Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Another approach - prior art (Score 3) 60

I think it is probably a bad idea to rely on the expensive patent process to protect open source. Isn't it better to make the software available and visible so that it can be clearly established that it is prior art, i.e. already known by all, when someone tries to patent drawing rectangles on the screen, or whatever? I'm probably ignorant, but what's wrong with that approach? Is it less certain to succeed in a court, or is it possible to patent something that someone else has already done and explained how to do?
Security

Submission + - Openwall Linux 3.0: no SUIDs, anti log spoofing (openwall.com) 2

solardiz writes: Openwall GNU/*/Linux (or Owl for short) version 3.0 is out, marking 10 years of the project. Owl is a small security-enhanced Linux distro for servers, appliances, and virtual appliances. Two curious properties of Owl 3.0: no SUID programs in default install (yet the system is usable, including password changing) and logging of who sends messages to syslog (thus, a user can't have a log message appear to come, say, from the kernel or sshd). No other distro has these. Other highlights of Owl 3.0: single live+install+source CD, i686 or x86_64, integrated OpenVZ (host and/or guest), "make iso" & "make vztemplate" in included build environment, ext4 by default, xz in tar/rpm/less, "anti-Debian" key blacklisting in OpenSSH. A full install is under 400 MB, and it can rebuild itself from source.

Comment Re:His idea seemed bad to me (Score 2, Interesting) 236

Net result is that you and only you know who you voted for, and you can verify that your vote was counted.

Sorry for being dense, but how does that verify that my vote is affecting the the announced result of the election? Couldn't they just announce "X got 60% of the votes" anyway? (By jamming in a lot of false ballots, or by just lying?)

Comment Re:Ok... (Score 4, Interesting) 230

Odd question.

I don't know about three days, but certainly under a week, which is completely normal in free software. Proprietary vendors generally want between six months and two years, but free software vendors and projects very rarely ask for more than a week or two delay before publication.

In fact, Linus famously tells people not to tell him about any security issue you want kept secret for more than a week, as he will just go ahead and fix it.

Comment Re:Ok... (Score 5, Interesting) 230

Odd, I don't know why you're picking on me, but I assume "Android Kernel" is marketing-speak for "Linux", in which I've reported found and fixes dozens of flaws over the years.

As you're so interested, here are some from the last month or two that you can take a look at.

CVE-2010-3080, A use-after-free in snd_seq_oss_open
CVE-2010-2960, A to-userspace dereference in keyctl_session_to_parent.
CVE-2010-2954, Kernel panic and to-userspace dereference in AF_IRDA sockets.
CVE-2010-3067, Various problems with aio (things like aio_submit())

The coverity results I've seen in the past are generally very low quality with a high density of chaff. I haven't seen the report they're talking about, but would be surprised if there were any noteworthy findings with any significant security impact. The only report I've seen them publish that had any convincing vulnerabilities was in 2006, where they found a verifiable privilege escalation in XFree86 (due to a pretty horrendous typo).

I'm a little saddened that you so readily associate me with Windows security, where as I consider myself primarily a Linux security developer, but I guess I'm flattered that where I spend my time is so important to you.

(perhaps a little creepy, though).

Comment Easy 100% car performance increase (Score 1) 570

It's easy: car pool!
With two people in the car, the amount of useful work* is doubled!
* = hauling people around, as opposed to hauling a large heavy metal box around
A fundamental problem about cars and energy efficiency is not about the engine, or how to improve its efficiency with 20% or so, it is about how we construct our societies, roads, public and goods transportation. When we build ourselves into a car centric, there is really isn't that much we can do to reduce our energy consumption.

Comment Re:Link to the orginal article (Score 1) 140

This very useful comment was found in TFA.

This story was part of "The Transformation Age", a pubic TV documentary with Robert X Cringely back in 2008 from MPT and the Univ of MD. The whole Kodak segment is available to watch online at http://www.rhsmith.umd.edu/transformationage/download/kodak.mov Steve Sasson was a really nice guy. Alas, the first digital photo was lost forever. It was a pic of a co-worker, and was 10,000 pixels – .01 megapixels.

Comment Re:Elite (Score 3, Insightful) 134

Actually, his comment was entirely accurate.

I've reported dozens of critical vulnerabilities in Microsoft software over the years, and I still have multiple open cases with Microsoft security, this particular case wasn't as simple as you have assumed. I would not be so presumptuous to explain the ethics of your work to you, but evidently you believe you're qualified to lecture me in mine.

If I were to read the sensationalised lay-press coverage of your latest publication or project, would it prepare me to write a critique of your
work?

Comment Re:We promise we won't hurt you. (Score 1) 628

If you sign a non-disclosure agreement that he had to have to have access to classified, he is no hero. You do not get to decide when classified data should be released, regardless of how it makes you feel. There are proper channels for complaining about things and he could have availed himself of those, if he had a problem with what was happening around him.

Actually, your idea that he shouldn't reveal atrocities because he was ordered not to has not been in vogue since the Nuremberg trials.

Slashdot Top Deals

He's dead, Jim.

Working...