Can the Taliban in Afghanistan be defeated? AL JAZEERA ENGLISH (AJE)(cached at May 7, 2017, 11:30 pm)

The armed group's spring offensive is under way, and it is gaining ground.
Intel's Remote Hijacking Flaw Was 'Worse Than Anyone Thought' Slashdotby EditorDavid on intel at January 1, 1970, 1:00 am (cached at May 7, 2017, 11:04 pm)

An anonymous reader quotes Ars Technica: A remote hijacking flaw that lurked in Intel chips for seven years was more severe than many people imagined, because it allowed hackers to remotely gain administrative control over huge fleets of computers without entering a password. This is according to technical analyses published Friday... AMT makes it possible to log into a computer and exercise the same control enjoyed by administrators with physical access [and] was set up to require a password before it could be remotely accessed over a Web browser interface. But, remarkably, that authentication mechanism can be bypassed by entering any text string -- or no text at all... "Authentication still worked" even when the wrong hash was entered, Tenable Director of Reverse Engineering Carlos Perez wrote. "We had discovered a complete bypass of the authentication scheme." A separate technical analysis from Embedi, the security firm Intel credited with first disclosing the vulnerability, arrived at the same conclusion... Making matters worse, unauthorized accesses typically aren't logged by the PC because AMT has direct access to the computer's network hardware... The packets bypass the OS completely. The article adds that Intel officials "said they expect PC makers to release a patch next week." And in the meantime? "Intel is urging customers to download and run this discovery tool to diagnose potentially vulnerable computers." Saturday Ars Technica found more than 8,500 systems with an AMT interface exposed to the internet using the Shodan search engine -- over 2,000 in the United States -- adding that "many others may be accessible via organizational networks."

Read more of this story at Slashdot.

Intel's Remote Hijacking Flaw Was 'Worse Than Anyone Thought' Slashdotby EditorDavid on intel at January 1, 1970, 1:00 am (cached at May 7, 2017, 11:04 pm)

An anonymous reader quotes Ars Technica: A remote hijacking flaw that lurked in Intel chips for seven years was more severe than many people imagined, because it allowed hackers to remotely gain administrative control over huge fleets of computers without entering a password. This is according to technical analyses published Friday... AMT makes it possible to log into a computer and exercise the same control enjoyed by administrators with physical access [and] was set up to require a password before it could be remotely accessed over a Web browser interface. But, remarkably, that authentication mechanism can be bypassed by entering any text string -- or no text at all... "Authentication still worked" even when the wrong hash was entered, Tenable Director of Reverse Engineering Carlos Perez wrote. "We had discovered a complete bypass of the authentication scheme." A separate technical analysis from Embedi, the security firm Intel credited with first disclosing the vulnerability, arrived at the same conclusion... Making matters worse, unauthorized accesses typically aren't logged by the PC because AMT has direct access to the computer's network hardware... The packets bypass the OS completely. The article adds that Intel officials "said they expect PC makers to release a patch next week." And in the meantime? "Intel is urging customers to download and run this discovery tool to diagnose potentially vulnerable computers." Saturday Ars Technica found more than 8,500 systems with an AMT interface exposed to the internet using the Shodan search engine -- over 2,000 in the United States -- adding that "many others may be accessible via organizational networks."

Read more of this story at Slashdot.

Pakistan, Afghanistan dispute toll after clashes AL JAZEERA ENGLISH (AJE)(cached at May 7, 2017, 11:00 pm)

Kabul denies Islamabad's claim that its forces killed 50 Afghan soldiers as tensions deepen over border fighting.
How <em>Psychology Today</em> Sees Richard Stallman Slashdotby EditorDavid on gnu at January 1, 1970, 1:00 am (cached at May 7, 2017, 10:04 pm)

