Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Ask Slashdot: What Should Every Programmer Read?

sleekware Re:Books to read (352 comments)

Design Patterns by the gang of four.

Beat me to it! I second this...

about 4 months ago
top

Linksys Routers Exploited By "TheMoon"

sleekware Re:how can i tell if my router is affected? (134 comments)

I have a WRT54 running the original linksys software. I know you guys will say to push DDWRT onto it. In any case, how can i tell if my router's been compromised? It has been flakey lately but I figured that was just signal interference.

Also running original firmware, with a newer Linksys. Short of doing the most reasonable thing and swapping out my firmware for third party, I'm thinking of upgrading to the latest manufacturers firmware and then treating the router's IP as an untrusted site in my browser, adding an exception only when I need to make a change. Perhaps this would thwart? Also not using the default IP, didn't see it mentioned if that would matter...

about 7 months ago
top

Building an IT Infrastructure Today vs. 10 Years Ago

sleekware Re:You don't build it (93 comments)

You can steer these types into convincing them that it may be beneficial to do the up and coming thing of have your "own" cloud or private cloud aka to us a classic onsite data-center, if appropriate to your I.T. situation.

about 10 months ago
top

Winamp Shutting Down On December 20

sleekware Re:FB2K FTW (400 comments)

I was a big fan of Winamp and I converted to foobar2000 for my music a few years ago. It's true that it can be cumbersome out of box, but I save my settings and it works for me and it's the only player I use now. It is much different from Winamp, but I like it much better. That being said it isn't for everyone, but if you like to tweak the heck out of things it's your friend. Interesting yet, the guy who wrote foobar used to do some work for the creators of Winamp:

foobar2000 is a freeware audio player for Windows developed by Peter Pawlowski, a former freelance contractor for Nullsoft. It is known for its highly modular design, breadth of features, and extensive user flexibility in configuration. For example, the user-interface is completely customizable.[5] Its extensive SDK allows third-party developers enough power to completely replace the interface. foobar2000 supports a large number of audio file formats, has many features for organising metadata, files, and folders, and has a converter interface for use with command line encoders. To maximize audio fidelity in cases where resampling or downscaling in bit depth is required, it provides noise shaping and dithering. There are a number of official and third-party components which add many additional features. The core is closed source, whereas the SDK is licensed under the BSD license.

Source: http://en.wikipedia.org/wiki/Foobar2000 foobar2000 site: http://www.foobar2000.org/ download: http://www.foobar2000.org/download

about 10 months ago
top

McAfee To Pay For PC Repairs After Patch Fiasco

sleekware Definately an (212 comments)

epic fail.

more than 4 years ago
top

Throttle Shared Users With OS X — Is It Possible?

sleekware Re:Two Options (403 comments)

Also, if you have a managed switch you may be able to throttle connections by port.

more than 4 years ago
top

Throttle Shared Users With OS X — Is It Possible?

sleekware Re:A suggestion... (403 comments)

Or use a hub, even slower...

more than 4 years ago
top

Mariposa Botnet Beheaded

sleekware W32.Pilleuz (177 comments)

Discovered: September 29, 2009
Updated: September 30, 2009 8:32:32 AM
Also Known As: W32/Autorun.worm!a758e0e7 [McAfee], W32/Rimecud [McAfee], W32/Autorun-AUP [Sophos], ButterflyBot.A [Panda Software]
Type: Worm
Infection Length: 109,056 bytes
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003, Windows 2000

W32.Pilleuz is a worm that spreads through file-sharing programs, Microsoft instant messaging clients and removable drives. It also opens a back door on the compromised computer.

Currently, W32.Pilleuz has been most commonly referred to as the Mariposa or Butterfly botnet.

Source: http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-093006-0442-99

more than 4 years ago
top

Experts Call Google Hackers 'Amateurs'

sleekware Maybe... (1 comments)

...they could be amateurs, but their methods are effective.

more than 4 years ago
top

Touchpad Meets Morphing Keyboard

sleekware Bah (85 comments)

This device is pathetic compared to the Model M. (http://en.wikipedia.org/wiki/Model_M)

more than 4 years ago
top

How Do You Get Users To Read Error Messages?

sleekware Re:Full screen (951 comments)

I've forgotten this existed!

more than 4 years ago
top

How Do You Get Users To Read Error Messages?

sleekware Re:Full screen (951 comments)

Don't forget to use brilliant colors that are harsh on the eyes!

more than 4 years ago
top

A New Wi-Fi Exploit, Limited But Clever

sleekware Re:Use a MAC address filter (77 comments)

It seems that you assumed that I wouldn't suggest first to use wpa2, etc. Seeing as the article is about cracking advanced encryption, I would hope that this is already in place. Poor advice? I think not. It adds additional roadblocks. I also said that it 'helps'. Not that it's a foolproof plan. It just makes it more of a pain to break in. For example, using a MAC address filter would mean that they would have to spoof a MAC address that you have whitelisted. This requires additional effort and information gathering. Using a SSID that is not broadcasted, and also not easily guessable (not a dictionary word, and a certain length, etc), makes it harder for SSID crackers to pick it up as well. You may be happy with just using strong encryption, but I very much prefer enabling these additional security features to harden it even further, even if it is just a little bit further.

more than 4 years ago
top

A New Wi-Fi Exploit, Limited But Clever

sleekware Use a MAC address filter (77 comments)

This still can be worked around by spoofing MAC addresses, but every thing you do to secure your wireless network helps (hidden SSID, etc).

more than 4 years ago
top

House Overwhelmingly Passes Cybersecurity Bill

sleekware Re:At least (170 comments)

Ah, good point.

more than 4 years ago
top

House Overwhelmingly Passes Cybersecurity Bill

sleekware At least (170 comments)

It's a step in the right direction...

more than 4 years ago

Submissions

sleekware hasn't submitted any stories.

Journals

sleekware has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>