Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Ask Slashdot: Is iOS 8 a Pig?

hAckz0r Re:Alright smart guy (418 comments)

I doesn't need to be *that* old, just not the latest model. It is a known fact, from a previous SD article, that older models slow down when a new iphone is released, which always coincides with a bright new shiny OS upgrade. If you upgrade the older hardware to keep up with the Jone's you are likely to have a slower phone,ipod, or ipad after you are done.


U2 and Apple Collaborate On 'Non-Piratable, Interactive Format For Music'

hAckz0r Re:Challenge accepted! (344 comments)

So true. At the end of the day it only takes a single copy of non-drm'ed music file to hit the street and all the Billions they spend to lock it down are wasted. Basic problem: You give the buyer the data, and you give them the key to read the data, and then ask them nicely (via leagal threats) to not put the two together in a way that is not authorized. Like that will ever happen. You only need one pissed off geek that can't play their newly purchased music to make it all worthless by providing a single download of that music file as a simple mp3. Hell, you can plug your speaker wires into another console to record it. Game over. I've personally never seen a system I couldn't break, but then I'm too honest to be that one pissed off geek. There are so many others out there that are not as honest.

What is the point to "interactive music" anyway. I like to listen to music, not hold a conversation with it. Why would I even want this? Its just a solution looking for a problem.

2 days ago

Ask Slashdot: How To Pick Up Astronomy and Physics As an Adult?

hAckz0r Resources (230 comments)

I have several suggestions from the things I do to stay on top of things. I have limited time to devote to my passion but there are things you can do to multitask.

Podcasts: pick up a used ipod and subscribe to the astronomy related podcasts.

Kindle: get a used kindle that has the bubble-type keyboard, and let it read books and papers to you. The keyboard lets you start/stop the reader without looking, for in the car use. Download Calibre application and convert online/document resources and copy them to the kindle. You are not stuck with just Amazon eBooks, but many of them are good.

When online use an RSS reader and connecty to the publications feeds: e.g. http://physics.stackexchange.c... and many blogs!

3 days ago

Comcast Allegedly Asking Customers to Stop Using Tor

hAckz0r From reading the service agreement (418 comments)

They can prevent you from allowing others to connect into a service you are providing. Public Tor servers (aka entry/exit nodes) would thus be against the user agreement and likely result in termination of services. Running the client portion should not run afoul of that agreement. (ianal)

They would first need to prove illegal activity is happening, and that would be difficult, but then there are known exploits for some Tor applications that can be used to leak data which can give away this kind of evedence of your activity. The question is, would they go through the trouble to inject these exploits into your system so that they can find out what you are doing? Like unsecured DNS, or injections of web bugs into your open http traffic. That sounds illegal to me, and a clear invasion of privacy. Privacy is exasctly the reason for using Tor in the first place, so don't expect those kinds of users to sit back and say nothing when terminated.

about a week ago

Mozilla Rolls Out Sponsored Tiles To Firefox Nightly's New Tab Page

hAckz0r First impressions.... (171 comments)

... count. The uptake of new users is going to decline big time. Established users will learn to deal with the changes, but new users will be turned off before learning how to turn all this off.

about three weeks ago

Processors and the Limits of Physics

hAckz0r What we need for efficiency (168 comments)

The human brain is a marvel of technology. Brain waves move through it as waves of activity. It only consumes (most) energy where the wave of intensified activity is passing through it. If a 3d circuit could be made to sense when a signal is incoming then it could be more efficient. In this paradigm its no 1's and 0's, but rather circuit on vs circuit off. In addition, if you could turn those on/off cycles into charge pump circuits then you could essentially recycle the a partial of that charge and reuse it in a casade like or layered circuit. I believe Sun Micro was working on one such design, but the cost benifits were not there at the time to make it to production. Things have changed.

about a month ago

US Army To Transport American Ebola Victim To Atlanta Hospital From Liberia

hAckz0r Re:What a bunch of pansies (409 comments)

So we should not worry that the CDC says it spreads by "close conversation (3 feet)"?

Somehow I do see that as a problem, even for a good hospital. lets hope they have a good containment center.

about 1 month ago

NASA Tests Microwave Space Drive

hAckz0r The paper... (201 comments)

Is useless drivel. Its a one page abstract that reads like a news media comentatry of the test. There are not even graphs of measurments taken, no specifics on the test setup. Nothing. Its not even Science by my definition. Lets move along, nothing to see here.

about 2 months ago

Verizon's Accidental Mea Culpa

hAckz0r Re:Answer needed (390 comments)

This is fine. If Verizon wants to increase *my* bill because of my bandwidth is higher, then you and I have no problem. I pay more for that bandwidth. That is an open market system. But that is based on my bandwidth usage and not by increasing the cost of a competitor. If I were instead downloading Gigabytes of anything else, again Verizon would have the right to charge *me* more money.

