19 stories
·
0 followers

Live Patching Now Available For Linux

2 Shares
New submitter cyranix writes "You may never have to reboot your Linux machine ever again, even for kernel patching," and excerpts from the long (and nicely human-readable) description of newly merged kernel code that does what Ksplice has for quite a while (namely, offer live updating for Linux systems, no downtime required), but without Oracle's control. It provides a basic infrastructure for function "live patching" (i.e. code redirection), including API for kernel modules containing the actual patches, and API/ABI for userspace to be able to operate on the patches (look up what patches are applied, enable/disable them, etc). It's relatively simple and minimalistic, as it's making use of existing kernel infrastructure (namely ftrace) as much as possible. It's also self-contained, in a sense that it doesn't hook itself in any other kernel subsystem (it doesn't even touch any other code). It's now implemented for x86 only as a reference architecture, but support for powerpc, s390 and arm is already in the works (adding arch-specific support basically boils down to teaching ftrace about regs-saving).

Read more of this story at Slashdot.








Read the whole story
tw3bb
3568 days ago
reply
Share this story
Delete

Malware using GoogleCode for distribution

1 Share
Malware hosting sites rarely stay up for too long. After the first few instances are seen by security vendors, they are added to blacklists which, in turn, are fed into other blacklists throughout the industry. Malware writers are now turning to commercial file hosting sites to peddle their warez. If these legitimate file hosts are not scanning the content they are hosting, it may force lead
Read the whole story
tw3bb
4115 days ago
reply
Share this story
Delete

Hacking Group Linked To Chinese Army Caught Attacking Dummy Water Plant

1 Share
holy_calamity writes "MIT Technology Review reports that APT1, the China-based hacking group said to steal data from U.S. companies, has been caught taking over a decoy water plant control system. The honeypot mimicked the remote access control panels and physical control system of a U.S. municipal water plant. The decoy was one of 12 set up in 8 countries around the world, which together attracted more than 70 attacks, 10 of which completely compromised the control system. China and Russia were the leading sources of the attacks. The researcher behind the study says his results provide the first clear evidence that people actively seek to exploit the many security problems of industrial systems."

Read more of this story at Slashdot.



Read the whole story
tw3bb
4126 days ago
reply
Share this story
Delete

11" MacBook Air Owner Connects High-End Graphics Card With Complex Thunderbolt Setup

2 Comments and 3 Shares
Larry Gadea, a user on the Tech Inferno forums, has shown off a unique setup whereby he connects a graphics card to the 11" MacBook Air via a series of adapters.

He uses a Thunderbolt to Express Card adapter, then connects an ExpressCard to PCI-Express adapter, and finally to a Windows-compatible video card. The final result is somewhat bulky but seems to provide an excellent gaming experience.

Macbookairwthunderboltgpu
It has become very clear that gaming is not only high-performance, but super practical on an 11" Macbook Air. There's so much going against it: this hodgepodge of adapters, it has a low voltage CPU, disaster of wiring and exposed sensitive parts, crazy boot-time chainloading software, Intel killing companies producing adapters and products left right and center via legal threats, etc. but somehow, with the right parts and some patience, it works spectacularly. And is quite cheap too!
The full article goes deep into frame rates and benchmarking a variety of games, noting that -- though users need to use Boot Camp to run Windows because of graphics card driver requirements -- advanced PC gaming on the MacBook Air is workable with a little technical know-how.

Because his setup can be easily unplugged, it is especially useful for gamers who want to play games on a desktop-screen but still have a lightweight notebook for traveling. It could also conceivably be used on other Thunderbolt-equipped Macs, including the iMac and the upcoming Mac Pro.


Thanks Eli!


Recent Mac and iOS Blog Stories
Kindle for iOS Updated with In-App Sample Search and Downloads
'Showtime Anytime' Adds Live Streaming of Showtime East and West Channels
Extended Developer Center Outage May Be Causing App Review Delays [Updated]
Sprint Sells 1.4 Million iPhones in Q2 2013, 41% to New Customers
Netflix's Personalized User Profiles Begin Showing Up on Apple TV
Apple TV Beta Software Adds iTunes Music Purchases
Apple Releases iTunes 11.1 Beta 1 to Developers, Includes iTunes Radio
Mac Mini Again Shipping Within 24 Hours in the U.S.
    


Read the whole story
tw3bb
4130 days ago
reply
Share this story
Delete
1 public comment
j_k
4130 days ago
reply
interesting

Cybercrooks Increasingly Use Tor Network To Control Botnets

1 Share
alphadogg writes "Malware writers are increasingly considering the Tor anonymity network as an option for hiding the real location of their command-and-control servers, according to researchers from security firm ESET. The researchers recently came across two botnet-type malware programs that use C&C servers operating as Tor 'hidden services.' The Tor Hidden Service protocol allows users to set up services — usually Web servers — that can only be accessed from within the Tor network through a random-looking hostname that ends in the .onion pseudo domain extension. The traffic between a Tor client and a Tor hidden service is encrypted and is randomly routed through a series of computers participating in the network and acting as relays."

Read more of this story at Slashdot.



Read the whole story
tw3bb
4135 days ago
reply
Share this story
Delete

MasterCard and Visa Start Banning VPN Providers

2 Shares
Nyder sends this quote from TorrentFreak: "Swedish payment service provider Payson received an email stating that VPN services are no longer allowed to accept Visa and MasterCard payments due to a recent policy change. ... The new policy went into effect on Monday, leaving customers with a two-day window to find a solution. While the email remains vague about why this drastic decision was taken, in a telephone call Payson confirmed that it was complying with an urgent requirement from Visa and MasterCard to stop accepting payments for VPN services. 'It means that U.S. companies are forcing non-American companies not to allow people to protest their privacy and be anonymous, and thus the NSA can spy even more.'" Oddly, this comes alongside news that MasterCard has backed down on its financial blockade against WikiLeaks.

Read more of this story at Slashdot.



Read the whole story
tw3bb
4157 days ago
reply
Share this story
Delete
Next Page of Stories