Slashdot: IT
http://it.slashdot.org/
News for nerds, stuff that mattersen-usCopyright 1997-2015, DHI Group Inc. All Rights Reserved. Slashdot is a DHI service2015-08-09T21:03:19+00:00Dicehelp@slashdot.orgTechnology1970-01-01T00:00+00:001hourlySlashdot: IThttp://a.fsdn.com/sd/topics/topicslashdot.gif
http://it.slashdot.org/
Windows 10, From a Linux User's Perspective
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/cnGS2IvsnKU/windows-10-from-a-linux-users-perspective
Phoronox features today a review of Windows 10 that's a little different from most you might read, because it's specifically from the point of view of an admin who uses both Windows and Linux daily, rather than concentrating only on the UI of Windows qua Windows. Reviewer Eric Griffith finds some annoyances (giant start menu even when edited to contain fewer items, complicated process if you want a truly clean install), but also some good things, like improved responsiveness (" feels much more responsive than even my Gnome and KDE installations under Fedora") and an appropriately straightforward implementation of virtual workspaces.
Overall? Windows 10 is largely an evolutionary upgrade over Windows 7 and Windows 8.1, rather than a revolutionary one. Honestly I think the only reason it will be declared as 'so good' is because Windows 8/8.1 were so bad. Sure, Microsoft has made some good changes under the surface-- the animations feel crisper, its relatively light on resources, battery life is good. There is nothing -wrong- with Windows 10 aside from the Privacy Policy.
If you're on Windows Vista, or Windows 8/8.1, then sure, upgrade. The system is refreshing to use, it's perfectly fine and definitely an upgrade. If you're on Windows 7 though? I'm not so sure. ...
Overall, there's really nothing to see here. It's not terrible, it's not even 'bad, it's just... okay. A quiet little upgrade.<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Windows+10%2C+From+a+Linux+User's+Perspective%3A+http%3A%2F%2Fbit.ly%2F1gV9SIy"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Ftech.slashdot.org%2Fstory%2F15%2F08%2F09%2F1825242%2Fwindows-10-from-a-linux-users-perspective%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://tech.slashdot.org/story/15/08/09/1825242/windows-10-from-a-linux-users-perspective?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://tech.slashdot.org/story/15/08/09/1825242/windows-10-from-a-linux-users-perspective?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/cnGS2IvsnKU" height="1" width="1" alt=""/>timothy2015-08-09T20:34:00+00:00windowsnice-to-wave-to-the-new-guytechnology1818,17,9,7,3,1,0http://tech.slashdot.org/story/15/08/09/1825242/windows-10-from-a-linux-users-perspective?utm_source=rss1.0mainlinkanon&utm_medium=feedAsk Slashdot: How To Safely Use Older Android Phones?
