Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Munich Council Say Talk of LiMux Demise Is Greatly Exaggerated

benjymouse Re:NT is best (188 comments)

3 times this year MS has bricked my system with updates. I run a stock install from HP - the only software on the PC is Firefox, LO, Steam, and ARC. All 3 times it's corrupted my system hive. The first time I ended up re-installing, the last 2 times I've just replaced the hive.

There has not been a single update that corrupted the system hive. Never. Ever.

The system hive integrity is backed by multiple mechanisms. Firstly, Windows keeps 2 copies. Secondly, updates to the hive is protected by NTFS journaling. Thirdly, system hives are protected by system protection (on by default) which keeps previous versions using shadow copy service.

If your system hive has been corrupted you have serious hardware issues.

2 days ago

Munich Council Say Talk of LiMux Demise Is Greatly Exaggerated

benjymouse Re:NT is best (188 comments)

Haven't been paying attention lately have ya?

Last Black Tuesday fucked up a lot of users of New modern great Windows systems

Less than 0.01% of Windows users. That may be "a lot of users" in absolute terms - but it is certainly not the big failure you (and Infoworld - the tabloid of tech) make it out to be.

Did MS do a proper jon when testing the updates? no. Did they fail massively? no.

2 days ago

Munich Council Say Talk of LiMux Demise Is Greatly Exaggerated

benjymouse Re:NT is best (188 comments)

Wow, Ubuntu is behind the times.

Fedora can patch and dynamically replace the running kernel without a reboot.

BS. Fedora uses RPM, which is even worse at ensuring that patches become effective.

You are deluding yourself and confusing the fact that you are not instructed to reboot with reboot is not needed. Your complacency means that you processes lingers on in their vulnerable state. Fedora does not use ksplice (Oracle owns that now) and ksplice does depend on the patches being specifically prepared, anyway.

Not all patches require system reboot (same as on Windows). But patches that affect e.g. running network daemons do require a restart to become effective. I hope you are not responsible for administering production systems!

Ubuntu is just one distro of linux, if it is not doing what you want then try the others.

Oh - the universal answer: You are using the wrong distro. Love it. Deflect, avoid, goalposts shifting.

However, in this case (talking about Munich, remember?) they were using Ubuntu as base for Limux.

2 days ago

Munich Council Say Talk of LiMux Demise Is Greatly Exaggerated

benjymouse Re:NT is best (188 comments)

I still regularly get "need to upgrade reboots" on my Windows machine. It's atleast once a month and always seems to pop up when I'm playing a game of LoL or CS:Go.

Yes, I use my Windows as a Wintendo. Got a problem with that?

And I suppose that Linux is better?

Just this past month I can count several Linux vulnerabilities, the patch for which requires a reboot:

After a standard system update you need to reboot your computer to make
all the necessary changes.

The same goes for all of these:,,,,

For this one you have to restart your Unity session:

The security notices also includes a number of patches to library files. Under Linux you can replace (patch) a file even if it is loaded in a current process. However, the patches file will not take effect until said process has been restarted.

As far as I know, under Linux there is no automated process for this. Linux will not be able to patch an open LibreOffice Writer application if one of the libraries it uses are being patched. Writer will happily continue running unpatched.

Worse, you will not get a warning, and the running processes may have already loaded some libraries before the patch, and load a version of a library that is incompatible with the running process *after* the patch, simply because the OS/processes are not aware of patches. This leads to application crashes. I regularly experience crashes when I use LO on Ubuntu. Granted, I have Ubuntu installed as a VM and use it rarely, but that also means that there's typically *a lot* of patches waiting for me when I spin up the VM. Linux seems to handle patching libraries poorly and I am not aware of any system mechanism that tries to mitigate this problem.

Under Windows you have the Restart Manager. When a process load a DLL, it also locks the DLL file because it may just discard the memory where it is loaded, expecting to be able to load the exact same image later. Applications (such as Office) registers with the Restart Manager. If the Windows Updater needs to replace a locked DLL file, it looks to see if the processes that locks the DLL are all registered with the RM. If so, it can ask the registered application for their "state", restart the processes and inject the state into the processes when they come back up and registers with the RM. The RM also watches the locked files, and if the last lock that prevents a patch set (multiple files that should be replaced as part of an atomic transaction) is being released, the RM can kick of the file replace operation. This latter part is the reason why sometimes the "need to restart the system" badge disappears without a system restart.

