical Hacking Learning Blog where you can start learning

Ethical Hacking for Free. Latest Ethical Hacking Tricks and Tips, Ethical Hacking Videos, Ethical Hacking Books

and so much more.

Please visit: http://kyrionhackingtutorials.com/

Techniques on Windows Hacking, Linux Hacking, Wireless Hacking, Bluetooth Hacking, Trojans and Viruses,

Email Security, Orkut Tips, Mobile Hacking, etc can be explored at kyrionhackingtutorials.com

We intend to spread awareness on Information Security to all.

Learn Hacking avoid Information Security Attacks and Vulnerabilities

Praful Agarwal
Technical Head
Kyrion Technologies Pvt. Ltd.
Delhi, India


Submission + - Ubisoft's new DRM cracked in 24 hours. (kotaku.com)

An anonymous reader writes: Ubisoft's new DRM has already been bypassed just 1 day after it's debut by the well-known game hacking group Skidrow. This is the same "always connected" drm they were planning on using in Assassin's Creed for the PC.

Associated links:
Link to info about pirated version of the game: http://www.rlslog.net/silent-hunter-5-battle-of-the-atlantic-skidrow/
Link to wikipedia confirming that the drm used in this game is the same as the one in the upcoming Assassin's creed: http://en.wikipedia.org/wiki/Silent_Hunter_V#DRM_restrictions


Submission + - The UK's very own DMCA; only worse. (pirateparty.org.uk)

Grumbleduke writes: During today's debate in the UK's House of Lords on the much-criticised Digital Economy Bill the unpopular Clause 17 (that would have allowed the government to alter copyright law much more easily than it currently can) was voted out in favour of a DMCA-style take-down system for websites and ISPs. The new amendment (known as 120A) sets up a system whereby a copyright owner could force an ISP to block certain websites who allegedly host or link to infringing material or face being taken before the High Court (and made to pay the copyright owner's legal fees). This amendment was tabled by the Liberal Democrat party who had so far been seen as the defenders of the internet and reason and with the Conservative party supporting them passed by 165 to 140 votes. The UK's Pirate Party and Open Rights Group have both strongly criticised this new amendment.

The Bill is currently in Report stage in the House of Lords, and will then and will then have to pass through the (elected) House of Commons. The government has indicated its desire to push through the legislation before the upcoming election.


Submission + - Friends let friends use... Firefox or Chrome? 2

An anonymous reader writes: To Firefox or to Chrome, that is the question. Most of you are probably the tech support guy/gal for your very non-techie, almost computer illiterate friends/relatives. You know they type: hopelessly wedded to IE on Windows XP/Vista/Win7; would gladly click on the "infect me" button on Facebook. After which you get a panicked call to help them get rid of this "Security Tool" that is trying to extort money from them. I just went through that scenario a few days ago. Well, not quite, the "infect me" part is a feeble attempt at humour, they have no idea how the malware came in.

So I am asked: what can I do to make sure this does not happen again? Hmmm... Bite my tongue. OK. This type of netizen will not get off Windows, so alternative OS's are out of the question. They are running anti-virus, not much good did it do. They can't afford the HW & SW costs of upgrading from XP to Win7. That leaves the "kick-me-in-the-behind" browser they are using. What can be done with that?

Well, Firefox with its multitide of security oriented add-ons comes to mind (noscript, ad-block, noflash, etc.). Except... it is way too intrusive for this type of users. They just want their browsers to work. The 'permit this, enable that' mode of operation is unacceptable.

What we are looking for then is a Windows-based browser that can stand on its own (default installation + common plug-ins) and be somewhat resilient to attack.

We can consider Google Chrome and it's sandbox security model, it looks awfully good. Firefox on the other hand has a pretty good but not exactly perfect security track record. And... no privilege separation; you own the browser and you own the filesystem (specially if the user is on XP as an administrator).

So, if you were to be asked... which browser can keep me safer? Given the constrains listed above, what would you tell your Windows-addicted friends? Use Firefox? Use Chrome? What the heck, somebody is bound to bring it up: use Opera? I am looking for an intelligent discussion on the security pros and cons of Chrome and Firefox, not a flame war. Let's see if the Slashdot community can deliver.

Submission + - ACTA internet chapter leaked - bad for everyone (boingboing.net)

roju writes: Cory Doctorow is reporting on a leaked copy of the "internet enforcement" portion of the Anti-Counterfeiting Trade Agreement (ACTA). He describes it as reading like a "DMCA-plus" with provisions for third-party liability, digital locks, and "a duty to technology firms to shut down infringement where they have 'actual knowledge' that such is taking place." For example, this could mean legal responsibility shifting to Apple for customers copying mp3s onto their iPods.

Submission + - Fantastic video game weapons vs their real-life eq (gamesradar.com)

antdude writes: This two pages GamesRadar article compares the fantastic computer/video game weapons and their real-life equivalents — "There are certain things we just accept in video games. An overweight pipe technician can jump five times his own height. A first aid kit will instantly heal bullet wounds and replace lost blood. And any theoretical physics model can be cleanly packaged into a lightweight, handheld weapon with the minimum of fuss. But in certain cases, that last one isn't too far off the truth.

As guano loopy as most game weaponry is, some of it definitely isn't implausible. In fact some of it exists already. Kind of. Stick with us, and we'll talk you through the exciting/mortifying truth of what could be just around the technological corner..."

Seen on Blue's News.

Slashdot Top Deals

If you can't get your work done in the first 24 hours, work nights.