Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Security Hardware (Score 2) 38

"Our credential scanning methods did not detect its presence (this issue has been corrected)."

Scanning binary blobs for sensitive information will always be a heuristic prone to false negatives and false positives. It's a good tactic but not the right solution to this problem. The real bug here is that they were using what seems like a very sensitive signing key held in memory, rather than a one held in a Hardware Security Module (HSM). That key should have been created in the HSM and done all it's signing from within the HSM. It should never have been in main memory to being with.

Comment fnord (Score 1) 136

The first time I read the headline it said "Software Developer says MegaMan Master keys are Retrievable" so I thought it in regards to was some kind of ROM DRM. Second time I read it, it said "Software Developer says Sega Mega Keys are retrievable". So I googled Sega Mega only find that the Sega Genesis (or some variation) was marketed with that name in some parts of the world. This made some sense, although didn't really seem to belong in YRO. Is my mind deteriorating faster than I expected or is the Illuminati **cking with me?

Comment Don't do it (Score 1) 555

Don't use use your personal assets for work. Beyond the trouble you're already experiencing, it causes other problems: it prevents management from understanding the total cost of IT operations; it's likely to create unrealized dependencies on personnel (which will be realized upon their departure or transfer); and it complicates the creation of Disaster Recovery and Continuity of Operations plans.

The measures your hospital is taking may be draconian, but in the face of countless new articles trumpeting that latest XYZ agency/company/government who lost a laptop with account records full of very personal and very accessible information, it's understandable. It's very, very difficult for a corporation to maintain appropriate level of control over their own mobile assets. It's an unsolved problem, and to me at least, not obviously solvable without substantial changes to the underlying operating system and communication technology. (And then, will the resulting Internet be open, extensible, and autonomous like the one we have today?) But I digress...

Comment Make a disk image (Score 2, Informative) 325

If the system isn't bootable, and you have the right drive controller, carefully connect the old drive to a new system and use something like "ddrescue" ( http://www.forensicswiki.org/wiki/Ddrescue) or "dd_rescue" ( http://www.forensicswiki.org/wiki/Dd_rescue) to take a disk image. Both those programs try to recover from bad blocks, whereas standard dd usually will error out. (Personally, I'd make an image even if the system is bootable.)

With the disk image extracted, you can pack the hardware away or do whatever with it. Then you can focus on finding (or writing) tools to read the disk image. If you find that there is a Linux filesystem driver, you can use the loopback behaviour (see the man pages for "mount" or "losetup") to treat the disk image as if it were a drive. If you don't find a driver, perhaps you'll find some specialty command-line tools that can extract information, or documentation to write your own. At worst, you could use the "strings" command to read any text found on the image. Since you're working against an image, you can take your time, experiment with ad hoc techniques, make mistakes (remember to make backups), and try again and again.

Social Networks

Game Distribution Platforms Becoming Annoyingly Common 349

The Escapist's Shamus Young recently posted an article complaining about the proliferation of distribution platforms and social networks for video games. None of the companies who make these are "quite sure how games will be sold and played ten years from now," he writes, "but they all know they want to be the ones running the community or selling the titles." Young continues, "Remember how these systems usually work: The program sets itself up to run when Windows starts, and it must be running if you want to play the game. If you follow this scheme to its logical conclusion, you'll see that the system tray of every gaming PC would eventually end up clogged with loaders, patchers, helpers, and monitors. Every publisher would have a program for serving up content, connecting players, managing digital licenses, performing patches, and (most importantly) selling stuff. Some people don't mind having 'just one more' program running in the background. But what happens when you have programs from Valve, Stardock, Activision, 2k Games, Take-Two, Codemasters, Microsoft, Eidos, and Ubisoft? Sure, you could disable them. But then when you fire the thing up to play a game, it will want to spend fifteen minutes patching itself and the game before it will let you in. And imagine how fun it would be juggling accounts for all of them."
Image

Police Called Over 11-Year-Old's Science Project 687

garg0yle writes "Police in San Diego were called to investigate an 11-year-old's science project, consisting of 'a motion detector made out of an empty Gatorade bottle and some electronics,' after the vice-principal came to the conclusion that it was a bomb. Charges aren't being laid against the youth, but it's being recommended that he and his family 'get counseling.' Apparently, the student violated school policies — I'm assuming these are policies against having any kind of independent thought?"

Slashdot Top Deals

"The value of marriage is not that adults produce children, but that children produce adults." -- Peter De Vries

Working...