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/k6P12P-fIB8/ask-slashdot-how-to-safely-use-older-android-phones
An anonymous reader writes: Like many people reading this site, I have several older phones around as well as my newest, fanciest one; I have a minimal service plan on one of these (my next-to-most-recent), and no service plan (only WI-Fi, as available) on the others. Most of them have some reason or other that I like them, so even without service I've kept them around to act as micro-tablets. Some have a better in-built camera than my current phone, despite being older; some are nice on occasion for being small and pocketable; I like to use one as a GPS in the car without dedicating my phone to that purpose; I can let my young relatives use an older one as a camera, etc. Besides, some people have only one phone at all, and can't reasonably afford a new one -- and that probably means a phone that's not cutting edge. So: in light of the several recent Android vulnerabilities that have come to light, and no reason to think they're the last of these, what's a smart way to use older Android phones? Is CyanoGen Mod any less vulnerable? Should I be worried that old personally identifying information from online transactions is still hanging around somewhere in the phone's recesses? I don't want to toss still-useful hardware, but I know I won't be getting any OS upgrades to 3-year-old phones. How do you use older phones that are not going to get OTA updates to address every security issue?<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Ask+Slashdot%3A+How+To+Safely+Use+Older+Android+Phones%3F%3A+http%3A%2F%2Fbit.ly%2F1KZu9Ju"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Fask.slashdot.org%2Fstory%2F15%2F08%2F09%2F1753222%2Fask-slashdot-how-to-safely-use-older-android-phones%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://ask.slashdot.org/story/15/08/09/1753222/ask-slashdot-how-to-safely-use-older-android-phones?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://ask.slashdot.org/story/15/08/09/1753222/ask-slashdot-how-to-safely-use-older-android-phones?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/k6P12P-fIB8" height="1" width="1" alt=""/>timothy2015-08-09T19:38:00+00:00cellphonesnest-of-vipers-jump-right-inaskslashdot3333,32,22,16,4,0,0http://ask.slashdot.org/story/15/08/09/1753222/ask-slashdot-how-to-safely-use-older-android-phones?utm_source=rss1.0mainlinkanon&utm_medium=feedWindows 10 RSAT, Windows Server 2016 Technical Preview 3 Coming This Month
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/Zb9T0jtfal4/windows-10-rsat-windows-server-2016-technical-preview-3-coming-this-month
We've heard a lot lately about the release and reception of Windows 10; however, the Windows family includes more than just the most-seen desktop OS. Mark Wilson writes: Microsoft's Gabe Aul has revealed that the company plans to release a new technical preview of Windows Server 2016 later this month. Responding to questions on Twitter, the company's Corporate Vice President and face of the Windows Insider program also said that Windows 10 RSAT [Remote Server Administration Tools] will be launched in August. Unlike the preview builds of Windows 10, previews of the latest edition of Windows Server have been slower to creep out of Redmond. Sysadmins will be keen to get their hands on the latest builds to see just what direction Microsoft is taking with its server software after the decision to delay the launch. We don't know anything about what the third technical preview of Windows Server 2016 might include, but it is likely to be little more than a collection of bug fixes and tweaks. It's a little late in the game to expect any major changes to be made.<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Windows+10+RSAT%2C+Windows+Server+2016+Technical+Preview+3+Coming+This+Month%3A+http%3A%2F%2Fbit.ly%2F1NjUjEe"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Ftech.slashdot.org%2Fstory%2F15%2F08%2F09%2F182214%2Fwindows-10-rsat-windows-server-2016-technical-preview-3-coming-this-month%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://tech.slashdot.org/story/15/08/09/182214/windows-10-rsat-windows-server-2016-technical-preview-3-coming-this-month?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://tech.slashdot.org/story/15/08/09/182214/windows-10-rsat-windows-server-2016-technical-preview-3-coming-this-month?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/Zb9T0jtfal4" height="1" width="1" alt=""/>timothy2015-08-09T18:41:00+00:00windowsgold-plated-executive-editiontechnology1313,13,9,9,1,0,0http://tech.slashdot.org/story/15/08/09/182214/windows-10-rsat-windows-server-2016-technical-preview-3-coming-this-month?utm_source=rss1.0mainlinkanon&utm_medium=feedLinux Servers' Entropy Pool Too Shallow, Compromising Security
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/f6oYRhh4id8/linux-servers-entropy-pool-too-shallow-compromising-security
The BBC reports that Black Hat presenters Bruce Potter and Sasha Moore described at this year's Black Hat Briefings a security flaw in Linux servers: too few events are feeding the entropy pool from which random numbers are drawn, which leaves the systems "more susceptible to well-known attacks." Unfortunately, [Potter] said, the entropy of the data streams on Linux servers was often very low because the machines were not generating enough raw information for them.
Also, he said, server security software did little to check whether a data stream had high or low entropy.
