Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Securing a running laptop (Score -1) 2

While I was in a cube I actually locked my running laptop within a large metal filing cabinet and used it for RDC with no problems. The volume of air within the cabinet was sufficient enough that the air could circulate and be cooled by the metal exterior. Of course I was not running my CPU and disks at 100% for long periods of time. :-) If you boss is willing, why not purchase a small 3 U locking rack and put that in your cube. You could then use 1 U for your laptop and the rest of misc. storage. Sweet!

Submission + - 3.2 Billion Lost To Phishing in 2007 (

mrneutron2003 writes: "Gartner's latest survey into the realm of phishing attacks paints a rather bleak picture for 2007, with a record estimated loss of $3.2 Billion (that's Billion, with a B) U.S. Dollars. Overall loss per incident fell (to $886 from $1,244 lost on average in 2006) but the numbers of individuals who fell victim rose quite sharply from 2.3 Million in 2006 to a staggering 3.6 Million. Though online portals Paypal and eBay remained the most spoofed brands, it appears phishers are getting more creative utilizing fake electronic greetings cards, foreign businesses, and charitable organizations in their attacks on consumers. Furthermore these criminals are increasingly targeting debit card and banking credentials rather than credit cards, because the fraud protection mechanisms there are far weaker, according to a study done at The University of California at Berkeley."


Submission + - Judge:Man can't be forced to divulge passphrase ( 2

mytrip writes: "A federal judge in Vermont has ruled that prosecutors can't force a criminal defendant accused of having illegal images on his hard drive to divulge his PGP (Pretty Good Privacy) passphrase.

U.S. Magistrate Judge Jerome Niedermeier ruled that a man charged with transporting child pornography on his laptop across the Canadian border has a Fifth Amendment right not to turn over the passphrase to prosecutors. The Fifth Amendment protects the right to avoid self-incrimination.

Niedermeier tossed out a grand jury's subpoena that directed Sebastien Boucher to provide "any passwords" used with his Alienware laptop. "Compelling Boucher to enter the password forces him to produce evidence that could be used to incriminate him," the judge wrote in an order dated November 29 that went unnoticed until this week. "Producing the password, as if it were a key to a locked container, forces Boucher to produce the contents of his laptop."

Especially if this ruling is appealed, U.S. v. Boucher could become a landmark case. The question of whether a criminal defendant can be legally compelled to cough up his encryption passphrase remains an unsettled one, with law review articles for the last decade arguing the merits of either approach. (A U.S. Justice Department attorney wrote an article in 1996, for instance, titled "Compelled Production of Plaintext and Keys.")"


Submission + - The IRS Will Fax Your Life to Anyone Who Asks

An anonymous reader writes: Apparently, the IRS is more than happy to fax all your private tax information to anyone who calls up and knows a little bit about you. Identification not required. Really scary with all the identity theft going on. You should have to at least fax in an ID.

Is Shawn Fanning's Snocap melting? 93

newtley writes "Rumors are swirling about the pending demise of Napster creator Shawn Fanning's Snocap, says former CEO Michael Robertson. 'Articles mention a sale, but more likely it will be a shuttering and quiet bankruptcy,' he believes. 'Snocap represents a commonplace occurrence in the music business — an unprofitable retailer which withers and eventually dies.'"

Submission + - Facebook User Login Status Freely Available (

An anonymous reader writes: JavaScript hacker Kent Brewster found a glaring privacy hole in Facebook; the resulting exploit (live on his page) shows whether or not you're logged in:

"If your site contains a JavaScript file, any third party can use it by including it with a SCRIPT tag. If the JavaScript is dynamically generated depending on the client's request, you're publishing an API. If your API returns different results depending on the client's cookies, the site that calls the script will be able to glean information about the state of the current relationship between the client and your site. Case in point: Facebook."

Networking (Apple)

Submission + - SPAM: Why Commodore rejected Apple 25 years ago 1

alphadogg-networkworld writes: An Apple II PC being sold by Commodore International in 1982? It came very close to happening, but luckily for Apple, Commodore rejected the idea, instead going with its revolutionary Commodore 64. Apple was one of the companies that approached influential Commodore to sell PCs, Apple co-founder Steve Wozniak said during an energetic panel discussion to celebrate the 25th anniversary of the Commodore 64 PC, which took place at the Computer History Museum in Mountain View on Monday evening.
Link to Original Source

