×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

To Stop BEAST, Mozilla Developer Proposes Blocking Java Framework

bl8n8r Java has a socially engineered stigma (309 comments)

Microsoft wanted to kill java back in the 90's and the only way they could do it was with FUD. This is the biggest reason Java got such a bad rap. Looks like most of you were too young to remember though.

" Sun said Microsoft was trying to undermine the credibility of the
Java language by presenting a crippled brand of Java applications that
run only on the Windows platform. "

http://www.ibiblio.org/pjones/jomc191-97/talk/msg00064.html

more than 3 years ago
top

Ask Slashdot: Good Homeschool Curriculum For CS??

bl8n8r carnegie mellon or MIT (364 comments)

both places offer online courses. perhaps your mom can glean some direction from them.

http://oli.web.cmu.edu/openlearning/
http://ocw.mit.edu/courses/

more than 3 years ago
top

Pentagon Says Cyberattacks Can Count As Act of War

bl8n8r No reliable way to pinpoint the attacker (282 comments)

So.... a compromised rack of servers in Michigan will get you a nice missle strike?  No thanks. IPs can be spoofed, connection logs tampered with and tracks covered up.  It sounds like another "Gee we didn't check our data close enough" scenarios waiting to happen.

It would take the likes of a forensic expert who is a cross between Columbo, Chuck Norris and Bruce Schneier in order to have any credibility to base an act of war on and that person would not be working at SAIC, NSA or the Pentagon.  That person is the one who pwned you.

What you end up with is the mess that Iran is in right now.  They want to be plenty pissed at Israel and the US, so it's very easy for someone to put whatever they want in their server logs and point a finger. You want to go to war with that info?

more than 3 years ago
top

Is Bill Gates the Cure For What Ails Microsoft?

bl8n8r He won't be back; M$ has jumped the shark. (337 comments)

WIth Linux and Unix variants (Apple, Android, Ubuntu) spreading out into the desktop space Microsoft's #1 main market share tool is gone. Lock-in.

Tool #2 is to buy-up the competition and kill it (Skype for Asterisk) thereby eliminating the possibility of any alternatives disrupting the Microsoft market space. This doesn't work so well with Open Source software. But that hasn't stopped M$ from trying.

Tool #3 is to FUD,FUD,FUD the bejeezes out of the competition until a false sense of reality is created/believed. This works well with FOSS and is the tack M$ has taken with regards to FOSS but they have not succesfully killed it off yet.

Microsoft has been an empire built on what ought to be illegal business tactics and it's *FINALLY* folding in on itself. Gates will not be back, at least publicly. He won't want to be at the helm when the place finally goes under in the next 5 years.

more than 3 years ago
top

Activists Destroy Scientific GMO Experiment

bl8n8r Monsanto started out the same way (1229 comments)

Let's do some research to develop an resistent strain of . It will be a boon for food crop. .....20 years later farmers are getting sued* by Monsanto because the bees decided to pollenate non-Monsanto crops with Monsanto pollen.

Maybe the people trashing the field were protecting their future food supply from a corrupt legal system.

[*] - http://foodchronicles.blogspot.com/2007/01/monsanto-problem.html

more than 3 years ago
top

RadioShack Trying To Return To Its DIY Roots

bl8n8r RS demise seems inevitable (413 comments)

Too bad, but they've jumped the shark. I used to spend more time in RS than I did in school, but they turned into a cell phone and overpriced-computer-component shop. Don't know how they are going to pull anything together out of that to ressurect what they once were.

more than 3 years ago
top

New Book Reports Soviets Behind Roswell UFO Scare

bl8n8r The truth will never be known (135 comments)

No matter how many people speak out the "truth", there have been so many wildly different stories and claims that everything automatically gets tagged as bullshit in everyone's mind.

more than 3 years ago
top

DNS Heavyweights Raise Concern Over DNS Filtering

bl8n8r just use /etc/hosts (129 comments)

Cool thing is, you can refer to everything on the internet with your own naming convention.

for foo in `seq 0 255`; do
   for bar in `seq 0 255`; do
      for bin in `seq 0 255`; do
         for baz in `seq 0 255`; do
            echo "$foo.$bar.$bin.$baz    www${RANDOM}";  >> /etc/hosts
          done
        done
     done
  done

more than 2 years ago
top

China Alleged To Use Prisoners In Lucrative Internet Gaming

bl8n8r FTFY (313 comments)

They still have to answer to Apple when China's projects are not being completed with slave labor.

more than 3 years ago
top

Users Want Matte LCDs While Glossy Screens Dominate

bl8n8r Sandpaper works great (666 comments)

I find that 600 grit carbide emery cloth works great to reduce the glare.  -BOFH

more than 3 years ago
top

PLA Develops First Person Shooter With US Troops as Targets

bl8n8r Re:Not surprising (395 comments)

> nor are they used as training tools for actual soldiers.