These pools often ran dry leaving encryption systems struggling to get good seeds for their random number generators, said Mr Potter. This might meant they were easier to guess and more susceptible to a brute force attack because seeds for new numbers were generated far less regularly than was recommended.<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Linux+Servers'+Entropy+Pool+Too+Shallow%2C+Compromising+Security%3A+http%3A%2F%2Fbit.ly%2F1TgHWKT"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Fit.slashdot.org%2Fstory%2F15%2F08%2F09%2F1247211%2Flinux-servers-entropy-pool-too-shallow-compromising-security%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://it.slashdot.org/story/15/08/09/1247211/linux-servers-entropy-pool-too-shallow-compromising-security?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://it.slashdot.org/story/15/08/09/1247211/linux-servers-entropy-pool-too-shallow-compromising-security?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/f6oYRhh4id8" height="1" width="1" alt=""/>timothy2015-08-09T13:24:00+00:00encryptionyou-can-borrow-our-spam-fileit7070,68,45,31,13,8,3http://it.slashdot.org/story/15/08/09/1247211/linux-servers-entropy-pool-too-shallow-compromising-security?utm_source=rss1.0mainlinkanon&utm_medium=feedThe Internet of Compromised Things
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/NlTZ-JY6Sd8/the-internet-of-compromised-things
An anonymous reader writes: Jeff Atwood has a post about a security threat that's becoming more prevalent every day: spreading malware through a compromised router. "Router malware is the ultimate man-in-the-middle attack. For all meaningful traffic sent through a compromised router that isn't HTTPS encrypted, it is 100% game over." He links to a thorough technical analysis of how even HTTPS encrypted traffic can be subverted. Atwood provides a list of suggestions for keeping your router safe that probably won't be any surprise to people reading this site, and he further recommends only browsing on an unknown router if encryption is available. What I'm curious about are the long-term implications — is there a way forward to re-establish trust in our router infrastructure? What can the open source community do to speed this along?<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=The+Internet+of+Compromised+Things%3A+http%3A%2F%2Fbit.ly%2F1MdyNlU"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Fit.slashdot.org%2Fstory%2F15%2F08%2F09%2F0358205%2Fthe-internet-of-compromised-things%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://it.slashdot.org/story/15/08/09/0358205/the-internet-of-compromised-things?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://it.slashdot.org/story/15/08/09/0358205/the-internet-of-compromised-things?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/NlTZ-JY6Sd8" height="1" width="1" alt=""/>Soulskill2015-08-09T09:25:00+00:00securitypoints-of-failureit4848,45,36,25,12,6,1http://it.slashdot.org/story/15/08/09/0358205/the-internet-of-compromised-things?utm_source=rss1.0mainlinkanon&utm_medium=feedHacker Shows How To Fabricate Death Records
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/iEmA71k3yxA/hacker-shows-how-to-fabricate-death-records
wiredmikey writes: Hackers the Def Con gathering in Las Vegas on Friday got schooled in how to be online "killers." A rush to go digital with the process of registering deaths has made it simple for maliciously minded folks to have someone who is alive declared dead by the authorities. The process of having someone officially stamped dead by getting a death certificate issued typically involves a doctor filling out one form and a funeral home filling out another, according to Rock's research. Once forms are submitted online, certificates declaring the listed person legally dead are generated. A fatal flaw in the system is that people can easily pose as real doctors and funeral directors.<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Hacker+Shows+How+To+Fabricate+Death+Records%3A+http%3A%2F%2Fbit.ly%2F1Iz5eXd"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Ftech.slashdot.org%2Fstory%2F15%2F08%2F08%2F1741243%2Fhacker-shows-how-to-fabricate-death-records%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://tech.slashdot.org/story/15/08/08/1741243/hacker-shows-how-to-fabricate-death-records?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://tech.slashdot.org/story/15/08/08/1741243/hacker-shows-how-to-fabricate-death-records?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/iEmA71k3yxA" height="1" width="1" alt=""/>Soulskill2015-08-08T17:45:00+00:00internetmaking-you-deadtechnology4242,41,24,19,7,4,2http://tech.slashdot.org/story/15/08/08/1741243/hacker-shows-how-to-fabricate-death-records?utm_source=rss1.0mainlinkanon&utm_medium=feedHackers Actively Targeting Gas Pumps