Submission + - DNS attack ushers in new era of Phishing 2.0 (

Bergkamp10 writes: Researchers at Google and the Georgia Institute of technology are studying a new virtually undetectable form of attack that exploits 'open recursive' DNS servers, which are used to tell computers how to find each other on the Internet by translating domain names like into numerical Internet Protocol addresses. Some 17 million open-recursive DNS servers are on the Internet, and unlike other DNS servers they answer all DNS lookup requests from any computer on the net, making them the perfect target for would be hackers and attackers. Criminals are apparently using these servers in tandem with new attack techniques to develop a generation 2.0 of phishing. Here's how an attack would work. A victim would visit a Web site or open a malicious attachment that would exploit a bug in his computer's software. Attackers would then change just one file in the Windows registry settings, telling the PC to go to the criminal's server for all DNS information. If the initial exploit code was not stopped by antivirus software, the attack would give attackers virtually undetectable control over the computer. Once they'd changed the Windows settings, the criminals could take victims to the correct Web sites most of the time, but then suddenly redirect them to phishing sites whenever they wanted — during an online banking session, for example. Because the attack is happening at the DNS level, anti-phishing software would not flag the phoney sites.

Submission + - Ohio caves to encryption after massive data breach ( 1

Lucas123 writes: "After a backup tape containing 106,821 pieces of sensitive information on Ohio residents and businesses was stolen from the car of a government intern in June, the state government just announced it has purchased 60,000 licenses of encryption software for state offices to use to protect data. Ohio's missing backup tape featured the names and Social Security numbers of 47,245 individuals; the names and Social Security numbers of 19,388 former state employees; and banking information on less than 100 businesses. It's estimate that the data loss will cost the state $3 million. In September, the state docked a state government official about a week of future vacation time for not ensuring that the data would be protected."

Submission + - Rogers Inserts Content Into Users' Webpages (

geekmansworld writes: It seems that Canadian ISP Rogers is inserting data into the HTTP streams returned by the websites requested by it's customers. Probably intended as a "feature", the unsolicited intrusion is nonetheless unsettling.
The Courts

Court Orders White House to Disclose Telecom Ties 147

rgiskard01 writes "Glenn Greenwald is reporting at on a win for the EFF, in the battle for clarity regarding the telecom surveillance scandal. A federal judge ordered the Bush administration yesterday to accede to the EFF's Freedom of Information Act request. Assuming the White House follows the court order, they would have to make public their lobbying ties to the telecoms industry. 'These disclosures will reveal ... which members of Congress McConnell and other Bush officials privately lobbied. As an argument of last resort, the administration even proposed disclosing these documents on December 31 so that -- as EFF pointed out -- the information would be available only after Congress passed the new FISA bill. The court rejected every administration claim as to why it should not have to disclose these records.'" Greenwald goes on to argue that the order should be leveled against Senators as well, to get a sense of who else is in Ma Bell's pocket.

The Secret to Raising Smart Kids 614

Hugh Pickens writes "Scientific American has an interesting article on the secret to raising smart kids that says that more than 30 years of scientific investigation suggests that an overemphasis on intellect or talent leaves people vulnerable to failure, fearful of challenges and unwilling to remedy their shortcomings. In particular, attributing poor performance to a lack of ability depresses motivation more than does the belief that lack of effort is to blame. One theory of what separates the two general classes of learners, helpless versus mastery-oriented, is that these different types of students not only explain their failures differently, but they also hold different "theories" of intelligence. The helpless ones believe that intelligence is a fixed trait: you have only a certain amount. Mistakes crack their self-confidence because they attribute errors to a lack of ability, which they feel powerless to change. Mastery-oriented children think intelligence is malleable and can be developed through education and hard work. Challenges are energizing rather than intimidating offering opportunities to learn."

Submission + - Google locates mobile phone users with cell towers ( 1

jbrodkin writes: "Google today launched a GPS-like service for smartphones that uses cell tower ID information to track the location of mobile phone users and direct them to nearby destinations. The technology, an extension of Google Maps, "takes information broadcast from cell towers and sifts it through Google-developed algorithms to approximate a user's current location on the map," Google says. Google seems to anticipate concerns from privacy rights advocates, and has promised not to associate location data with any personally identifiable information. This new mobile version of Google Maps is available in beta."

Submission + - 130 stolen laptops show lax security (

destinyland writes: ""The khaki bandit" posed as an office worker at several corporations and successfully stole over 130 laptops which he later sold on eBay. The ease of theft from the corporate offices (including FedEx and Burger King) shows just how bad corporate security can be. (In some cases, the career thief just walked into the office behind an employee with a security badge.) Two million laptops were stolen just in 2004, and of those 97 percent were never recovered. Ultimately it was the corporate headquarters of Outback Steakhouse who caught the thief with a bugged laptop that notified them when he re-connected it to the internet."

Submission + - Velociraptor had feathers (

Spy der Mann writes: "A new look at some old bones have shown that velociraptor, the dinosaur made famous in the movie Jurassic Park, had feathers. A paper describing the discovery, made by paleontologists at the American Museum of Natural History and the Field Museum of Natural History, appears in the Sept. 21 issue of the journal Science."

Slashdot Top Deals

Waste not, get your budget cut next year.