Not quite. Watch the movie in TFA.

Personally, I don't care who's shooting who in the game. The intent behind the creation of the game would be more of a concern.

more than 3 years ago
top

Ask Slashdot: Android Security Practices?

bl8n8r Write your own apps (173 comments)

Seriously. The android SDK is free, Eclipse is free. There's no monetary risk involved to experiement and see if you like doing it.

I screwed around with it for a month off-and-on doing all the tutorial programs on developer.android.com and by the time I was done, it made a lot more sense. I made extensive use of stackoverflow.com too. Good resource there.

If developing isn't for you, there are indeed open source style apps out there. A little bit of googling can find out if they are legit, or if the source is indeed available.

more than 3 years ago
top

TI vs. Calculator Hobbyists, the Next Round

bl8n8r TI - what a bunch of douches (301 comments)

Sounds to me like TI is run by a bunch of ego-maniacal Texan control-freaks with typical ego-maniacal control freak personalities. I mean it's not like a pocket calculator is even that *relevant* anymore. Christ, bc on the unix command line can practically do everything your basic TI can do. For everything else there's your basic run-of-the-mill desktop calculator. Seems like TI should be focusing on how to stay alive, rather than frustrate it's users. I don't understand how they are even in business.

more than 3 years ago
top

Siemens SCADA Hacking Talk Pulled From TakeDownCon

bl8n8r "shh, don't tell" is pointless (104 comments)

The people you don't want to know about this stuff, already know. The only reason Siemens or others don't want the info made public is to save face.

more than 3 years ago
top

CDC Warns of Zombie Apocalypse

bl8n8r Um... taxpayer money went into this? (300 comments)

A tweet is one thing. An entire blog seems a bit over-the-top for dicking-off. Especially in these times.

more than 3 years ago

Submissions

top

Multi-platform virus attacks win,linux,osx

bl8n8r bl8n8r writes  |  more than 3 years ago

bl8n8r (649187) writes "Written in Java, Trojan.Jnanabot attacks Macintosh and Linux machines, not just Windows PCs. Once installed, the trojan components are stored in an invisible folder and use strong encryption to keep communications private. Once infected, the bot communicates through IRC. Of note, of the infected platforms, the trojan was not able to survive a reboot on Linux."
Link to Original Source
top

Forbes Interview With Julian Assange

bl8n8r bl8n8r writes  |  more than 3 years ago

bl8n8r (649187) writes "Forbes interviews the man behind Wikileaks: Julian Assange. In the interview, Assange states he has upcoming leaks concerning a certain U.S. Bank along with Industrial Espionage, BP and Tech. Industry scandals. When asked about what Assange gets out of it, his reply was: "It’s tremendously satisfying work to see reforms being engaged in and stimulating those reforms. To see opportunists and abusers brought to account." Sounds good to me."
Link to Original Source
top

Mystery of the Dying Bees (update)

bl8n8r bl8n8r writes  |  more than 4 years ago

bl8n8r (649187) writes "As previously posted on Slashdot, the mysterious deaths of honeybee colonies across the globe had apparenlty been solved by Dr. Jerry Bromenshenk. An update to this however reports Bromenshenk took un-disclosed research grants from Bayer but says the money did not go to this project or influence its findings (Bayer makes pesticides that some beekeepers and researchers have cited as a possible cause of colony collapse). Surprise."
Link to Original Source
top

Native code execution in the Browser?

bl8n8r bl8n8r writes  |  more than 4 years ago

bl8n8r (649187) writes "If you've ever done a security audit, Active X is one of those things that make a CSO shiver. Letting a web browser mindlessly execute code off the web is, from a security standpoint, like locking the fox in the chicken coop so he can't eat the ducks — yet people still do it. "What?" you say. Enter Google Chrome. An article I ran across this morning caught my eye: Mozilla: Our browser will not run native code. It seems that google is, or has, put capabilities into Google Chrome which will allow the browser to directly run OS code from the web, on your computer. This is apparently old news as google has mentioned this back in 2008 citing it as "...a technology that aims to give web developers access to the full power of the client's CPU...". The mozilla foundation sounds understandably vehement about this technology claiming "These native apps are just little black boxes in a webpage. That's not something we're pursuing. We really believe in HTML, and this is where we want to focus". How can anyone think native code in a web browser is a good idea? Haven't we learned anything in the last 15 years? Who wants or needs this? I find it hard to believe with all the trojans, malware, botnets and anti-virus software out there, that this kind of technology is somethng I want in the enterprise let alone at home."
Link to Original Source
top