The bottom line: Linux needs restarts/reboots just as Windows does. Sometimes you are deceived to believe that it has fewer restarts because Linux cannot by itself figure out that you *do* need to restart a process or the system. But that's actually worse because it leads to crashes.

2 days ago

Heartbleed To Blame For Community Health Systems Breach

benjymouse Re:Access restrictions (89 comments)

How does getting onto the VPN equate to accessing the secret stuff? Isn't there another layer of security?

The Heartbleed bug is an extremely serious information disclosure bug.

Via a simple attack the attackers can read the memory of the VPN appliance which holds the latest SSL keys, passwords, usernames, you name it. The attackers could potentially also have been able to read session identifiers and thus potentially bypass 2-factor auth even if it was in place.

Heartbleed will go over in the history as the most expensive bug of all times. It already is, and we have not seen the last of the consequences.

about a week ago

Munich Reverses Course, May Ditch Linux For Microsoft

benjymouse Re:Its the second one Re: Surprise? (578 comments)

MSFT is relocating regional headquarters and Munich is a front runner. Lots of potential tax revenue, both directly from MSFT and indirectly from the employees and spin off economic activity.

Selection of Munich would undoubtedly be contingent on the city migrating back. I dont believe any outright bribing was involved or required.

Two problems with your conspiracy theory:

1) The decision to move the HQ was made almost a year ago. Whether or not Munich converts back will not change the plans.
2) The HQ is already in the Munich area. The new HQ will be located apx 15 kilometers to the south of the current one.

Nice try, though.

about a week ago

Windows 8.1 Update Crippling PCs With BSOD, Microsoft Suggests You Roll Back

benjymouse Re:It's pretty hard to roll back automated updates (303 comments)

All fastboot does is skip a few bios checks (eg: fast memory scan instead of full). It will not effect anything else, unless you have a hardware fault which can be detected at BIOS post.

Wrong. Fastboot hibernates the kernel but not the userland processes. It depends on drivers being capable of quickly re-initializing hw devices, but what it does is it brings up the kernel from a hibernated image and skips most of the usual hardware detection and device initialization.

Rule number 1 = Dont use system restore
Rule number 2 = Dont use system restore
Rule number 3 = Google "Stop 0x0000000e" error code on your BSOD.
Rule number 4 = Remember the last thing you did before the BSOD started happening, reverse the process. Job fixed.

Really, really stupid advice. System restore has N previous versions of your driver setup. You can reliably go back in time for the operating system but retain any changes to user files. It is stupid to NOT use system restore. Whenever you install a new driver, the system *will* retain the old files, registry settings etc as shadow copies. It is a well-tested and stable way to go back in time with your os.

about two weeks ago

Windows 8.1 Update Crippling PCs With BSOD, Microsoft Suggests You Roll Back

benjymouse Re:Forget TFA (303 comments)

"If you do not have media, you should use the power button to restart your computer during the startup process three times. This should start the Windows Recovery Environment. "

Oh yeah, THAT's gotta be good for the hardware. Definite improvement over F8. Thanks Microsoft...

It is actually quite clever: If the system barks 3 times in a row when trying to start, the operating system *should* infer that something is preventing an orderly startup. In that case, dropping into the recovery console is a perfectly good choice.

NTFS has volume shadow copy on by default for the system drive. It records changes to the *system* (Windows/** and Program Files/**) and lets you roll back those changes without rolling back any user/data files.

So even if you f***** up so royally as to make the system unbootable (e.g. a bad disk driver), the system will boot into the recovery console with a minimal number of known "basic" drivers.

about two weeks ago

Ask Slashdot: How Dead Is Antivirus, Exactly?

benjymouse Re:Saw similar posts before the web existed (331 comments)

Java was supposed to be sandboxed entirely with zero chance of malware getting to anything other than it's own litter tray. Look how that turned out when it was seen as all too hard and compromises were made.