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/i9ymId_ZY34/hackers-actively-targeting-gas-pumps
An anonymous reader writes: Security researchers from Trend Micro wondered what kind of cyberattacks might target one of our most common and vital pieces of infrastructure: gas pumps. So, they set up some honeypots to find out if and how gas pumps were being attacked. The researchers ended up getting more than they bargained for. Between February and July, there were at least 23 distinct attacks on their honeypots alone (PDF). This included identifications, modifications, and DDoS attacks. "In their research, they found that a DoS or DDoS attack could disrupt inventory control and distribution, which means gas stations may not have enough supply on hand. Changing pump names could result in the wrong fuel being added to a tank—such as putting Unleaded inside Premium, or vice versa. Drivers wouldn't like that. Or changing the pump volume could result in tanks being underfilled."<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Hackers+Actively+Targeting+Gas+Pumps%3A+http%3A%2F%2Fbit.ly%2F1MTwTID"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Ftech.slashdot.org%2Fstory%2F15%2F08%2F08%2F0558207%2Fhackers-actively-targeting-gas-pumps%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://tech.slashdot.org/story/15/08/08/0558207/hackers-actively-targeting-gas-pumps?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://tech.slashdot.org/story/15/08/08/0558207/hackers-actively-targeting-gas-pumps?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/i9ymId_ZY34" height="1" width="1" alt=""/>Soulskill2015-08-08T12:25:00+00:00securitytime-to-stop-visiting-those-pumps-equipped-with-self-destruct-buttonstechnology116116,115,82,64,21,7,4http://tech.slashdot.org/story/15/08/08/0558207/hackers-actively-targeting-gas-pumps?utm_source=rss1.0mainlinkanon&utm_medium=feedCertifi-gate: Another Huge Android Vulnerability
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/uebmudcXN9A/certifi-gate-another-huge-android-vulnerability
An anonymous reader writes: Security research firm Check Point has released information about a new vulnerability called Certifi-gate, which they say compromises the security of hundreds of millions of Android devices. The flaw exists within the mobile Remote Support Tools, which are intended to enable screen sharing and simulated taps for tech support purposes. Unfortunately, the way mRSTs validate the remote operator is easy to exploit. Because the software is designed to allow both monitoring of a device's screen and simulated input, the potential for misuse is quite serious. The flaw was disclosed to manufacturers a month ago. HTC, for one, has confirmed it is already starting to roll out a fix.<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Certifi-gate%3A+Another+Huge+Android+Vulnerability%3A+http%3A%2F%2Fbit.ly%2F1MT4lPr"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Fit.slashdot.org%2Fstory%2F15%2F08%2F07%2F2315226%2Fcertifi-gate-another-huge-android-vulnerability%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://it.slashdot.org/story/15/08/07/2315226/certifi-gate-another-huge-android-vulnerability?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://it.slashdot.org/story/15/08/07/2315226/certifi-gate-another-huge-android-vulnerability?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/uebmudcXN9A" height="1" width="1" alt=""/>Soulskill2015-08-08T02:02:00+00:00androiddon't-come-around-here-with-your-gatesit6565,61,41,37,10,6,6http://it.slashdot.org/story/15/08/07/2315226/certifi-gate-another-huge-android-vulnerability?utm_source=rss1.0mainlinkanon&utm_medium=feedProxyHam Debunked and Demoed At DEFCON
