Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Down the memory hole (Score 5, Interesting) 229

On Sunday or Monday, I shared a "What is happening in Turkey" post, in English, from a Turkish friend's wall to my own. It was shared to "Friends except acquaintances" and got a few likes and comments. This morning I noticed it was gone from my wall. It is not to be found in my activity log, and the notifications of that it had been commented on were also gone.

I was starting to doubt I had posted it at all, when I remembered to check Google Reader (Yep, still running), as I ages ago had set up a RSS feed with my notifications there. There it was, "[Friend's name] likes your link", with a clickable link to name/posts/ followed by a numerical value. However clicking on it gave this message: "This content is currently unavailable. The page you requested cannot be displayed right now. It may be temporarily unavailable, the link you clicked on may have expired, or you may not have permission to view this page". Other posts in my RSS feed works fine, so it was just this particular one.

If it wasn't for the RSS feed, I probably would have shrugged it off and thought no more of it, so I guess the RSS feature will be gone soon too.

Comment Doesn't desktop firewalls have one advantage? (Score 1) 440

Aren't desktop firewalls useful in cases where attackers use malicious PDFs/Office documents/browser exploits to run reverse shells? If the exploit tries to connect to, how can a server firewall know that the connection is not a legitimate HTTPS connection?

As far as I understand, desktop firewalls would block attempts like these, as long as the connection isn't initiated by a whitelisted program. Of course the exploit payload could include methods to whitelist itself, but I assume there is no one single method to do this, so the payload would have to include custom methods for each of the personal firewall vendors.

Disclaimer: I have no experience with personal firewalls, and if I'm talking out of my ass, please correct me.

United States

Submission + - Brutal Violence Against Russian Homosexuals

reporter writes: "Another brutal suppression of a public demonstration in Russia has occurred. This time, however, the Russian public actually helped the Russian police to beat up the protestors. According to a BBC report, "A gay rights demonstration in Moscow degenerated into violence for the second year running as right-wing and orthodox extremists attacked gay rights activists and supporters of the unauthorised demonstration. GayRussia leader Nikolai Alexeyev was bundled into a police van and driven away moments after arriving outside the offices of Moscow Mayor Yury Luzhkov, who has called homosexuals 'satanic'." Some Western European politicians joined the demonstration in support of the activists. However, Russian bigots attacked them violently, and the Russian police smiled approvingly. "'Where are the police? Why aren't you protecting us?' Mr Cappato [an Italian legislator] shouted as nationalists gathered nearby, prompting officers to take the MEP away and drive him to a police station." A French reporter even snapped a photo of a Russian bigot just before before he punched a British gay rights activist in the face. What, the hell, is happening to Russian society?"

Submission + - PHRACK 64 Released

The Circle of Lost Hackers writes: "Good news everyone: PHRACK is back ! From the introduction "As long as there is technology, there will be hackers. As long as there are hackers, there will be PHRACK magazine. We look forward to the next 20 years". This is how the PHRACK63 Introduction was ending, telling everybody that the Staff would have changed and to expect a relea se sometimes in 2006/2007. This is that release. This is the new staff.

Introduction by The Circle of Lost Hackers
Phrack Prophile of the new editors by The Circle of Lost Hackers
Phrack World News by The Circle of Lost Hackers
A brief history of the Underground scene by The Circle of Lost Hackers
Hijacking RDS TMC traffic information signal by lcars & danbia
Attacking the Core: Kernel Exploitation Notes by twiz & sgrakkyu
The revolution will be on YouTube by gladio
Automated vulnerability auditing in machine code by Tyler Durden
The use of set_head to defeat the wilderness by g463
Cryptanalysis of DPA-128 by sysk
Mac OS X Wars — A XNU Hope by nemo
Hacking deeper in the system by ankhara
The art of exploitation: Autopsy of cvsxpl by Ac1dB1tch3z
Know your enemy: Facing the cops by Lance
Remote blind TCP/IP spoofing by Lkm
Hacking your brain: The projection of consciousness by keptune
International scenes by Various"

Slashdot Top Deals

The power to destroy a planet is insignificant when compared to the power of the Force. - Darth Vader