The Wayback Machine - https://web.archive.org/web/20050413051751/http://it.slashdot.org:80/
 OSTG | SourceForgeThinkGeekITMJLinux.comNewsForgefreshmeatNewslettersTechJobsSlashdot Broadband X 
Welcome to Slashdot
 Login
 Why Login?
 Why Subscribe?

 Sections
 Main
 Apache
 Apple
  2 more
 AskSlashdot
  5 more
 Books
 BSD
 Developers
  2 more
 Games
  9 more
 Hardware
  1 more
 Interviews
 IT
 Linux
  4 more
 Politics
 Science
  1 more
 YRO
  2 more
 
 Help
 FAQ
 Bugs

 Stories
 Old Stories
 Old Polls
 Topics
 Hall of Fame
 Submit Story

 About
 Supporters
 Code
 Awards

 Services
 Broadband
 PriceGrabber
 Product Guide
 Special Offers
 Tech Jobs

Linux: MS Plans Low-Cost Windows for Brazil
Windows
Posted by timothy on Tuesday April 12, @10:36PM
from the cut-rate-low-budget dept.
Atryn writes "According to this C|NET article, Microsoft is planning to release its XP Starter Edition in Brazil. Could the pressure of Brazil's overtures toward Linux be forcing Microsoft Brasil to compete?"

( Read More... | 157 of 199 comments )

Intel Seeking Moore's Law Original Publication
Intel
Posted by timothy on Tuesday April 12, @07:18PM
from the mislaid-claims dept.
ackthpt writes "Gordon Moore's famous prediction, labeled Moore's Law, was originally published in the April 19, 1965 issued of Electronics. Sometime since, he lent out his copy and it has never been returned. Intel would like an original copy of the now defunct magazine and is offering $10,000 for a copy, presumably in good condition. The story is carried on Reuters, and if you happen to have a copy (of your own, not stolen from a museum or library) you may contact Intel via eBay's WantItNow."

( Read More... | 138 of 188 comments )

Linux: New Linux Distros Insecure by Default?
Operating Systems
Posted by timothy on Tuesday April 12, @07:17PM
from the no-good-down-that-road dept.
An anonymous reader submits Two articles on Codefez and NewsForge review releases of Linspire 5.0 and Linare. Both these distributions let the user run as Root by default after installation, and don't prompt to set up a user ID. Is this a start of a new trend of 'dumbed down' Linux distributions that will damage the Linux reputation for security?"

( Read More... | 64 of 72 comments )

IBM Says its Future is in Services, Not Goods
Technology
Posted by Zonk on Tuesday April 12, @03:56PM
from the shift-the-para-digum dept.
TFGeditor writes "An article at Technology Review quotes IBM exec Paul Horn saying that the company's business model is shifting from goods and products to software and services. From the article: 'Horn's challenge, then, has been to take a $6 billion research organization dedicated to work that advances technology products and get it to do work that benefits service businesses. IBM is thus in the process of answering an important question for all technology companies: can corporations perform useful research in the services arena?'"

( Read More... | 156 of 214 comments )

Your Rights Online: LexisNexis Breach Worse Than Believed
Privacy
Posted by Zonk on Tuesday April 12, @01:16PM
from the when-it-rains dept.
Rollie Hawk writes "Worldwide law and news sifter LexisNexis has some bad news of its own this time. Actually, "bad" might sharply understate the situation. More than a month after disclosing information on a database breach that led to 32,000 customer IDs being stolen, the results of an internal review showed that in fact the damage was nearly ten times worse than previously thought. LexisNexis is already "offering free support services, including credit bureau reports, credit monitoring for one year and fraud insurance" to the nearly 300,000 additional victims it will soon be contacting, according to a Reed Elsevier statement to the Regulatory News Service. So far, no identity thefts have been reported by earlier victims, at least some of whom had private information such as addresses and Social Security numbers unwittingly divulged."

( Read More... | 170 of 223 comments )

Microsoft Researchers on Stopping Spam
Spam
Posted by timothy on Monday April 11, @09:49PM
from the slow-treacle dept.
TheBackBencher writes "Scientific American today has a very interesting article about "Stopping Spam" by Joshua Goodman, David Hackerman and Robert Rounthwaite from Microsoft Research. They talk about different types of spam -- spam with emails, spam on IMs, spamlinks on web pages and image based spam. They mention different techniques for spam filtering mainly fingerprinting matching techniques, n grams model, naive bayesian approach, optical character recognition, challenge/response systems and Human Interacted Proofs (HIP) in a very lucid style. They however do not mention fingerprinting approach of using Nilsimsa Hash to tackle addition of random words by spammers in emails or hypertextus interruptus technique used by spammers of splitting words using HTML comments, pairs of zero width tags, or bogus tags. Also, Spam-Research is reporting the SplitFit Technique that Spammers are using to fool Yahoo! Mail SpamGuard."