Philadelphia school spy program clicks more kids

bl8n8r bl8n8r writes  |  more than 4 years ago

bl8n8r (649187) writes "A Philadelphia school was busted spying on kids over the webcam of their macintosh laptops. Initially, one kid was confronted over what the school thought was drug use when they saw him eating candy. Now it's come to light that the school may taken more than 400 pics of the kid, some while partially dressed. The school has not produced a head count yet on the number of kids they may have taken pictures of: "Thousands of webcam pictures and screenshots have been taken of numerous other students in their homes, many of which never reported their laptops lost or missing," One of the administrators involved with the image capturing was quoted in an email saying "I know, I love it!" when mentioning the images captured where a "little soap opera""
Link to Original Source
top

Oracle declares remote java exploit low priority

bl8n8r bl8n8r writes  |  more than 4 years ago

bl8n8r (649187) writes "No fix in the near future for java as Oracle decices a remote code execution exploit is a low-priority fix (wonder what a high priority one is..). Malicious websites can pass parameters to various java components to execute code client-side. Security researcher Tavis Ormandy said he alerted Oracle's java division to the threat but "they informed me they do not consider this vulnerability to be of high enough priority to break their quarterly patch cycle". And no, the exploit is not just limited to windows."
Link to Original Source
top

No javascript needed for new Adobe exploits

bl8n8r bl8n8r writes  |  more than 4 years ago

bl8n8r (649187) writes "More woes for Adobe as security firm creates proof of concept attack which injects malicious code as part of the update process. The user only needs to click a dialog box to execute the code and no javascript is needed to launch the exploit. The exploit affects Foxit as well as Adobe Acrobat software. This exploit is made possible through the host software allowing execution of system binaries. Not clear if it's multiplatform, but seems plausible."
Link to Original Source
top

Firefox exploit targets IRC

bl8n8r bl8n8r writes  |  more than 4 years ago

bl8n8r (649187) writes "Theoretical postulations lead to a real time exploit of the popular Firefox web browser as unwitting users click up havoc for IRC channels on Freenode. "It's the first time I've actually seen it used in the wild," states acclaimed Web security expert Robert "RSnake" Hansen. The bug apparently causes trouble when users click malicious links. Freenode has more here, (which is *not* a malicious link. No, really it's not. Click, click.. c'mon, you know you want to): http://blog.freenode.net/2010/01/javascript-spam"
Link to Original Source
top

Virtualbox 3.0 announces opengl/Direct3D support

bl8n8r bl8n8r writes  |  more than 5 years ago

bl8n8r writes "Apparently, Virtualbox 3.0 released today (2009-07-01) brings with it "OpenGL 2.0 for Windows, Linux and Solaris guests; and experimental support for Direct3D 8/9 applications on Windows guests." Maybe we can finally game in a VM?"
Link to Original Source
top

Undetectable Trojan Still Going

bl8n8r bl8n8r writes  |  about 6 years ago

bl8n8r writes "Still going strong since 2006, this MBR infector has compromised more than a half-million financial accounts in less than three years. An HTML injection engine adds fields to login pages to compromise credentials. Injection is triggered by the web addresses. In all, the trojan has infected at least 300,000 Windows machines and stolen 270,000 online banking account numbers and 240,000 credit and debit credentials in less than three years."
Link to Original Source
top

Samba, Microsoft and the *pffff* agreement

bl8n8r bl8n8r writes  |  more than 6 years ago

bl8n8r writes "The agreement is, at its heart, a non-disclosure agreement (NDA). The PFIF is agreeing not to disclose certain confidential information, while Microsoft is agreeing to provide technical documentation which can be used to help build an implementation of the WSPP protocols.

The Samba Team has for a long time put a lot of effort into ensuring that we don't infringe any patents. I have spent countless hours talking to patent attorneys, and analysing patents to ensure we don't infringe. The problem is that the number of patents we have to analyse is unbounded. We have generally found it isn't too much of a problem to avoid infringement of patents that we know about, but what about patents that we don't know about? — Andrew Tridgell"

Link to Original Source
top

15% of United States Workforce Routinely Drunk

bl8n8r bl8n8r writes  |  more than 7 years ago

bl8n8r writes "According to an article based on research conducted by the University of Buffalo, Alcohol use and impairment at work is a problem for 15% of the U.S. workforce (19.2 million people). Not surprisingly, Among the broad group of occupations with the highest rate of use were the management and sales occupations with grounds maintenance pulling in an honorable mention. Perhaps the next interview will go better if you bring along some Crown Royal"
Link to Original Source
top