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/GMhLyvto6Ko/proxyham-debunked-and-demoed-at-defcon
darthcamaro writes: Last month, the ProxyHam project talk for DEFCON was mysteriously cancelled. In its place as a later edition is a new talk, in which the ProxyHam approach will be detailed and debunked — in a session called '"HamSammich". In a video preview of the talk, Rob Graham and Dave Maynor detail the flaws of ProxyHam and how to do the same thing with off the shelf gear, legally. "Our goal is to show that ProxyHam did not actually enhance security," Maynor said. "It does the exact opposite, causing more trouble than you can fix."<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=ProxyHam+Debunked+and+Demoed+At+DEFCON%3A+http%3A%2F%2Fbit.ly%2F1W62cmC"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Fmobile.slashdot.org%2Fstory%2F15%2F08%2F07%2F1552220%2Fproxyham-debunked-and-demoed-at-defcon%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://mobile.slashdot.org/story/15/08/07/1552220/proxyham-debunked-and-demoed-at-defcon?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://mobile.slashdot.org/story/15/08/07/1552220/proxyham-debunked-and-demoed-at-defcon?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/GMhLyvto6Ko" height="1" width="1" alt=""/>samzenpus2015-08-07T17:12:00+00:00wirelesshere's-the-dealmobile3737,37,18,15,7,3,1http://mobile.slashdot.org/story/15/08/07/1552220/proxyham-debunked-and-demoed-at-defcon?utm_source=rss1.0mainlinkanon&utm_medium=feedMilitary Data Center In a Suitcase To Get Commercial Release
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/PC2gobLgV9U/military-data-center-in-a-suitcase-to-get-commercial-release
judgecorp writes: The Mobyl Data Center, designed for the US Department of Defense, puts a data center in a rugged suitcase-sized box, and it will shortly be available commercially. The box includes up to 88 Xeon cores a maximum of 176 GB of RAM, and 2.8 TB of SSD storage with 12TB of hard disk as an option. The system uses credit-card sized MobylPC server units, sealed in epoxy, and rated to survive 300g of shock, but apparently proprietary to the vendor, Arnouse Digital Devices Corp.<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Military+Data+Center+In+a+Suitcase+To+Get+Commercial+Release%3A+http%3A%2F%2Fbit.ly%2F1OVkBgA"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Fhardware.slashdot.org%2Fstory%2F15%2F08%2F07%2F1533252%2Fmilitary-data-center-in-a-suitcase-to-get-commercial-release%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://hardware.slashdot.org/story/15/08/07/1533252/military-data-center-in-a-suitcase-to-get-commercial-release?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://hardware.slashdot.org/story/15/08/07/1533252/military-data-center-in-a-suitcase-to-get-commercial-release?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/PC2gobLgV9U" height="1" width="1" alt=""/>samzenpus2015-08-07T16:29:00+00:00hardwarefor-the-center-on-the-gohardware9090,81,48,31,10,5,4http://hardware.slashdot.org/story/15/08/07/1533252/military-data-center-in-a-suitcase-to-get-commercial-release?utm_source=rss1.0mainlinkanon&utm_medium=feedMozilla Issues Fix For Firefox Zero-Day Bug
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/XmjARu4TUsU/mozilla-issues-fix-for-firefox-zero-day-bug
An anonymous reader writes: Thursday night Mozilla released a Firefox security patch after finding a serious vulnerability that allows malicious attackers to upload files from a user's computer. The update was released about 24 hours after Mozilla learned of the flaw. In a blog post, Mozilla said, "a Firefox user informed us that an advertisement on a news site in Russia was serving a Firefox exploit that searched for sensitive files and uploaded them to a server that appears to be in Ukraine. This morning Mozilla released security updates that fix the vulnerability. All Firefox users are urged to update to Firefox 39.0.3. The fix has also been shipped in Firefox ESR 38.1.1."