The big problem with Java is that it requires quite a bit of C "glue" code to interface with the underlying operating system. The glue code necessary is often quite complex too, since it has to contend with issues such as the VM rearranging objects (thus glue need to "pin" the objects), garbage collection using a mark-and-sweep (thus the glue code need to make sure objects do not "dissapear" during the call), strange memory layout, multithreading/cpu cache issues etc, etc.

So while from the Java developer things may look simple, copious amount of complex glue code is need with all the traditional opportunities for security bugs.

There are probably more explanations than how the language runtime integrates with the OS, but the comparable .NET Framework seems to fare *a lot* better

Then there's the opposite that was born stupid, things like Active-X from MS that were such a stupid idea that a librarian (not a programmer) was telling me how stupid it was before launch.

ActiveX controls on the web was a stupid idea. Faced with the threat of Java applets, Microsoft decided to take a sound (and efficient) binary standard from the OS and put it on the web. The big problem with ActiveX is that from the OS perspective (at least until Windows 7) it is but binary code executing under the user account.

Imagine a system where you do not have sufficient control over what a process can do (because it is binary code executing directly against the OS), so instead you try to limit who can use what binary code - and under which circumstances. But once the code executes it acts as part of the host process. That actually works until some sneaks in malicious binary code, or - more likely - someone finds a memory corruption bug or finds a way to use the binary code in ways not intended by the developer.

That is putting a lot of trust in 3rd party developers, trusting that they do not have malicious intent and that they are actually competent and that proper quality assurance processes are in place. That turned out to be a stupid thing to trust (contrary to popular belief there has been precious few vulnerabilities in the ActiveX implementation itself - it was always the ActiveX controls -mostly 3rd party - that had vulnerabilities).

However, the idea behind whitelisting ActiveX controls was not new. It had been tried before (albeit not on the 'net), with similar results in terms of vulnerabilities, exploits and system compromises. To this day SUID/setuid is the most stupid intentional security weakness in the *nix security model, simply because - like with ActiveX - the permission structure is otherwise not capable of meeting simple, legitimate requirements.

Then things like allowing execution of arbitrary code in images, another case of MS fucking up in a truly astonishing way

I believe you may be confusing something here. When there is a vulnerability where a jpeg can "execute arbitrary code" it is *not* intentional. It is usually down to a memory corruption bug (such as buffer overflow), i.e. it is *unintentional*. I don't believe MS has made any image format with intentional capability to execute arbitrary code. If you have information to the contrary, then please cite source.

If you are insinuating that it is only MS who can make mistakes in image processing code, you should tread carefully. Compared to the typical open source libraries (libxml, libtiff, libpng et al) MS has had precious *few* vulnerabilities.

The answer as always is to learn from the lessons of the past instead of throwing together a pile of bits that look software shaped and rushing it out the door.

Yes. But if you want to learn the right lessons you must be careful to perform an unbiased analysis. Otherwise your results will have absolutely zero value towards avoiding similar situations in the future. Your petty attempts at laying this at the door of MS is an example of this. If - in your mind - the problem is simply MS, then you are overlooking the real problems. Ask yourself this: Why is it that it is only MS who has not had a *major* bug in their SSL implementation? (hint: MS SDL outlaws the use of the exact C library functions that were behind Heartbleed, so MS actually has a process in place where they analyze previous vulns and improves the guidelines for future development so that they can avoid *similar* mistakes).

about two weeks ago

Microsoft Black Tuesday Patches Bring Blue Screens of Death

benjymouse Second that (179 comments)

Updates Win 8.1 x64 all patches. No problems.

about two weeks ago

Microsoft Black Tuesday Patches Bring Blue Screens of Death

benjymouse Re:The suck, it burns .... (179 comments)

On the other hand, Apple, Debian and Redhat manage to release timely security patches that don't cause crashing en-masse.

Perspective, please. This seems to be a *very* limited problem and an (as usual) over-zealous Woody Leonhard trying to stir up a controversy.

Infoworld *is* the fox news of tech.

about two weeks ago

Microsoft Surface Drowning?

benjymouse Surface Mini is the reason for the write-down (337 comments)

TFA - especially the headline - is grossly misleading click-bait.