Charging Netflix money just to connect is anti-competitive, because both companies sell the same service, only one is the gatekeeper to the customer. If anyone gets charged more for my bandwidth it should be me, and only me. I then get to choose who I use to connect to the Internet. If Verizon raises my rate I have the right to go shopping. If they rise the rate for Netflix that is extortion, and Netflix doesn't get to go shopping for a better source of customers. it doesn't work that way, and there are laws against that sort of thing. Why Congress doesn't get it is a mystery to me.

about 2 months ago

Verizon's Accidental Mea Culpa

hAckz0r Re:Answer needed (390 comments)

How about because customers are paying them for Internet service, and going to Netflix is where they want to go? People don't want to pay for bad service do they? The real problem here is Verizon is a competitor to Netflix, and Verizon is not only being allowed to be anti-competitive but also hoping to get paid for it.

about 2 months ago

Cosmologists Show Negative Mass Could Exist In Our Universe

hAckz0r Re:We've observed and created antiparticles (214 comments)

No, I think the next step is likely that someone will 'mathematically prove' that you can have anti-energy or something cruft like that, to explain away Dark Energy. Where the word 'prove' actually means 'infer' from some magical fantasy land mathematical contortions. Once you divest yourself from the physical reality you can twist equations around to do many impossible things. Why so many people invent fantasy to try and explain away actual evidence is beyond me. At least with anti-matter we have actual evidence of it. We can create it, and experiment with it. Its physical.

You just can't do that with Dark Matter or Gravity waves, because they simply don't exist. General Relativity is thermodynamically incomplete as a theory and no amount of fantasy-like invention is going to compensate for an incorrect/incomplete theory.

about 2 months ago

Giant Crater Appears In Northern Siberia

hAckz0r Move along, nothing to see here... (122 comments)

Maxwel Smart agent 86 just prevented KAOS from turning their Super-laser on to the US Capital building last year. Unfortunately, as usual, he tripped over the power cord and spun the lazer around and blew a 40 meter hole in the USSR Siberian outback before his food tangled and pulled out the power cord. That incident of course caused a fair amount of damage and eventually forced the KAOS spaceship to perform an emergancy landing right behind the CONTROL building parking lot. Furtunatly 99 prevented Hyimie from repairing the craft which would have allowed the KAOS agents to excape. The Chief is in protracted negotiations with the Kremlin over the loss of the summer vacation home that was said to be on that property.

I'm guessing that less than 2% of you know probably what the heck I'm talking about here.

about 2 months ago

Researchers Find Evidence of How Higgs Particle Imparts Mass

hAckz0r Another giant leap? (91 comments)

By leap I mean assumptions, not 'getting ahead'. How does one go from proving that a Higgs CAN decay into fermions, in accordance to the math of the standard model, all the way to saying that the Higgs is responsible for creating mass in general? What is the proof of any connection here? Yes, a fermion will have some mass, but how do they manage to jump to the conclusion that the Higgs creates the mass of all particles? I've looked a the paper and still don't see any connection. Looks like another overly sensational headline to me.

about 2 months ago

Tractor Beam Created Using Water Waves

hAckz0r If we could only do this with space-time (71 comments)

Anti-gravity! But how does one perturb space-time? We can't even detect gravitational waves much less create them. I don't think we will solve this one overnight

about 2 months ago

Airbus Patents Windowless Cockpit That Would Increase Pilots' Field of View

hAckz0r Already been done before (468 comments)

The F-35 does the same video trick, the only difference is there is still a cockpit and the video is in the helmet not on a screen. It seems all you have to do is steal someone's idea and make a small modification and... Profit!!

about 2 months ago

NSA Considers Linux Journal Readers, Tor (And Linux?) Users "Extremists"

hAckz0r Is NSA being just a little Schizophrenic? (361 comments)

First they publish the SELinux security enhanced architecture for all of the Linux community to use, to be safely computing. A really great technology, and highly advisable.

Then they put all the people on the black list that might want to *read* about SELinux, or other technologies, before using it?

Come on, you either want people to be safe _from_ hackers (the bad guys) or arrest all the hackers (software engineers). Maybe someone needs to buy them a current dictionary including the many uses of the common word "hacker" and what it really means in which context?

about 3 months ago

Microsoft Wants You To Trade Your MacBook Air In For a Surface Pro 3

hAckz0r Re:This is telling (365 comments)

Microsoft has given up trying to promote the Surface as a ...

