Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:Adobe Flash security is extremely disappointing (Score 1) 286

> Can you explain how installing a second separate program improves security in the first? For intranet applications, it may make sense.
If your intranet does not use Flash, you can avoid rolling out Flash in your corporate network in the first place, thus reducing potential attack surface.
Of course, there is still YouTube, news sites, etc., so this is only applicable in highly restricted workplaces where users aren't supposed to complain about that.

Comment Adobe Flash security is extremely disappointing (Score 3, Informative) 286

Flash is now among the top attack vectors for Windows, and it isn't even covered by Windows Update.
There were 23 reported security issues in the last 2 years, including at least 4 browse-and-get-owned vulnerabilities.
In comparison, Silverlight has had no security bulletins since its 1.0 release (it's now at 3.0).
This may be just yet another reason to migrate to Silverlight, especially for intranet applications.

Submission + - Another Adobe Reader/Arobat/Flash 0day (washingtonpost.com)

tsu doh nimh writes: Tuesday it is investigating reports that attackers are exploiting a previously unknown security hole in its Acrobat, Flash and PDF Reader applications, The Washington Post reports. Adobe has apparently known about this flaw since December 2008, and attackers have been exploiting it since at least July 9.

Comment Re:Time Warner is already doing this in Brooklyn/N (Score 1) 281

Anything from an 6to4 address typically gets routed to (IPv4, protocol number 41), unless IPv6 is configured in a really weird way.
Since your ISP does not have their own router with the anycast address, *all* IPv6 traffic goes through one of their peers who advertises their route to
The actual destination IPv6 address doesn't matter (unless the destination is also a 6to4 address, in which case, the traffic is typically routed directly to the encoded IPv4 address instead of

Comment Re:Time Warner is already doing this in Brooklyn/N (Score 3, Informative) 281

That's because you are using an IPv6 address in the 6to4 address space, not a native IPv6 address.
And according to trace, your ISP doesn't have their own 6to4 router deployed, so the traffic gets sent to whoever announces the shortest route to route via BGP.
( is a special IP which means 'any 6to4 router')

Comment Re:Potential data recovery problems (Score 1) 196

This will only work if the drive doesn't do background 'scrubbing' to improve future write performance.
Or, even if the drive didn't erase physical Flash cells yet, it could already mangle the mapping between the logical and physical blocks.
In fact, I have a cheap CompactFlash card that does exactly that when you yank power from it while writing - the drive appears completely scrambled (with blocks reordered) when you restore power to it.

Comment Potential data recovery problems (Score 2, Interesting) 196

Something as simple as deleting the wrong partition becomes an irreversible operation if you do it using a tool that supports TRIM on TRIM-enabled hardware.
Even if you restore the partition table from a backup, you will likely suffer silent file system corruption, which may even not be apparent until it's too late.
If TRIM support is actually implemented on the device, the device is free to 'lose' data on TRIMmed blocks until they are written at least once.

Comment Re:Go IPV6 and leave DHCP in the dust (Score 1) 100

Even if you go IPv6, you still need to provide at least a NAT-ed IPv4 address or a transparent HTTP/DNS proxy.
And the 'transparent proxy' solution will break everything except HTTP, most notably, HTTPS.
You can communicate with IPv6 hosts from an IPv4 address (via 6to4 encapsulation).
But you cannot communicate with IPv4-only hosts using an IPv6 address without a proxy.

Comment Re:The ads were perfect for Vista (Score 1) 587

And finally, updatedb can be disabled easily -- and even if it couldn't, newer Ubuntus come with a version that only does partial sweeps

By the way, does Linux have disk I/O prioritization like Vista does, and is it enabled by default?
For example, Vista indexing service also generates a LOT of disk I/O, but it runs with 'background' I/O priority, and the impact on the disk response time is not nearly as significant as running an add-on indexing service for WinXP.
Most add-on indexing services for XP (Google, Windows Desktop Search) will stop indexing if the user is using the keyboard/mouse for exactly that reason (no way to prioritize I/O).


Submission + - Nintendo Wii Fully Exploited

Croakyvoice writes: The 24th Annual Chaos Communication Congress was the launchpad for the unveiling of the hacking of the Nintendo Wii via an exploit to allow homebrew to run in native Wii mode ( previously only Gamecube Homebrew was available on the Wii) which will allow access to the Wiimote, WiFi and SD Cart Slot. Tehskeen a Wii scene site has today posted an interview with the author of the exploit who has discussed the release to the public and linux amongst other things.

Submission + - Linux based phonesystem phones home (trixbox.org) 1

An anonymous reader writes: Users of Trixbox, a PBX based on Asterisk, discovered that the software has been calling home with their usage and statistics.
From the article:
"I have just been made aware of a file '/var/adm/bin/registry.pl' that contain the following commented lines describing the program:

# This file is design to be executed regularly by an external controller such as cron.
# It retrieves a list of commands to be executed from the specified URI and executes them, saving the output
# and returning it to the webserver as an encrypted string."

Trixbox is owned by Fonality, which makes customised PBXs (again based on asterisk) for paying customers and this is not the first time that Fonality has been called out for their data collection.

See http://voxilla.com/component/option,...emid,107/p,27/

Slashdot Top Deals

"In matters of principle, stand like a rock; in matters of taste, swim with the current." -- Thomas Jefferson