The story behind the latest numbers are that Microsoft has taken a write-down on investment in development of the *Surface Mini*. They scrapped that device only days before launch. When you do that, you have to write off all sunk cost on design and development of that product line.

Thus, those accounting numbers say *nothing* about how Surface Pro 3 - or indeed how the Surface line in general is performing in the market. For all we know demand is good but not excellent.

Tablet sales are tanking and PC sales are climbing again. If customers start to view tablets as "not for real work" Surface Pro 3 could be *the* device which is a perfect combination (compromise?) of PC and tablet.

For all the ridicule, Windows 8 does in fact deliver on being both a tablet as well as a PC operating system. The problem was never the tablet part nor the PC part - the main problem (especially with 8.0) was the rather poor integration (and yes, the fact that they tried to funnel desktop users through the "tablet" part to pent up demand for apps and attract developers).

about two weeks ago

F-Secure: Xiaomi Smartphones Do Secretly Steal Your Data

benjymouse Re:So a non-denial denial (164 comments)

Has the F-Secure tried to, as article mentions, disable the Mi Cloud account? Probably not. Because it wouldn't have been in the news then.

I know this is slashdot, but if you start making claims about what is *not* in the article, could we at least expect you to look for it yourself?

F-Secure saw the communication even before they created a Mi cloud account.

The security company said that it took a brand new smartphone from the box with no prior set-up or cloud connect allowed. It then followed the following steps:

- Inserted SIM card
- Connected to WiFi
- Allowed the GPS location service
- Added a new contact into the phonebook
- Send and received an SMS and MMS message
- Made and received a phone call

"We saw that on startup, the phone sent the telco name to the server It also sent IMEI and phone number to the same server," F-Secure said.

I do not often say this on ./ but you're an idiot!

about three weeks ago

Leaked Docs Offer Win 8 Tip: FinFisher Spyware Can't Tap Skype's Metro App

benjymouse Re:Switch away from Skype and Windows (74 comments)

Oh, huh. SecureBoot isn't Palladium; it's some new-fanegaled UEFI feature.

It looks like you can insert new keys into the SecureBoot DB with dpkg-reconfigure secureboot-db in Ubuntu, so sufficient OS-level access should allow for bypassing SecureBoot in UEFI. This is a little easier than it was with the TPM, I guess.

No, not unless the OEM did *not* follow the specs. If they followed the UEFI specs this should not be possible.

On top op that, it is a specific requirement for "Designed for Windows 8 certification" that the keys cannot be manipulated from the operating system.

The only way to change the key store is through physical (like in at the keyboard) control of the UEFI firmware in the pre-boot "maintenance mode" *or* through a firmware upgrade. Firmware upgrades *must* be signed as well, so no, you can not use that avenue either.

OEMs who designs their system with UEFI will certainly make sure to meet those requirements.

about three weeks ago

Leaked Docs Offer Win 8 Tip: FinFisher Spyware Can't Tap Skype's Metro App

benjymouse Re:Switch away from Skype and Windows (74 comments)

Windows 8 Secure boot is a pretty flimsy facility that says 'yep, this code was blessed by microsoft'. It does nothing to vouch for whether the configuration leading up to or the configuration of the payload is what you actually want (e.g. a specific user expects they hve put in Windows 8, but instead Red Hat loading with malicious configuration would be a sort of misbehavior that SecureBoot does nothing for).

UEFI secure boot validates everything (configuration) until the boot-loader load. The boot-loader sits in signed cabinet files and the UEFI firmware will not load the boot-loader if the boot-loader cabinet files do not check out (invalid signature).

The boot-loader will check the operating system - Windows 8 - core before relinquishing control of the boot process to the OS. Windows 8 sits in signed cabinet files and the boot-loader will not boot the OS if the files have been tampered with (invalid signatures).

Right after the kernel has started - relying *only* on information from the signed cabinet files and signed kernel drivers (all drivers which load in kernel space in Windows 64 bit versions must be signed), the antivirus providers will be allowed to load. AV must *also* be signed by MS to be allowed to load at this stage. The AV can now control loading the rest of the OS. Still, any kernel level drivers *must* be signed.

