Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

NSA Says It Foiled Plot To Destroy US Economy Through Malware

Browzer Compared to badbios this is a piece of cake (698 comments)

http://it.slashdot.org/story/13/11/01/0120220/airgap-jumping-malware-may-use-ultrasonic-networking-to-communicate

Airgap-Jumping Malware May Use Ultrasonic Networking To Communicate

"Dan Goodwin writes at Ars Technica about a rootkit that seems straight out of a science-fiction thriller. According to security consultant Dragos Ruiu one day his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused and he also found that the machine could delete data and undo configuration changes with no prompting. Next a computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting and further investigation showed that multiple variants of Windows and Linux were also affected. But the story gets stranger still. Ruiu began observing encrypted data packets being sent to and from an infected laptop that had no obvious network connection with—but was in close proximity to—another badBIOS-infected computer. The packets were transmitted even when the laptop had its Wi-Fi and Bluetooth cards removed. Ruiu also disconnected the machine's power cord so it ran only on battery to rule out the possibility it was receiving signals over the electrical connection. Even then, forensic tools showed the packets continued to flow over the airgapped machine. Then, when Ruiu removed internal speaker and microphone connected to the airgapped machine, the packets suddenly stopped. With the speakers and mic intact, Ruiu said, the isolated computer seemed to be using the high-frequency connection to maintain the integrity of the badBIOS infection as he worked to dismantle software components the malware relied on. It's too early to say with confidence that what Ruiu has been observing is a USB-transmitted rootkit that can burrow into a computer's lowest levels and use it as a jumping off point to infect a variety of operating systems with malware that can't be detected. It's even harder to know for sure that infected systems are using high-frequency sounds to communicate with isolated machines. But after almost two weeks of online discussion, no one has been able to rule out these troubling scenarios, either. 'It looks like the state of the art in intrusion stuff is a lot more advanced than we assumed it was,' says Ruiu. 'The take-away from this is a lot of our forensic procedures are weak when faced with challenges like this. A lot of companies have to take a lot more care when they use forensic data if they're faced with sophisticated attackers.'"

about 9 months ago
top

Review: Puppet Vs. Chef Vs. Ansible Vs. Salt

Browzer Yeah Right (141 comments)

and two positives make it a negative :)

about 10 months ago
top

DARPA Begins Work On 100Gbps Wireless Tech With 120-mile Range

Browzer PROPOSERS’ DAY CONFERENCE FOR 100 Gb/s RF BA (83 comments)

This is actually a DARPA help wanted ad. And from description of the project sounds like a good job opportunity for some slashdoters.

here is the ad:
http://www.darpa.mil/NewsEvents/Releases/2012/12/14.aspx

and here is the proposers' day conference:
https://www.fbo.gov/index?s=opportunity&mode=form&id=e21984e31d49c3780966a53983daa4f6&tab=core&tabmode=list&=

about 2 years ago
top

Ask Slashdot: Server Room Toolbox?

Browzer Re:Time domain reflectometer. (416 comments)

in my case, poor/bad cables, especially the ones you buy, rather than ones you make, rank very low on things that actually happen. before I check the actual cable I do other things:

1. see if nic led is on, both on router and computer
2. ping the gateway
3. see if there was traffic on the nic
4. re-seat the cable, especially if plastic clip is missing - if that is the case I change the cable.
5. if distance is short, replace cable

had an interesting experience with a bad "connection". One summer the well pump, which is drilled inside the old stone well, 80 ft below ground, stopped working. The plumber comes, he climbs half way down the stone well in order to reach the well-cap, takes the entire pump+hose+wire (80ft) out, tests the pump, concludes that the pump is dead, replaces the pump, the wire (80ft), and makes a new water-tight connection. A year later the pump stops working again and I call the same plumber. My instinct was that the water-tight connection, 80 ft below ground, leaked, and made a short. The plumber comes, and rather than pulling out 80ft of pump to test the water-tight connection, the first thing he does is disconnect the pump from the mechanical fuse. And guess what... the mechanical fuse was bad. The fuse would trip even when there was nothing connected to it.

about 2 years ago
top

Ask Mark Shuttleworth Anything

Browzer touch screen vs keyboard & mouse interface (319 comments)

two parter:

1. Do you think the touch screen interface already the standard on phones and tablets will replace the traditional standard of keyboard & mouse interface on desktops/laptops in the next 5 years, 10 years, 20 years?

2. On a desktop/laptop, do you think a touch screen interface would be as functional/productive/efficient as keyboard & mouse?

thanks

about 2 years ago
top

Checkpoint of the Future Coming Soon To Airports

Browzer so no more free gropping... (373 comments)

i can see why the nerds might be upset.

more than 3 years ago
top

NATO Report Threatens To 'Persecute' Anonymous

Browzer "infiltrated and perpetrators persecuted.[37]" (388 comments)

from the NATO document: http://www.nato-pa.int/default.asp?SHORTCUT=2443

[37] Reducing Systemic Cybersecurity Risk, OECD/IFP Project on “Future Global Shocks”. ”. By Peter Sommer and Ian Brown. January 2011.