( Read More... | 200 of 287 comments )

Book Reviews: Google Hacking for Penetration Testers
Google
Posted by timothy on Monday April 11, @04:20PM
from the google-thyself dept.
Corey Nachreiner writes "Until recently, I considered myself a Google power-user; so much so that I often call Google my "second brain." Whenever I stumble upon a computing dilemma I can't solve, I submit an advanced query to my second brain, Google, and let it supply the answers. That's why I was So There when Johnny Long released his recent book, Google Hacking for Penetration Testers. I heard Johnny's lively, light-hearted presentation to a packed house at the BlackHat Briefings last summer in Las Vegas. It was the hit of the show, but in one hour he could only present a few of his startling findings about Google hacking. After reading Johnny's book, I've learned a ton more and realized I wasn't quite as Google-savvy as I thought. As with my real brain, I've only been using about ten percent of my Google-brain's capacity." Read on for the rest of Nachreiner's review.

( Read More... | 5923 bytes in body | 76 of 137 comments )

AOL and XM Joining Forces for Online Radio
Music
Posted by samzenpus on Monday April 11, @09:25AM
from the refresh-my-station dept.
Josh writes "BetaNews is reporting that AOL and XM are joining forces to make available 20 XM music channels plus 130 of its own available to anyone on the internet for free starting this summer. AOL members will have free broadband access to 70 XM channels, although apparently there are plans for a $5/month option for non-subscribers. The deal means AOL Music specials will make it onto XM's channels, and XM promos will be heard across AOL Music's properties."

( Read More... | 119 of 162 comments )

People are More Accepting of Spam
Spam
Posted by Zonk on Monday April 11, @04:45AM
from the yuck dept.
twitter writes "Many news organizations are reflecting the opinion of Pew Internet and American Life Project staffer Deborah Fallows that '...email users say they are receiving slightly more spam in their inboxes than before, but they are minding it less.' I think that's an odd conclusion to draw. You would expect the number of people using email less because of spam to decrease to zero quickly when 25% of the population say they avoid email! To their credit, they point out that CAN-SPAM has done nothing to help." The Reuters blurb about this study has a syopsis of their findings.

( Read More... | 207 of 277 comments )

Your Rights Online: Russians Claim Their Hackers the Best In the World
Security
Posted by Zonk on Sunday April 10, @04:37AM
from the odd-thing-to-boast-about dept.
Ant writes "ZDNet UK reports that Russians who once hacked for fun are now teaming up to get rich through cybercrime, according to police. The Russian cybercrime division, known as Department K, has warned that Russian hackers are the best in the world. From the article: 'Everyone knows that Russians are good at math...Our software writers are the best in the world, that's why our hackers are the best in the world.'"

( Read More... | 338 of 548 comments )

Yesterday's News  >
 
Advertisement
Slashdot Login

[ Create a new account ]

Older Stuff

Saturday April 9

· Hacker High School Starts to Spread (99)

Friday April 8

· Spammer Sentenced to 9 Years in Jail (561)
· DNS Cache Poisoning Update (197)
· Longhorn to use UNIX-like User Permissions (696)

Thursday April 7

· 24-Hour Atari 2600 Video Game Design Contest (28)
· Why Don't PDAs and Cellphones Use USB? (145)
· 29th ACM Intl. Programming Contest Results (433)

Wednesday April 6

· Should You Trust MAPS? (864)
· Hibernate - A J2EE Developers Guide (243)
· Ready or Not, Here Comes Service Pack 2 (724)
· DNS Cache Poisoning Spreads Malware (313)
· Cooler Servers or Cooler Rooms? (409)
· Mabir.A Virus Targets Symbian Phones (197)

April 5

· How Often are Internal IT Projects Open Sourced? (55)
· Developer Site CodeZoo Launches (78)

Older Articles
Yesterday's News

 
 
 
 
  echo "Your stdio isn't very std." -- Larry Wall in Configure from the perl distribution
All trademarks and copyrights on this page are owned by their respective owners. Comments are owned by the Poster. The Rest © 1997-2005 OSTG.
[ home | awards | contribute story | older articles | OSTG | advertise | about | terms of service | privacy | faq | rss ]