You are correct that the boot-loader will also boot other signed OSes - like RH Linux and those *could* be used to start Win8 or some other OS in a VM and under control of the "signed" OS. You can bet that MS has requirements that the booting of non-Windows OS is obvious (something must happen at the screen clearly identifying the OS being booted).

But at the whole, UEFI Secure Boot along with Windows 8 signed boot-loader and OS is *very* hard to circumvent. I haven't heard of any successful attack yet. There was some spin on an attempt that did not use UEFI Secure Boot (it used BIOS).

about three weeks ago

Synolocker 0-Day Ransomware Puts NAS Files At Risk

benjymouse Re:This is how we learn (150 comments)

It should be attached to a network fire-walled off from the Internet and only accessible if you are on the local LAN.

But it is based on Linux, right? Why would it need to be fire-walled off from the Internet when so many Linux servers and appliances are on the Internet?

about three weeks ago

NFL Players To Use Tablet Computers During Games

benjymouse Re:Push vs pull (107 comments)

I guess that now that it's digitized, instead of stills, they'll get a video feed from the all-22 camera, and some way for the offensive coordinator, up above, to send bookmarks to the players on the side of the field.

It was a specific requirement from NFL that the tablets will *only* display stills. The tablets can be used instead of the present fax/photos. They actually have fax machines printing black/white images.

The NFL prohibits use of open tablets and other forms of technological gadgets at the sideline. The reason they give is that the team with the best *players* and team dynamics should win the game, not the team with the best *technology* (the reason why we don't like doping either: We want the best athlete to win, not the athlete with the best doctor).

Today the sideline photos are the only images the coaches and players are allowed to use during the match. The new tablets streamlines the delivery of those photos, nothing more.

The Surface tablets will be locked down with no 3rd party apps, no Internet connection and can only be used to view the same images as is already distributed using the fax devices. Specifically *no video* as that would create an unfair advantage for a team adopting the new tablets over a team which chooses to continue using the fax distribution.

about three weeks ago

Internet Explorer Vulnerabilities Increase 100%

benjymouse Microsoft is now counting Flash vulns as IE vulns (137 comments)

Microsoft patches to IE include patches to vulns in Flash - which is embedded in IE. The increase in vulnerabilities is the result of the horrible Flash code.

about a month ago

Exploiting Wildcards On Linux/Unix

benjymouse Re:in root? Am I missing something? (215 comments)

Er.. most of the exploits are only possible if one is root and/or the directory is writable for some other user (e.g. leon in this case).

Since one is root, one can do anything anyway so why bother with all this misdirection? If someone leaves world writable directories lying around (especially without the sticky bit set), then they deserve everything they get. Or is this some kind of "trap the (completely) unwary sysadmin" wake up call? If I see some strange named file (especially if I know I didn't put it there) I would investigate very, very carefully what is going on. I can't be alone in this - surely?

The point is that this can be used to trick a root user into issuing what he believes is a safe command. The combination of the text-reinterpreting shell and specially crafted file names combines into a seemingly innocent command ending up allowing the attacker (the creator of the specially crafted file) root access on the system.

It doesn't help that some (on the surface) idempotent commands like find packs a number of dangerous options that can be used to execute shell scripts, commands or remove files.

about 2 months ago

Exploiting Wildcards On Linux/Unix

benjymouse Re:PowerShell (215 comments)

Is the wildcard expanded by the shell in PowerShell?

No. This class of attacks will not work against PowerShell (nor for plain old DOS for that matter). The problem is the combination of text-centric shell scripting and shell expanded wildcards.

about 2 months ago



VLC threatens Secunia with legal action in row over vulnerability report

benjymouse benjymouse writes  |  about a year ago

benjymouse (756774) writes "Following a blog post by security company Secunia, VideoLAN (vendor of popular VLC media player) president Jean-Baptiste Kempf accuses Secunia of lying in a blob post titled More lies from Secunia. It seems that Secunia and Jean-Baptiste Kempf have different views on whether a serious vulnerability has been patched. At one point VLC threatened legal action unless Secunia updated their SA51464 security advisory to show the issue as patched. While Secunia changed the status pending their own investigation, they later reverted to "unpatched". Secunia claimed that they had PoC illustrating that the root issue still existed and 3rd party confirmation (an independent security researcher found the same issue and reported it to Secunia)."