“Reducing Systemic Cybersecurity Risk”

http://www.oecd.org/dataoecd/57/44/46889922.pdf

I think the NATO paragraph is supposed to paraphrase this quote on p32:

"The main practical limitations to hacktivism are that the longer the attack persists the more likely it is that counter-measures are developed and put in place, perpetrators identified, and groups penetrated by law enforcement investigators."

more than 3 years ago
top

Ask Slashdot: Good Homeschool Curriculum For CS??

Browzer if you REALLY want CS emulate an HS that offers CS (364 comments)

here are the schools in NYC that match CS

http://search.nycenet.edu/search?q=%22computer+science%22&btnG=Search&client=default_frontend&output=xml_no_dtd&proxystylesheet=default_frontend&sort=date%3AD%3AL%3Ad1&entqr=0&oe=UTF-8&ie=UTF-8&ud=1&site=default_collection

Introduction to Computer Science (Section 01) @ The Bronx HS
http://www.bxscience.edu/apps/classes/show_class.jsp?classREC_ID=274057

the math page which includes the CS at Bronx HS
http://www.bxscience.edu/apps/pages/index.jsp?uREC_ID=3719&type=d

and the different match/cs course offered
http://www.bxscience.edu/apps/pages/index.jsp?uREC_ID=3719&type=d&termREC_ID=&pREC_ID=classes

more than 3 years ago
top

Ask Slashdot: Best Linux Distro For Computational Cluster?

Browzer Re:Scientific Linux (264 comments)

care to provide a link to that "informative" claim, and please don't say OpenAFS.

thanks

more than 3 years ago
top

Red Hat Nears $1 Billion In Revenues, Closing Door On Clones

Browzer Speaking of RHEL clone... (201 comments)

just found out a new RHEL clone (thanks to distrowatch.com News 03.21.2011) - PUIAS http://puias.math.ias.edu/ is an RHEL clone "... started long before CentOS or other projects were available."

The question is: if CentOS fizzles for whatever reasons, how many will switch to one of the less than 5, one-man-show RHEL clone, how many will dig in and pay for RHEL, and how many will switch to non-RHEL?

more than 3 years ago
top

What Pinball Looks Like When the Stakes Are High

Browzer Re:Monitor (133 comments)

At least in Firefox, "Zoom Out" is also an option.

more than 4 years ago
top

More Gas Station Credit-Card Skimmers

Browzer miniscule Man in the Middle attack (251 comments)

A link http://www.networkworld.com/community/blog/newest-attack-your-credit-card-atm-shims?t51hb&hpg1=mp in the original story, entitled "Newest Attack on your Credit Card: ATM Shims" has some interesting information:

"The shim needs to be extremely thin and flexible. In fact it must be less than 0.1mm"

"The shim is inserted using a "carrier card" that holds the shim, inserts it into the card slot and locks it into place on the internal reader contacts."

"Once inserted, the shim is not visible from the outside of the machine. The shim then performs a man-in-the-middle attack between an inserted credit card and the circuit board of the ATM machine."

"flexible shims are recently being mass produced and widely used in certain parts of Europe"

"Diebold released five new anit-skimming protection levels for its ATM devices june 1st 2010...Unfortunately, none of these helps with the shim skimming attack. That problem has yet to be solved mechanically yet."

more than 4 years ago
top

Network Adapter Keeps Talking While a PC Is Asleep

Browzer Re-Post - USB-Based NIC Torrents... 04.27.09 (188 comments)

http://tech.slashdot.org/article.pl?sid=09/04/27/2310234

and my comment to the first story: http://slashdot.org/comments.pl?sid=1213805&cid=27741803

I'm guessing the inventor's statistics "In the office environment, 52% of respondents left their machines on for remote access, and 35% did so to support applications running in the background, of which e-mail and IM were most popular (47%)." are still true.

http://mesl.ucsd.edu/yuvraj/research/documents/Somniloquy-NSDI09-Yuvraj-Agarwal.pdf

more than 5 years ago
top

Is Linux's "Overall Market Share" Statistic Meaningful?

Browzer Statistical significance (300 comments)

http://en.wikipedia.org/wiki/Statistically_significant>

"In statistics, a result is called statistically significant if it is unlikely to have occurred by chance. "A statistically significant difference" simply means there is statistical evidence that there is a difference; it does not mean the difference is necessarily large, important, or significant in the common meaning of the word....

The significance level is usually represented by the Greek symbol, (alpha). Popular levels of significance are 5%, 1% and 0.1%. If a test of significance gives a p-value lower than the -level, the null hypothesis is rejected...."

more than 5 years ago

Submissions

Browzer hasn't submitted any stories.

Journals

Browzer has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?