Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
It's funny.  Laugh.

Trojan Found At Torrent Sites Insists "Downloading Is Wrong" 345

NoisySplatter writes "Ernesto, founder of TorrentFreak, reports that a new trojan, 'Troj/Qhost-AC,' has been distributed on The Pirate Bay. The virus was disguised as a serial key generator, and the offending torrent has since been removed, but the source has not been identified. Troj/Qhost-AC makes changes to the user's hosts file that redirects The Pirate Bay, Suprbay, and Mininova to 127.0.0.1. In addition to making three popular torrent sites inaccessible, the virus also plays a sound file that says: 'downloading is wrong.' It looks like someone has finally stepped up to the plate to challenge Madonna for the title of 'Most Obnoxious Anti-Piracy Stunt.' Of course, this could just be the software industry's attempt at outdoing the RIAA and MPAA."
Security

US Planning Response To a Cyber Attack 359

We've all heard of Google bombing; the US Government may be taking the expression rather literally. Planning is now underway across the government for the proper way to respond to a cyber attack, and options on the table include launching a cyber counterattack or even bombing the attack's source. The article makes clear that no settled plan is in place, and quotes one spokesman as saying "the preferred route would be warning the source to shut down the attack before a military response." That's assuming the source could be found. From the article: "If the United States found itself under a major cyberattack aimed at undermining the nations critical information infrastructure, the Department of Defense is prepared, based on the authority of the president, to launch a cyber counterattack or an actual bombing of an attack source."
The Internet

How The Internet Works - With Tubes 664

Chardish writes "In an attempt to explain his reasons for voting against a Net Neutrality bill this past Thursday, Alaska Senator Ted Stevens delivered a jaw-dropping attempt to explain how the Internet works. Said Stevens: 'They want to deliver vast amounts of information over the internet. And again, the internet is not something you just dump something on. It's not a truck. It's a series of tubes. And if you don't understand those tubes can be filled and if they are filled, when you put your message in, it gets in line and its going to be delayed by anyone that puts into that tube enormous amounts of material, enormous amounts of material.'"

Vodafone Quitting Japan 169

dimension6 writes "Reuters is reporting that Vodafone, the world's largest mobile phone operator, is quitting business in Japan. Vodafone has been having a difficult time since they entered the Japanese market, a result of many blunders such as introducing Nokia brick phones where flip-phones are the norm and being slow to adopt 3G technology widely used by its competitors. Vodafone claimed that being part of the most advanced mobile phone market helped boost their sales elsewhere, but few Japanese-market phones have made it to other countries. The Japanese Vodafone division is likely to be bought by Softbank, the largest ISP in Japan."
United States

Journal Journal: IS the United States Department of Homeland Security secure?

Suddenly it seems the the U.S. Department of Homeland Security is having "some homeland cyber security issues on its systems" since they're not running Wndows 2003 yet according to Steve Cooper who's the Department CIO. I belive password complexity requirements can be used in Windows XP perfectly fine. Although Cooper said Windows 2003 will comply with their needs for the minimum requirements of passwords set on all emplyees machines and phone systems. "As we complete the transition to
X

Journal Journal: My wonderful switch to WindowMaker

Well, it's not like I didn't use WMaker before but yesterday I decided to switch entirely to it. Now I'm in the process of installing GNUStep. After that I'll install Mail.app and some other neat stuff (I'm getting obsessed with NeXT look'n'feel now). Peace all ;)
Hardware

Journal Journal: Quest for the ultimate computer | Part 1

Did anyone else noticed how I like to divide my posts into parts ? Ok, so here is the story so far. I wanted to build my own computer from scratch . Not just assemble ready to go parts, but to actually design a CPU, motherboard and all that. So this series of enteries will focus on building a homebrew computer. Note that I will try to use TTL chips and refrain from using relays as much as possible. This is it for today folks. Any suggestions will be welcomed.

Operating Systems

Journal Journal: Life after Windows [and (SCO)GNU/Linux] | Part 1 1

So, to begin :) I used Windows 98 and ME for quite some time (oh, about a year) and got used to random crashes, missing DLL files and other unusual annoying things associated with Microsoft's product line. One day I said "Enough with this bull !" and switched to GNU/Linux. My first attempt was unsuccesful however (for I tried to install Red Hat 5.2 on a stock IBM Aptiva with such wonders as WinModem and onboard SiS video card, not to mention ESS onboard

Slashdot Top Deals

Make sure your code does nothing gracefully.

Working...