Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Supercomputing

Homebrew Cray-1 140

egil writes "Chris Fenton built his own fully functional 1/10 scale Cray-1 supercomputer. True to the original, it includes the couch-seat, but is also binary compatible with the original. Instead of the power-hungry ECL technology, however, the scale model is built around a Xilinx Spartan-3E 1600 development board. All software is available if you want to build one for your own living room. The largest obstacle in the project is to find original software."

Comment What Linux needs to hit mainstream is (Score 1) 710

... a good powerpoint viewer. One that supports all powerpoint slideshows perfectly, no matter how much multimedia is embedded. A lot of home users receive annoying powerpoint presentations with some stupid joke or something, and they LIKE it.

They aren't supported very well in linux. Some are, many are not. Especially when sound is embedded. And Average Joe will open a presentation, notice it isn't what it is on Windows, and then believes Linux is no good.

Security

Submission + - MD5 proven ineffective for app signatures (win.tue.nl)

prostoalex writes: "Marc Stevens, Arjen K. Lenstra, and Benne de Weger have released their paper 'Vulnerability of software integrity and code signing applications to chosen-prefix collisions for MD5', which describes a reproducible attack on MD5 algorithm to fake software signatures. Researchers start off with two simplistic Windows applications — HelloWorld.exe and GoodbyeWorld.exe, and apply a known prefix attack that makes md5() signatures for both of the applications identical. Is it the end of signed software? Not quite, researchers point out: "For abusing a chosen-prefix collision on a software integrity protection or a code signing scheme, the attacker should be able to manipulate the files before they are being hashed and/or signed. This may mean that the attacker needs insider access to the party operating the trusted software integrity protection or code signing process. An attacker with such access can most probably do more harm anyway, without the need for chosen-prefix collisions, to get official digital signatures on malware.""

Slashdot Top Deals

"Just Say No." - Nancy Reagan "No." - Ronald Reagan

Working...