Palljon1123 writes: A stack-based buffer overflow in the Snort IDS (intrusion detection system) could leave government and enterprise installations vulnerable to remote unauthenticated code execution attacks. The flaw, found by researchers at IBM's ISS X-Force, affects the Snort DCE/RPC preprocessor and could be used to execute code with the same privileges (usually root or SYSTEM) as the Snort binary. No user action is required.
ChelleChelle writes: "Which is more secure — open or closed source systems? It's a question sure to start a heated argument among any group of developers. But why bother to argue if you don't know all the facts? This article takes a close look at this debate and defines its essential elements."
from the made-the-star-wars-movies-possible dept.
MattSparkes writes "Many images you see in a magazine are Photoshopped, and it's getting less and less likely that what you see at the cinema is any more genuine. In the film 'Blood Diamond', tears were added to Jennifer Connolly's face after a scene was shot. According to The Times, digital effects artists can even change actors' expressions. 'Opening or closing eyes; making a limp more convincing; removing breathing signs; eradicating blinking eyelids from a lingering gaze; or splicing together different takes of an unsuccessful love scene to produce one in which both parties look like they are enjoying themselves.' The article mentions the moral qualms digital effects people have over performing these manipulations, and the steps actors are taking to protect their digital assets."