Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - AMD FX CPU Reviews (

I.M.O.G. writes: "Today AMD lifted embargo on their most recent desktop AMD FX architecture, code named Bulldozer, whose CPU frequency record Slashdot recently covered. The fruition of 6 years of AMD R&D, this new chip architecture is the most significant news out of AMD since the Phenom II made its debut. The chips are available now in all major retail outlets and top tier hardware sites have published the first Bulldozer reviews already. Without spoiling the news, expect a mixed bag of opinions."

Submission + - Remotely Hacking Cars (

An anonymous reader writes: TheTruthAboutCars blogs about a new paper from security researchers at UC San Diego and the University of Washington that demonstrates multiple ways in which a car can be remotely taken over (technical details here). The paper is pretty amazing in general, but they drop the bomb when they take over a car 1000 miles away just by calling it through the car's built-in cell phone interface, upload an IRC client for control (I kid you not! Can you say "car botnet"?) and then track the car via GPS and listen in to everything that is being said inside. James Bond eat your heart out!

Submission + - WPA/WPA2 Cracking with CPUs, GPUs, and the Cloud (

wintertargeter writes: Yeah, it's another article on security, but this time we finally get a complete picture. Tom's Hardware looks at WPA/WPA2 brute-force cracking with CPUs, GPUs, and Amazon's Nvidia Tesla-based EC2 cloud servers.

Verdict? WPA/WPA2 is pretty damn secure. Now to wait for a side-channel attack. Sigh....

Comment Re:Umm... (Score 1) 128

Wow you really know nothing about encryption. Sigh.. Everyone is an expert. Zdnet looked at ighashgpu that's unsalted password decryption when you already have a precomputed hash table. TH looked at salted password decryption where you have to perform a SHA-1 transformation invocation thousands of times per every password attempt.

Comment Re:So.... (Score 1) 128

rainbow tables only work on unsalted passwords. These were used by microsoft for 'lan' style passwords. IIRC, vista and win7 don't use these. And if you use a 14 character password or longer, even windows xp disables the lan encryption. Your rainbow tables are effectively useless against aes-128, aes-256, and even des. They simply precompute password hashes, and generating the tables takes quite a long time. Using rainbow tables has nothing to do with gpu acceleration.

Comment Re:Umm... (Score 2) 128

No. Zdnet used ighashgpu. That's a hash cracker. WinZip and WinRAR encyption is different because it's based on precomputed password hashes. It looks like TH used AccentZip and AccentWinRAR to decrypt passwords.All three programs are created by Ivan Golubev. His blog is full of posts on cryptography performance.

Slashdot Top Deals

Like punning, programming is a play on words.