Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Facebook

Teen Cancels Party After 200,000 RSVP On Facebook 191

autospa writes "An Australian teen who had to shut down an event page on Facebook after more than 200,000 people RSVP'd for her sweet 16 party now has more than 70,000 people signed up to attend her new party. The girl named Jess called police Monday to say her Facebook account had been hijacked after thousands said they'd attend her birthday party in Chatswood March 26."
Privacy

Submission + - Wireless network modded to see through walls (technologyreview.com) 1

KentuckyFC writes: "The way radio signals vary in a wireless network can reveal the movement of people behind closed doors, say researchers who have developed a technique called variance-based radio tomographic imaging which processes wireless signals to peer through walls. They've tested the idea with a 34-node wireless network using the IEEE 802.15.4 wireless protocol (the personal area network protocol employed by home automation services such as ZigBee). The researchers say that such a network could be easily distributed by the police or military wanting to determine what's going on inside a building. But such a network, which uses cheap off-the-shelf components, might also be easily deployed by your neighbor or anybody else wanting to monitor movements in your home."
Security

Submission + - Schneier: We need better un-authentication (threatpost.com)

Trailrunner7 writes: "Bruce Schenier writes on Threatpost.com: In computer security, a lot of effort is spent on the authentication problem. Whether it is passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are continually coming up with more complicated — and hopefully more secure — ways for you to prove you are who you say you are over the Internet. This is important stuff, as anyone with an online bank account or remote corporate network knows. But a lot less thought and work have gone into the other end of the problem: how do you tell the system on the other end of the line that you are no longer there? How do you unauthenticate yourself? My home computer requires me to log out or turn my computer off when I want to unauthenticate. This works for me because I know enough to do it, but lots of people just leave their computer on and running when they walk away. As a result, many office computers are left logged in when people go to lunch, or when they go home for the night. This, obviously, is a security vulnerability."

Submission + - Gameboy Color Boot ROM Dumped After 10 Years (fpgb.org)

An anonymous reader writes: Costis was able to dump the elusive boot ROM from the Gameboy Color by using various voltage and clock glitching tricks. The boot ROM is what initializes the Gameboy hardware, displays the "GAMEBOY" logo and animation, and makes the trademarked "cling!" sound effect. Even decapping the CPU had failed previously, but now the boot image and specifics on how it was dumped (along with many photos) are available for download at http://www.fpgb.org/
It's funny.  Laugh.

Submission + - The top ten off switches

Dan Jimbokla writes: CNET.co.uk has a truly funny and read-worthy article up about the top ten off switches. One of my favorite switches from the piece is #4 — The illuminated toggle switch: "This switch isn't designed for high-drain uses, typically it can only provide a maximum of 20 amps at 12 volts. That will make it suitable for a number of exciting uses though, and what it lacks in power handling, it makes up for in practicality. This switch will illuminate when the device it controls is turned on, and go off when the device is deactivated. This is logical and practical, and that has earned this switch a place in our hearts. What's more, it's far from expensive and there are even a choice of colours."
Privacy

Journal Journal: The Underground Internet

There has been a lot of talk in the recent years about surveillance, particularly with warrant-less wiretapping and the submission of ISPs to the federal heel. There exist privacy networks, decentralized, like the Tor network. There must be a way to create a decentralized shadow-net, to avoid the large corporate complicity that threatens most of the average users.
Security

Unofficial Patch For Windows URI Hole 85

dg2fer writes "For more than two months, the vulnerability of parsing URIs has been known for a number of Windows programs, including Outlook, Adobe Reader, IRC clients, and many more. Microsoft admitted the vulnerability only last week. The latest Microsoft patches published on October's Patch Tuesday did not include a solution, so hackers have taken on the problem themselves. One, KJK::Hyperion, has published (as open source) an unofficial patch that cleans up the critical parameters of URI system calls before calling the vulnerable Windows system function."

Slashdot Top Deals

"Most people would like to be delivered from temptation but would like it to keep in touch." -- Robert Orben

Working...