Monster.com malware tags another site

bl8n8r bl8n8r writes  |  more than 7 years ago

bl8n8r writes "The first wave of problems for Monster.com came in the form of malware as recruiters clulessly pointed trojaned Windows systems into Monster's database. The incident reportedly gleaned more than 1.6 million records from the job search site's database. The second incident followed two days later in the form of an infected Monster.com server pharming out malware by way of advertisements hosted on it's websites. The latest incident now shows jobseekers using USAJobs are also at risk from the pharmed Monster trojan. The worst part is Monster.com seems to shrug it off with: "As is the case with many companies that maintain large databases of information, Monster is from time to time subject to illegal attempts to extract information from its database. Despite ongoing analysis, the scope of this illegal activity is impossible to pinpoint,". Given the obvious value of the Monster.com assets and most likely security implementations, why is this such a big problem? How can it be fixed?"
Link to Original Source
top

Dell laptops still exploding

bl8n8r bl8n8r writes  |  more than 7 years ago

bl8n8r writes "It "looked like fireworks which would have been cool had it not been in my house." said Doug Brown of Columbus, Ohio. Brown, a Network Administrator, called 911 last week when the Dell 9200 laptop burst into flames in his house. Emergency response units included two pumpers, a ladder truck, a bamalance, the HAZMAT unit, and a battalion chief. When Doug phoned Dell to inquire about liability, he was asked if he had insurance. It's not clear if Doug's laptop is one of the earlier models recalled by Dell; a Macbook is cited in TFA for allegedly burning down a house in Australia as well as another instance of a suspect Dell laptop burning down a pickup truck in Nevada. If the burning battery issues are going to continue to be a problem, who's going to be responsible for losses? Insurance companies, Laptop makers, Battery vendors, and consumer negligence could presumably be cited in all cases."
Link to Original Source
top

Apple to disable UPnP IGD over worm concern

bl8n8r bl8n8r writes  |  more than 7 years ago

bl8n8r (649187) writes "When InfoSec Sellout made wide-mouthed claims of a proof-of-concept worm (Rape.osx) a lot of heated arguments and drama ensued in the Apple community. There have been death threats as well as well as an "accidental" deletion of their blog. There now appears to be a Apple fix in the works to update mDNSresponder to "addresses a vulnerability that can be exploited by an attacker on the local network to gain a denial of service or arbitrary code execution condition.""
Link to Original Source
top

Judge rules against NSA wiretapping

bl8n8r bl8n8r writes  |  more than 7 years ago

bl8n8r writes "The Bush administration's attempts to change US wiretapping laws has apparently been biotchslapped in the FISA (Foreign Intelligence Surveillance Act) secret court. FTFA: "Mike McConnell this spring began urging Congress to pass an emergency "fix" that would clarify and specifically grant the NSA authority to tap switches based in the United States without review by the FISA court". There has been, for some reason, a push within the Republican circle to persuade congress to rush through an expanded evesdropping measure before August recess (end of the week). So, how does this affect the elephant-in-the-living-room at the San Francisco switching center. in downtown USA?"
Link to Original Source
top

SAIC acknowledges possible data compromise

bl8n8r bl8n8r writes  |  more than 7 years ago

bl8n8r writes ""Information that could include combinations of names, addresses, Social Security numbers, birth dates, and/or limited health information" was stored on a "non-secure server" SAIC server at a small SAIC location, and in some cases was transmitted over the Internet in an unencrypted form. Personal information of certain uniformed service members, family members and others was placed at risk for potential compromise while being processed by SAIC under several health care data contracts for military service customers, the company said today. "We deeply regret this security failure and I want to extend our apologies to those affected by it," Chairman and CEO Ken Dahlberg said. I guess SAIC stands for Security Aint In the Contract? Smells like anonymous ftp again"
Link to Original Source
top

Boeing gets contract for truck-mounted lasers guns

bl8n8r bl8n8r writes  |  more than 7 years ago

bl8n8r writes "Boeing has announced a contract with the United State's Army to develop laser cannons which are to be mounted atop trucks for the purpose shooting down incoming artillery, rockets, mortars or bombs. The High Energy Laser Technology Demonstrator (HELTD) project actually shoots stuff instead of just painting a mark on a target for other guidance systems. The intent is for shooting enemy projectiles out of the sky before they can reach their target, but I presume it could have other uses too."
Link to Original Source
top

Macbook mysteriously burns up power cord

bl8n8r bl8n8r writes  |  more than 7 years ago

bl8n8r (649187) writes "Looks like that Macbook may be a hotter commodity than originally planned. A series of ill fated software and hardware malfunctions, and attempts to resolve the issues with Apple support, leaves the user with burn marks and a melted power cord.
"I looked at the laptop and smoke was coming from the MagSafe power cord where it was inserted into the laptop. I screamed. The cord crackled and started to melt.""

Journals

bl8n8r has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?