Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:Such a thing as "too hot" (Score 2) 348

I agree completely. I tend to stay away from 'extract' sauces, as they usually have a very bad flavor, and are primarily heat. I have been hooked on Lucky Dog Hot Sauce lately. [no affiliation] -- It has roasted peppers and a great roasted garlic flavor to it. It has just enough heat to add a kick, but not so much as to overpower the taste of the original dish that you add it to.

Comment Re:I'm a Geocacher (Score 1) 241

I still haven't found a way to feed the log sheets through a laser printer I'm capable of carrying around, particularly when the logs are wet or those infernal Blinky logs.

Came here to say something similar. I typically find a few caches per week, providing it isn't too hot outside.


Submission + - Malware, Exploit Kit Writers Merging Their Skills (

Trailrunner7 writes: Botnets have been around for more than 15 years now, and for much of that time they've been the favored platform for attackers looking to compromise users on a large scale and monetize those infected machines. But now, as researchers and authorities begin to have more success with botnet takedowns and arrests, the attackers behind malware kits and exploit kits are beginning to work together and learn from one another.

"Today, exploit kits and malware kits are sold separately, but we believe you'll see one combined kit to build and control malware soon," said Aviv Raff of Seculert, who has been researching the trend.

Those two functions in recent years have been performed by distinct groups, one of which develops and sells malware kits and another that does the same for exploit kits. But as the attack landscape continues to evolve and broaden, those functions are becoming more closely related and intertwined.


Submission + - War Between LulzSec and The Jester Intensifies (

Dangerous_Minds writes: There's an increasingly testy war between LulzSec and The Jester as of late. The Jester recently posted chatlogs and compromising data on LulzSec security leader Sabu. In response, LulzSec ridiculed The Jester by belittling his efforts to take down terrorist websites and even going as far as rewriting one of The Jester's PHP scripts from 60 lines to 3. One can only expect more fireworks between the two after this.

Comment Locked... For Now. (Score 1) 274

Mine is locked for now. I thought I would wait until I am a little closer to the end of my contract to take the risk of bricking it. I have only had it for a month, and do not want to experience the wrath of my wife when I explain to her that my Evo 4G is now a paperweight...

Comment Re:Kevin Mitnick ripoff? (Score 5, Informative) 114

Didn't Mitnick do this 8 years ago with Art of Deception. Even the title is sort of stolen. Is there anything new in here that hasn't already been written about by one of the world's greatest social engineers?

If you look closely at the front of the book, you will see a recommendation by Mitnick. Also, if you read the review, it explains how this is different from Mitnick's book.

"Two of the most popular books to date on social engineering to date have been Kevin Mitnick’s The Art of Deception: Controlling the Human Element of Security and The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. The difference between those books and Hadnagy, is that Mitnick for the most part details the events and stories around the attacks; while Hadnagy details the myriad specifics on how to carry out the social engineering attack. "

But, thanks for playing!

Slashdot Top Deals

What ever you want is going to cost a little more than it is worth. -- The Second Law Of Thermodynamics