Forgot your password?
typodupeerror

Comment Re:System Clock (Score 2, Informative) 214

Looking at http://mtc.sri.com/Conficker/addendumC/, it appears that it gets the time from an HTTP response coming from a few dozen major websites. The responding IP is checked against a blacklist of IPs. Additionally, if the returned IP is a duplicate of one returned from a previous request, that IP is blocked as well. So the network time could be spoofed, but you'd need to set up multiple http servers,each with unique IPs that are aren't on the blacklist.
Space

This Is the Way the World Ends 394

Dave Knott writes "The CBC's weekly science radio show Quirks and Quarks this week features a countdown of the top ten planetary doomsday scenarios. Nine science professors and one science fiction author are asked to give (mostly) realistic hypotheses of the ways in which the planet Earth and its inhabitants can be destroyed. These possibilities for mankind's extinction include super-volcanoes, massive gamma ray bursts, and everybody's favorite, the killer asteroid. Perhaps the most terrifying prediction is the reversal of the Earth's magnetic field (combined with untimely solar activity), a periodic event which is currently 1/4 million years overdue."
Privacy

Tool To Allow ISPs To Scan Every File You Transmit 370

timdogg writes "Brilliant Digital Entertainment, an Australian software company, has grabbed the attention of the NY attorney general's office with a tool they have designed that can scan every file that passes between an ISP and its customers. The tool can 'check every file passing through an Internet provider's network — every image, every movie, every document attached to an e-mail or found in a Web search — to see if it matches a list of illegal images.' As with the removal of the alt.binary newgroups, this is being promoted under the guise of preventing child porn. The privacy implications of this tool are staggering."

Slashdot Top Deals

To iterate is human, to recurse, divine. -- Robert Heller

Working...