<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Mozilla+Issues+Fix+For+Firefox+Zero-Day+Bug%3A+http%3A%2F%2Fbit.ly%2F1SZUP0Y"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Ftech.slashdot.org%2Fstory%2F15%2F08%2F07%2F1521244%2Fmozilla-issues-fix-for-firefox-zero-day-bug%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://tech.slashdot.org/story/15/08/07/1521244/mozilla-issues-fix-for-firefox-zero-day-bug?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://tech.slashdot.org/story/15/08/07/1521244/mozilla-issues-fix-for-firefox-zero-day-bug?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/XmjARu4TUsU" height="1" width="1" alt=""/>samzenpus2015-08-07T15:46:00+00:00mozillathe-fix-is-intechnology111111,106,64,45,17,12,5http://tech.slashdot.org/story/15/08/07/1521244/mozilla-issues-fix-for-firefox-zero-day-bug?utm_source=rss1.0mainlinkanon&utm_medium=feedTesla Model S Has Been Hacked
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/2krfEjMsTO8/tesla-model-s-has-been-hacked
cartechboy writes: First, it was Chrysler last month with its Uconnect system being hacked while being driven down the road. Now, it's Tesla's turn. That's right, the Silicon Valley automaker's very own Model S electric car has been hacked by two white-hat hackers. The duo were able to manipulate the speedometer, lock and unlock the car, and at speeds of less than 5 mph they were able to make all the electronics go blank and shut down the car while engaging the emergency parking brake dragging the car to a stop. Tesla's already issues a software update that owners can download to path the security flaw. Welcome to the new world where cars can be hacked thanks to all their electronics.<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Tesla+Model+S+Has+Been+Hacked%3A+http%3A%2F%2Fbit.ly%2F1W5AhmM"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Ftech.slashdot.org%2Fstory%2F15%2F08%2F07%2F1146212%2Ftesla-model-s-has-been-hacked%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://tech.slashdot.org/story/15/08/07/1146212/tesla-model-s-has-been-hacked?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://tech.slashdot.org/story/15/08/07/1146212/tesla-model-s-has-been-hacked?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/2krfEjMsTO8" height="1" width="1" alt=""/>samzenpus2015-08-07T13:39:00+00:00securitylock-it-downtechnology254254,252,185,144,22,14,12http://tech.slashdot.org/story/15/08/07/1146212/tesla-model-s-has-been-hacked?utm_source=rss1.0mainlinkanon&utm_medium=feedResearcher Exploits 18-Year-Old Design Flaw To Compromise X86 Chips
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/jwkv_G3lFNk/researcher-exploits-18-year-old-design-flaw-to-compromise-x86-chips
jfruh writes: Security researcher Christopher Domas has demonstrated a method of installing a rootkit in a PC's firmware that exploits a feature built into every x86 chip manufactured since 1997. The rootkit infects the processor's System Management Mode, and could be used to wipe the UEFI or even to re-infect the OS after a clean install. Protection features like Secure Boot wouldnt help, because they too rely on the SMM to be secure.<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Researcher+Exploits+18-Year-Old+Design+Flaw+To+Compromise+X86+Chips%3A+http%3A%2F%2Fbit.ly%2F1Nevvxr"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Fit.slashdot.org%2Fstory%2F15%2F08%2F07%2F1127222%2Fresearcher-exploits-18-year-old-design-flaw-to-compromise-x86-chips%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://it.slashdot.org/story/15/08/07/1127222/researcher-exploits-18-year-old-design-flaw-to-compromise-x86-chips?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://it.slashdot.org/story/15/08/07/1127222/researcher-exploits-18-year-old-design-flaw-to-compromise-x86-chips?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/jwkv_G3lFNk" height="1" width="1" alt=""/>samzenpus2015-08-07T12:57:00+00:00securityprotect-ya-neckit124124,120,87,66,24,15,9http://it.slashdot.org/story/15/08/07/1127222/researcher-exploits-18-year-old-design-flaw-to-compromise-x86-chips?utm_source=rss1.0mainlinkanon&utm_medium=feedGood Economy? Tech Layoffs Are Up
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/UCkANZOJ75Q/good-economy-tech-layoffs-are-up