... saleable machine. Rather than dumping their excess, in public view of shareholders, they are now even more willing to take a more substantial loss, so long as they can still claim X millions of units sold . Better than tossing them like with the Surface RT. Shareholders will likely complain if they try that one again.

about 3 months ago

Ask Slashdot: Communication With Locked-in Syndrome Patient?

hAckz0r Re:Eye tracking (552 comments)

I'd mod you up if I could.

There is LOTS of eye tracking software out there. Just do a Google for 'eyetracking software' and there are lots of hits, far too many for me to list here.

just as an example is here but there are many many more. Even open source.

about 4 months ago

SCOTUS Ends Novell's Anti-Trust Cast Against Microsoft

hAckz0r Re:way to over simplify the issue win the summery (174 comments)

No, what they did was to dup Novell into developing a complex product using an API that they provided, but planned on changing at the 12th hour to defeat their competition out of the gate. Their goal was to make Novell look so bad in the eyes of the consumer that nobody would ever trust the product again. This is pure maliciousness and way over the top. Its one thing to simply not give information, its entirely another to mislead and make your competition do what you tell them, and then change it so that it is guaranteed not to work.

Bottom line: If you shake hands with Bill Gates you had better count your fingers.

about 5 months ago

Comcast Offers To Shed 3.9 Million Subscribers To Ease Cable Deal

hAckz0r Re:Don't mind being sold (154 comments)

Better if it were every other neighbour. That way there would have to a second cable company's cable in the ground and some actual competition in the neighbourhood. Satellite doesn't count as competition if what you are after is voip or Internet access. When you are the only game in town it doesn't matter how many subscribers your local monopoly has. Selling and buying any number of subscribers doesn't make any difference to the locked-in consumer.

about 5 months ago



Say NO to software patents

hAckz0r hAckz0r writes  |  more than 2 years ago

hAckz0r (989977) writes "The (!/petitions ) now has an online petition to stop the USPTO from issuing any more software patents. One must register first with the petition site, wait for the confirming email, login, then locate the "Open Petitions" menu to go to the list of petitions. Scroll down to the one called "Direct the Patent Office to Cease Issuing Software Patents", and then do what you think is right. They need 3,428 petitions total to make it meaningful, and has logged 1,572 as of my entry."
Link to Original Source

Finding Compromised/Malicious Source Code

hAckz0r hAckz0r writes  |  about 6 years ago

hAckz0r (989977) writes "I am in the final phase of a research project software design which, believe it or not, intends to help locate embedded malicious logic in Mega-SLOC sized source code bases, and eventually even across multiple computer language linkages. This tool is intended to aid an analyst in finding things like back doors, Easter eggs, time bomb logic, or other undesired or malicious logic inserted into the source code. The design has been highly scrutinized, and the funding for the project is now looking imminent. Once all the final papers are signed, and it really happens, then it's straight from the frying pan into the fire for me. The educated nay-sayers will no doubt be quick to remind me that you can't prove a negative. I already know that fact all too well.

Ok, now on to the real question. In order to prove any real life viability in the final software implementation we will need to demonstrate its many capabilities against a set of real life threats. I could write my own tests but I feel like that would be like cheating. Compromised 'Open Source' projects would be an obvious choice for availability reasons, but the problem is that as soon as an OS project admin realizes that their software product has become compromised, it literally disappears off of the Internet, almost over night. Poof! Gone! The Fedora/Redhat OpenSSH compromise could be one such example. Anybody even seen any Fedora updates lately?

I can start by chasing down other repositories that cache rpm source and then do my own deltas, if they have not already pulled that deprecated version, but that is still timing dependent. Obtaining copies of even older exploits seems to be even more troublesome and very time consuming, especially if one has to actually contact the project owners directly to revive a specific deprecated version number.

So my questions to Slashdot are:

1)Is there a compromised source code repository I am not aware of? Hacks-R-Us maybe? If it were a simple virus or a rootkit this would be much easier!

2)If you had to identify and then find these older deprecated versions of source code (C/C++ for now, other languages to follow) how would you go about doing this collection efficiently? Is there a comprehensive list of hacked OS projects with version numbers? Closed source doesn't count if the source code is not obtainable.

3)What specific deprecated/exploited OS software packages would be most worthy of testing if you only had a short time line, say about two weeks to collect them in? What floats to the top of the list? The Linux Kernel hack no doubt would top my list, then OpenSSH *2

Thanks in advance for your consideration."


hAckz0r has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>