Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

The Largest Ship In the World Is Being Built In Korea

hAckz0r Finally big enough? (262 comments)

Is this one big enough to be a real Biblical ARK? Probably still not large enough to carry two of every species, but still fun to calculate how close it would come to that goal. I'm guessing (seat of the pants/armchair calculation) we are roughly about half the way there if we discount things like bacteria, fungi, and viruses (the actual majority of lifeforms on earth). Waste disposal would be one heck of a problem, and with only one window, to shovel it out, yikes!.

yesterday
top

Ask Slashdot: An Accurate Broadband Speed Test?

hAckz0r Android FCC Speed test (294 comments)

The FCC has an Android App that will test your data connections from your phone, and allows them to monitor your provider bandwidths. When your phone connects to your local WiFi the app is testing your Cable ISP, and when not, its testing your cellular ISP. In both cases the data is collected by the FCC to make sure your bandwidth is not being throttled unnecessarilly.

In theory the ISP's might look to see where your data is headed and make adjustments based on that, but that of course would be deceitful. No, they wouldn't do that would they?

about two weeks ago
top

What's Been the Best Linux Distro of 2014?

hAckz0r Qubes-OS.org (302 comments)

If you are into system security then check this one out. Security by hardware isolation is very hard to crack. Even the NIC and its kernel drivers live in its own VM and protects your system via IOMMU.

about two weeks ago
top

Why the FCC Will Probably Ignore the Public On Network Neutrality

hAckz0r Antitrust is not an emotional response (336 comments)

If you give Comcast the ability to become the gatekeeper to their competitors services you have crossed the line. This is not about emotions rather stifling the freemarket. At least change the equasion so that comcast charges the customer directly so the customer knows who is milking then and can then choose the lowest bidder of those services ( if there is one, but thats another problem). The customer is already paying for Internet services, and the costs of that service should be directly reflected in that price. Its dangerous to give the ISP the right to adjust the indirect costs of other businesses whos services are depending on that connection that is already paid for by the customers monthly fees. Allow this and Comcast will be able to kill off their direct competition.

about two weeks ago
top

Ask Slashdot: Is iOS 8 a Pig?

hAckz0r Re:Alright smart guy (504 comments)

I doesn't need to be *that* old, just not the latest model. It is a known fact, from a previous SD article, that older models slow down when a new iphone is released, which always coincides with a bright new shiny OS upgrade. If you upgrade the older hardware to keep up with the Jone's you are likely to have a slower phone,ipod, or ipad after you are done.

about a month ago
top

U2 and Apple Collaborate On 'Non-Piratable, Interactive Format For Music'

hAckz0r Re:Challenge accepted! (358 comments)

So true. At the end of the day it only takes a single copy of non-drm'ed music file to hit the street and all the Billions they spend to lock it down are wasted. Basic problem: You give the buyer the data, and you give them the key to read the data, and then ask them nicely (via leagal threats) to not put the two together in a way that is not authorized. Like that will ever happen. You only need one pissed off geek that can't play their newly purchased music to make it all worthless by providing a single download of that music file as a simple mp3. Hell, you can plug your speaker wires into another console to record it. Game over. I've personally never seen a system I couldn't break, but then I'm too honest to be that one pissed off geek. There are so many others out there that are not as honest.

What is the point to "interactive music" anyway. I like to listen to music, not hold a conversation with it. Why would I even want this? Its just a solution looking for a problem.

about a month ago
top

Ask Slashdot: How To Pick Up Astronomy and Physics As an Adult?

hAckz0r Resources (234 comments)

I have several suggestions from the things I do to stay on top of things. I have limited time to devote to my passion but there are things you can do to multitask.

Podcasts: pick up a used ipod and subscribe to the astronomy related podcasts.

Kindle: get a used kindle that has the bubble-type keyboard, and let it read books and papers to you. The keyboard lets you start/stop the reader without looking, for in the car use. Download Calibre application and convert online/document resources and copy them to the kindle. You are not stuck with just Amazon eBooks, but many of them are good.

When online use an RSS reader and connecty to the publications feeds: e.g. http://iopscience.iop.org/ http://arxiv.org/ http://www.physicsforums.com/ http://prl.aps.org/ http://phys.org/ http://physics.stackexchange.c... http://prd.aps.org/ and many blogs!

about a month ago
top

Comcast Allegedly Asking Customers to Stop Using Tor

hAckz0r From reading the service agreement (418 comments)

They can prevent you from allowing others to connect into a service you are providing. Public Tor servers (aka entry/exit nodes) would thus be against the user agreement and likely result in termination of services. Running the client portion should not run afoul of that agreement. (ianal)

