Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Worst Person <-> Job Matches

An anonymous reader writes: Not much of an IT link but with Tony Blair becoming a Middle East peace envoy today it got me thinking about worst possible person and job combinations. Here is a few to start with:

Tony Blair -> Middle East peace envoy
Martha Stewart -> Accountant
George Bush -> Pretzel Salesman (or is this a best match?)
The Spice Girls -> Musicians

But I'm sure you could all do better?
Hardware Hacking

Submission + - Flaws in Arm and XScale (maybe PowerPC too) (

V4Vendetta writes: "Barnaby Jack developed a method for exploiting certain NULL pointer dereferences on the ARM and XScale architectures (and likely PowerPC).

In general, NULL pointer dereference flaws are considered non-exploitable. On the XScale and ARM architectures the memory address 0 is mapped, and also holds the exception vector table. The exception vector table is a set of branch instructions that correspond to different exceptions, such as software and hardware interrupts. When a case arises that writes to the 0 address with user-defined source data, it is possible to gain execution control by rewriting the exception table.

This method affects a lot of devices since most mobile phones and PDA are ARM based (iPhone?), and high-end routers often use the XScale architecture. The PowerPC architecture (used by Nintendo Wii, XBox360 and Playstation 3) also stores the vector table at a low address, and is likely vulnerable to this same attack.

This attack is more reliable than a remote stack overflow, due to the fact that no offsets are required. You will always be writing to address 0. The only data needed by an attacker is a copy of the vector table, which can be acquired by downloading and reversing the targets firmware.

Let me quote Barnaby: "As embedded exploitation is still in its infancy, I don't foresee a worm in the very near future — but yes, if a worm was targeting embedded devices, this would be a reliable attack vector.""


Submission + - The bare facts about naked telecommuting

Anonymous Coward writes: "We've all heard the jokes about what our colleagues who work from home are wearing — or not. For Tom Mulhall, though, telecommuting naked is no joke. Rather, it's good business. The owner of The Terra Cotta Inn clothing-optional resort and spa in Palm Springs, Calif., says 80% of his guests bring laptops and work nude poolside. He also talks about where guests stash their BlackBerries and offers advice to those looking to give naked telecommuting a whirl. facts.html"

Submission + - Will America Run on Caffeinated Doughnuts?

theodp writes: "Just like Martin Luther King, molecular biologist Robert Bohannon had a dream. And thanks to his hard work, geeks and cops alike will soon be able to partake in doughnuts laced with caffeine. The challenge was overcoming the bitter taste of coffee beans ground up in the donuts. But Bohannon persevered, and has managed to infuse the Buzz Donut with a Red Bull-caliber dose of caffeine without sacrificing taste (or fats and sugars!)."

Slashdot Top Deals

In any formula, constants (especially those obtained from handbooks) are to be treated as variables.