Pwn2Own 2009: Safari, IE8 and Firefox all pwned!

benjymouse benjymouse writes  |  more than 5 years ago

benjymouse (756774) writes "In a matter of seconds, Charlie Miller, last years winner of the PWN2OWN contest did it again at CanSecWest and successfully exploited a fully patched Safari running on a Mac. He came prepared, directed the operator of the browser to browse to a rigged website and it was all over.

He took the $10.000 first prize and the macbook home with him.

Last year he was quoted as saying "Every time I look for [a flaw in Leopard] I find one. I can't say the same for Linux or Windows. I found the iPhone bug a year ago and that was a Safari bug as well. I've also found other bugs in QuickTime.".

As I wrote this submission news came in that all of IE8, Safari (again) and Firefox was pwned by a researcher going by the name "Nils". So far only Chrome remains standing.

These were all drive-by exploits against fully patched browsers, not 3rd party plugins. Be careful out there."

Vista Capable lawsuit loses class action status

benjymouse benjymouse writes  |  more than 5 years ago

benjymouse (756774) writes "In a big setback for plaintiffs, a federal judge has stripped the class-action status from the Vista Capable suit against Microsoft.

Computerworld writes

The consumers who brought the original lawsuit, and those who followed as members of the class action, will be free to continue their cases, but they will have to do it individually, not as a group, Pechman said. "Approximately one year ago, this Court certified a class in this matter and allowed Plaintiffs 'to further develop their price inflation theory'," Pechman said. "It is now apparent that class treatment is no longer appropriate."

"Dr. Leffler did not attempt any regression analysis, much less an econometric analysis of the impact of 'Vista Capable' on demand," Pechman said. "It is ... critical to Plaintiffs' theory of proof to isolate Microsoft's purportedly deceptive efforts to increase demand from promotions OEMs had in the run up to the holiday season."

Presumably the lawyers for plaintiffs were expecting a good chunk of the potential damages. This will make it much more costly and risky to retrieve such damages. Will this effectively spell the end of the suits, or will the lawyers press on? IANAL so I wouldn't know whether they can appeal this ruling or not."


Microsoft urges Windows users to shun Safari

benjymouse benjymouse writes  |  more than 6 years ago

benjymouse (756774) writes "The Register has picked up on a recent Microsoft security bulletin which urges Windows users to "restrict use of Safari as a web browser until an appropriate update is available from Microsoft and/or Apple". This controversy comes after Apple has officially refused to promise to do anything about the carpet bombing vulnerability in the Safari browser. Basically, Apple does not see unsolicited downloads of hundreds or even thousands of executable files to users' desktops as being a security problem.

The MS bulletin speaks of a possible "blended" attack. This is obviously recognizing that having the desktop carpet bombed with executable files does not imply that they can be executed. However, once the files are on the desktop all an attacker needs to do is to find some social engineering attack vector or a way to launch one or more of the files through some other vulnerability. At the very least it does not take much imagination to come up with scenarios where this vulnerability can be used by spammers or skiddies out to annoy users.

It is unprecendented for Microsoft to recommend Windows users to abstain from using a mainstream software product, especially a competing product. Could it be that Microsofts security response team have grown sensitive over Apple TV ads ridiculing Windows users over security while at the same time Apple software products, especially Quicktime, and now Safari threatening the security of those very same users? Surely the "Apple software updater" push of Safari haven't exactly earned them points in Redmond. Surely MSRT realizes that this may be controversial. Is this a "stab" back at Apple and/or a way to shine light on Apples own security problems?"

Netcraft: Microsoft IIS may soon overtake Apache

benjymouse benjymouse writes  |  about 7 years ago

benjymouse (756774) writes "From the latest Netcraft web server survey:
In the August 2007 survey we received responses from 127,961,479 sites, an increase of 2.3 million sites from last month. Microsoft continues to increase its web server market share, adding 2.6 million sites this month as Apache loses 991K hostnames. As a result, Windows improves its market share by 1.4% to 34.2%, while Apache slips by 1.7% to 48.4%. Microsoft's recent gains raise the prospect that Windows may soon challenge Apache's leadership position."


benjymouse has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>