They would first need to prove illegal activity is happening, and that would be difficult, but then there are known exploits for some Tor applications that can be used to leak data which can give away this kind of evedence of your activity. The question is, would they go through the trouble to inject these exploits into your system so that they can find out what you are doing? Like unsecured DNS, or injections of web bugs into your open http traffic. That sounds illegal to me, and a clear invasion of privacy. Privacy is exasctly the reason for using Tor in the first place, so don't expect those kinds of users to sit back and say nothing when terminated.

about a month ago
top

Mozilla Rolls Out Sponsored Tiles To Firefox Nightly's New Tab Page

hAckz0r First impressions.... (171 comments)

... count. The uptake of new users is going to decline big time. Established users will learn to deal with the changes, but new users will be turned off before learning how to turn all this off.

about 2 months ago
top

Processors and the Limits of Physics

hAckz0r What we need for efficiency (168 comments)

The human brain is a marvel of technology. Brain waves move through it as waves of activity. It only consumes (most) energy where the wave of intensified activity is passing through it. If a 3d circuit could be made to sense when a signal is incoming then it could be more efficient. In this paradigm its no 1's and 0's, but rather circuit on vs circuit off. In addition, if you could turn those on/off cycles into charge pump circuits then you could essentially recycle the a partial of that charge and reuse it in a casade like or layered circuit. I believe Sun Micro was working on one such design, but the cost benifits were not there at the time to make it to production. Things have changed.

about 2 months ago
top

US Army To Transport American Ebola Victim To Atlanta Hospital From Liberia

hAckz0r Re:What a bunch of pansies (409 comments)

So we should not worry that the CDC says it spreads by "close conversation (3 feet)"?

Somehow I do see that as a problem, even for a good hospital. lets hope they have a good containment center.

about 3 months ago
top

NASA Tests Microwave Space Drive

hAckz0r The paper... (201 comments)

Is useless drivel. Its a one page abstract that reads like a news media comentatry of the test. There are not even graphs of measurments taken, no specifics on the test setup. Nothing. Its not even Science by my definition. Lets move along, nothing to see here.

about 3 months ago
top

Verizon's Accidental Mea Culpa

hAckz0r Re:Answer needed (390 comments)

This is fine. If Verizon wants to increase *my* bill because of my bandwidth is higher, then you and I have no problem. I pay more for that bandwidth. That is an open market system. But that is based on my bandwidth usage and not by increasing the cost of a competitor. If I were instead downloading Gigabytes of anything else, again Verizon would have the right to charge *me* more money.

Charging Netflix money just to connect is anti-competitive, because both companies sell the same service, only one is the gatekeeper to the customer. If anyone gets charged more for my bandwidth it should be me, and only me. I then get to choose who I use to connect to the Internet. If Verizon raises my rate I have the right to go shopping. If they rise the rate for Netflix that is extortion, and Netflix doesn't get to go shopping for a better source of customers. it doesn't work that way, and there are laws against that sort of thing. Why Congress doesn't get it is a mystery to me.

about 3 months ago
top

Verizon's Accidental Mea Culpa

hAckz0r Re:Answer needed (390 comments)

How about because customers are paying them for Internet service, and going to Netflix is where they want to go? People don't want to pay for bad service do they? The real problem here is Verizon is a competitor to Netflix, and Verizon is not only being allowed to be anti-competitive but also hoping to get paid for it.

about 3 months ago
top

Cosmologists Show Negative Mass Could Exist In Our Universe

hAckz0r Re:We've observed and created antiparticles (214 comments)

No, I think the next step is likely that someone will 'mathematically prove' that you can have anti-energy or something cruft like that, to explain away Dark Energy. Where the word 'prove' actually means 'infer' from some magical fantasy land mathematical contortions. Once you divest yourself from the physical reality you can twist equations around to do many impossible things. Why so many people invent fantasy to try and explain away actual evidence is beyond me. At least with anti-matter we have actual evidence of it. We can create it, and experiment with it. Its physical.

You just can't do that with Dark Matter or Gravity waves, because they simply don't exist. General Relativity is thermodynamically incomplete as a theory and no amount of fantasy-like invention is going to compensate for an incorrect/incomplete theory.

about 3 months ago
top

Giant Crater Appears In Northern Siberia

hAckz0r Move along, nothing to see here... (122 comments)

Maxwel Smart agent 86 just prevented KAOS from turning their Super-laser on to the US Capital building last year. Unfortunately, as usual, he tripped over the power cord and spun the lazer around and blew a 40 meter hole in the USSR Siberian outback before his food tangled and pulled out the power cord. That incident of course caused a fair amount of damage and eventually forced the KAOS spaceship to perform an emergancy landing right behind the CONTROL building parking lot. Furtunatly 99 prevented Hyimie from repairing the craft which would have allowed the KAOS agents to excape. The Chief is in protracted negotiations with the Kremlin over the loss of the summer vacation home that was said to be on that property.

