Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Classic Games (Games)

The Return of (Old) PC Graphic Adventures 93

KingofGnG writes "Though they belong to a genre already considered defunct and inadequate for the mainstream video game market, adventure games have a glorious past, a past that deserves to be remembered, and, of course, replayed. At the center of a good part of this effort of collective memory, there is ScummVM, the virtual machine which acts like an interface between the feelings and the puzzles from the good old times and the modern operating systems. As already highlighted before, the ScummVM target has grown immensely over time, going from the simple support of the 'classic' adventure games par excellence published by Lucasfilm/Lucasarts, to a range that includes virtually any single puzzle-solving game developed from the beginning of time up to the advent of the (Windows) NT platform. The last video game engine added to ScummVM within the past few days is Groovie, created by the software house Trilobyte for its first title released in 1993, The 7th Guest ."

Comment Re:Skype unbreakable? (Score 4, Insightful) 289

Well they can already do that now, for example by installing microphones in suspect's homes, but it requires a court warrant and a considerable amount of work. The Bundestrojaner would make snooping simpler, both in technical and in legal terms. And we know that if technology is cheap and simple, it's going to be used more. That is, i think, the government's goal here: gaining the ability to infiltrate a large number of computers, say of a significant percentage of Muslim citizens, or the globalization sceptics of Attac, or any other group that potentially features undesirable behaviour. No court would ever allow such a sweeping surveillance, and the police doesn't have the resources to bug thousands of homes anyway.
Security

What We Know About the FBI's CIPAV Spyware 207

StonyandCher writes "What is CIPAV? CIPAV stands for 'Computer and Internet Protocol Address Verifier'; a lengthy term for powerful spyware the Federal Bureau of Investigation can bring to bear on web-based crime. It was used last month in a case where someone was emailing bomb threats regularly to a Washington high school. An affidavit by an FBI agent revealed some of the workings of CIPAV. 'According to the court filing, this is [some of] what the CIPAV collects from the infected computer: IP address, Media Access Control address for the network card, List of open TCP and UDP ports, List of running programs ... Last visited URL. Once that initial inventory is conducted, the CIPAV slips into the background and silently monitors all outbound communication, logging every IP address to which the computer connects, and time and date stamping each.' In a Computerworld article, the author attempts to dissect CIPAV's purpose and raises a number of questions such as: What happens to the data the CIPAV collects? Does the CIPAV capture keystrokes? Can the CIPAV spread on its own to other computers, either purposefully or by accident? Does it erase itself after its job is done?"

How Do You Know Your Code is Secure? 349

bvc writes "Marucs Ranum notes that 'It's really hard to tell the difference between a program that works and one that just appears to work.' He explains that he just recently found a buffer overflow in Firewall Toolkit (FWTK), code that he wrote back in 1994. How do you go about making sure your code is secure? Especially if you have to write in a language like C or C++?"

Slashdot Top Deals

Friction is a drag.

Working...