Nerval's Lobster writes: If you look at the broad numbers produced by the U.S. Bureau of Labor Statistics, the economy seems great, especially for the tech industry: The unemployment rate for tech pros currently stands at 2.1 percent, down from 2.3 percent in the first quarter. However, that dip isn't uniform for all sectors: The unemployment rate for Web developers climbed from 2.1 percent to 3.1 percent. Computer support specialists, network and systems administrators, computer & information systems managers, and database administrators also saw their respective unemployment rates rising slightly. Layoffs and discharges for the tech industry as a whole rose slightly in April and May (the latest months for which the BLS had numbers), to an average of 441,500 employees per month. That's higher than the first quarter, when layoffs and discharges averaged 424,300 per month. That's not to say we're on the verge of a collapse, bubble, or other economic shock, but it's definitely not great times for everybody.<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Good+Economy%3F+Tech+Layoffs+Are+Up%3A+http%3A%2F%2Fbit.ly%2F1NejKXL"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Fit.slashdot.org%2Fstory%2F15%2F08%2F07%2F0414235%2Fgood-economy-tech-layoffs-are-up%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://it.slashdot.org/story/15/08/07/0414235/good-economy-tech-layoffs-are-up?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://it.slashdot.org/story/15/08/07/0414235/good-economy-tech-layoffs-are-up?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/UCkANZOJ75Q" height="1" width="1" alt=""/>samzenpus2015-08-07T11:33:00+00:00businessgetting-a-jobit278278,274,196,176,47,22,15http://it.slashdot.org/story/15/08/07/0414235/good-economy-tech-layoffs-are-up?utm_source=rss1.0mainlinkanon&utm_medium=feedZimperium Releases Stagefright Detection Tool and Vulnerability Demo Video
http://rss.slashdot.org/~r/Slashdot/slashdotIt/~3/W5Ma8PVnW0w/zimperium-releases-stagefright-detection-tool-and-vulnerability-demo-video
Mark Wilson writes: We've already looked at the Stagefright vulnerability, discovered by Zimperium, and shown what can be done to deal with it. Affecting up to 95 percent of Android devices, the vulnerability has led to Google and Samsung announcing monthly security updates. Now the mobile security company has released additional details about how the exploit works. To help explain the vulnerability, a video has been produced which uses a Stagefright demonstration to illustrate it in action. Zimperium has also released an Android app that checks devices for the vulnerability.<p><div class="share_submission" style="position:relative;">
<a class="slashpop" href="http://twitter.com/home?status=Zimperium+Releases+Stagefright+Detection+Tool+and+Vulnerability+Demo+Video%3A+http%3A%2F%2Fbit.ly%2F1MdOXwY"><img src="http://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a class="slashpop" href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Ftech.slashdot.org%2Fstory%2F15%2F08%2F06%2F2246244%2Fzimperium-releases-stagefright-detection-tool-and-vulnerability-demo-video%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><img src="http://a.fsdn.com/sd/facebook_icon_large.png"></a>
<a class="nobg" href="http://plus.google.com/share?url=http://tech.slashdot.org/story/15/08/06/2246244/zimperium-releases-stagefright-detection-tool-and-vulnerability-demo-video?utm_source=slashdot&utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><img src="http://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/></a>
</div></p><p><a href="http://tech.slashdot.org/story/15/08/06/2246244/zimperium-releases-stagefright-detection-tool-and-vulnerability-demo-video?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><img src="http://feeds.feedburner.com/~r/Slashdot/slashdotIt/~4/W5Ma8PVnW0w" height="1" width="1" alt=""/>samzenpus2015-08-07T02:03:00+00:00androidgive-me-the-statstechnology5353,48,34,27,6,3,1http://tech.slashdot.org/story/15/08/06/2246244/zimperium-releases-stagefright-detection-tool-and-vulnerability-demo-video?utm_source=rss1.0mainlinkanon&utm_medium=feedSearch SlashdotSearch Slashdot storiesquery
http://it.slashdot.org/search.pl