I'm guessing that less than 2% of you know probably what the heck I'm talking about here.

about 3 months ago
top

Researchers Find Evidence of How Higgs Particle Imparts Mass

hAckz0r Another giant leap? (91 comments)

By leap I mean assumptions, not 'getting ahead'. How does one go from proving that a Higgs CAN decay into fermions, in accordance to the math of the standard model, all the way to saying that the Higgs is responsible for creating mass in general? What is the proof of any connection here? Yes, a fermion will have some mass, but how do they manage to jump to the conclusion that the Higgs creates the mass of all particles? I've looked a the paper and still don't see any connection. Looks like another overly sensational headline to me.

about 3 months ago
top

Tractor Beam Created Using Water Waves

hAckz0r If we could only do this with space-time (71 comments)

Anti-gravity! But how does one perturb space-time? We can't even detect gravitational waves much less create them. I don't think we will solve this one overnight

about 3 months ago
top

Airbus Patents Windowless Cockpit That Would Increase Pilots' Field of View

hAckz0r Already been done before (468 comments)

The F-35 does the same video trick, the only difference is there is still a cockpit and the video is in the helmet not on a screen. It seems all you have to do is steal someone's idea and make a small modification and... Profit!!

about 3 months ago
top

NSA Considers Linux Journal Readers, Tor (And Linux?) Users "Extremists"

hAckz0r Is NSA being just a little Schizophrenic? (361 comments)

First they publish the SELinux security enhanced architecture for all of the Linux community to use, to be safely computing. A really great technology, and highly advisable.

.
Then they put all the people on the black list that might want to *read* about SELinux, or other technologies, before using it?

Come on, you either want people to be safe _from_ hackers (the bad guys) or arrest all the hackers (software engineers). Maybe someone needs to buy them a current dictionary including the many uses of the common word "hacker" and what it really means in which context?

about 4 months ago

Submissions

top

Say NO to software patents

hAckz0r hAckz0r writes  |  about 3 years ago

hAckz0r (989977) writes "The WhiteHouse.gov ( https://wwws.whitehouse.gov/petitions#!/petitions ) now has an online petition to stop the USPTO from issuing any more software patents. One must register first with the petition site, wait for the confirming email, login, then locate the "Open Petitions" menu to go to the list of petitions. Scroll down to the one called "Direct the Patent Office to Cease Issuing Software Patents", and then do what you think is right. They need 3,428 petitions total to make it meaningful, and has logged 1,572 as of my entry."
Link to Original Source
top

Finding Compromised/Malicious Source Code

hAckz0r hAckz0r writes  |  more than 6 years ago

hAckz0r (989977) writes "I am in the final phase of a research project software design which, believe it or not, intends to help locate embedded malicious logic in Mega-SLOC sized source code bases, and eventually even across multiple computer language linkages. This tool is intended to aid an analyst in finding things like back doors, Easter eggs, time bomb logic, or other undesired or malicious logic inserted into the source code. The design has been highly scrutinized, and the funding for the project is now looking imminent. Once all the final papers are signed, and it really happens, then it's straight from the frying pan into the fire for me. The educated nay-sayers will no doubt be quick to remind me that you can't prove a negative. I already know that fact all too well.

Ok, now on to the real question. In order to prove any real life viability in the final software implementation we will need to demonstrate its many capabilities against a set of real life threats. I could write my own tests but I feel like that would be like cheating. Compromised 'Open Source' projects would be an obvious choice for availability reasons, but the problem is that as soon as an OS project admin realizes that their software product has become compromised, it literally disappears off of the Internet, almost over night. Poof! Gone! The Fedora/Redhat OpenSSH compromise could be one such example. Anybody even seen any Fedora updates lately?

I can start by chasing down other repositories that cache rpm source and then do my own deltas, if they have not already pulled that deprecated version, but that is still timing dependent. Obtaining copies of even older exploits seems to be even more troublesome and very time consuming, especially if one has to actually contact the project owners directly to revive a specific deprecated version number.

So my questions to Slashdot are:

1)Is there a compromised source code repository I am not aware of? Hacks-R-Us maybe? If it were a simple virus or a rootkit this would be much easier!

2)If you had to identify and then find these older deprecated versions of source code (C/C++ for now, other languages to follow) how would you go about doing this collection efficiently? Is there a comprehensive list of hacked OS projects with version numbers? Closed source doesn't count if the source code is not obtainable.

3)What specific deprecated/exploited OS software packages would be most worthy of testing if you only had a short time line, say about two weeks to collect them in? What floats to the top of the list? The Linux Kernel hack no doubt would top my list, then OpenSSH *2

Thanks in advance for your consideration."

Journals

hAckz0r has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?