After our article about Richard Stallman's new video interview, Slashdot reader silverjacket shared this recent profile from Psychology Today that describes Richard Stallman's quest "to save us from a web of spyware -- and from ourselves." By using proprietary software, Stallman believes, we are forfeiting control of our computers, and thus of our digital lives. In his denunciation of all nonfree software as inherently abusive and unethical, he has alienated many possible allies and followers. But he is not here to make friends. He is here to save us from a software industry he considers predatory in ways we've yet to recognize... for Stallman, moralism is the whole point. If you write or use free software only for practical reasons, you'll stop when it's inconvenient, and freedom will disappear. Stallman collaborator Eben Moglen -- a law professor at Columbia, as well as the FSF's general counsel -- assesses Stallman's legacy by saying "the idea of copyleft and the proposition that social and political freedom can't happen in a society without technological freedom -- those are his long-term meanings. And humanity will be aware of those meanings for centuries, whatever it does about them." The article also includes quotes from Linus Torvalds and Eric S. Raymond -- along with some great artwork. In addition to insisting the reporter refer to Linux as "GNU/Linux," Stallman also required that the article describe free software without using the term open source, a phrase he sees as "a way that people who disagree with me try to cause the ethical issues to be forgotten." And he ultimately got Psychology Today to tell its readers that "Nearly all the software on our phones and computers, as well as on other machines, is nonfree or 'proprietary' software and is riddled with spyware and back doors installed by Apple, Google, Microsoft, and the like."

Read more of this story at Slashdot.

How <em>Psychology Today</em> Sees Richard Stallman Slashdotby EditorDavid on gnu at January 1, 1970, 1:00 am (cached at May 7, 2017, 10:04 pm)

After our article about Richard Stallman's new video interview, Slashdot reader silverjacket shared this recent profile from Psychology Today that describes Richard Stallman's quest "to save us from a web of spyware -- and from ourselves." By using proprietary software, Stallman believes, we are forfeiting control of our computers, and thus of our digital lives. In his denunciation of all nonfree software as inherently abusive and unethical, he has alienated many possible allies and followers. But he is not here to make friends. He is here to save us from a software industry he considers predatory in ways we've yet to recognize... for Stallman, moralism is the whole point. If you write or use free software only for practical reasons, you'll stop when it's inconvenient, and freedom will disappear. Stallman collaborator Eben Moglen -- a law professor at Columbia, as well as the FSF's general counsel -- assesses Stallman's legacy by saying "the idea of copyleft and the proposition that social and political freedom can't happen in a society without technological freedom -- those are his long-term meanings. And humanity will be aware of those meanings for centuries, whatever it does about them." The article also includes quotes from Linus Torvalds and Eric S. Raymond -- along with some great artwork. In addition to insisting the reporter refer to Linux as "GNU/Linux," Stallman also required that the article describe free software without using the term open source, a phrase he sees as "a way that people who disagree with me try to cause the ethical issues to be forgotten." And he ultimately got Psychology Today to tell its readers that "Nearly all the software on our phones and computers, as well as on other machines, is nonfree or 'proprietary' software and is riddled with spyware and back doors installed by Apple, Google, Microsoft, and the like."

Read more of this story at Slashdot.

App-RL-0.2.32 search.cpan.orgby Qiang Wang at January 1, 1970, 1:00 am (cached at May 7, 2017, 10:03 pm)

operating chromosome runlist files
App-RL-0.2.32 search.cpan.orgby Qiang Wang at January 1, 1970, 1:00 am (cached at May 7, 2017, 10:03 pm)

operating chromosome runlist files
Asm-X86-0.25 search.cpan.orgby Bogdan Drozdowski at January 1, 1970, 1:00 am (cached at May 7, 2017, 10:03 pm)

List of instructions and registers of Intel x86-compatible processors,
Asm-X86-0.25 search.cpan.orgby Bogdan Drozdowski at January 1, 1970, 1:00 am (cached at May 7, 2017, 10:03 pm)

List of instructions and registers of Intel x86-compatible processors,
File-Path-2.12_008 search.cpan.orgby James E Keenan at January 1, 1970, 1:00 am (cached at May 7, 2017, 10:03 pm)

Create or remove directory trees
File-Path-2.12_008 search.cpan.orgby James E Keenan at January 1, 1970, 1:00 am (cached at May 7, 2017, 10:03 pm)

Create or remove directory trees
Lemplate-0.10 search.cpan.orgby Yichun Zhang (章亦春) at January 1, 1970, 1:00 am (cached at May 7, 2017, 10:03 pm)

OpenResty/Lua template framework implementing Perl's TT2 templating language
Lemplate-0.10 search.cpan.orgby Yichun Zhang (章亦春) at January 1, 1970, 1:00 am (cached at May 7, 2017, 10:03 pm)

OpenResty/Lua template framework implementing Perl's TT2 templating language
Lemplate-0.11 search.cpan.orgby Yichun Zhang (章亦春) at January 1, 1970, 1:00 am (cached at May 7, 2017, 10:03 pm)

OpenResty/Lua template framework implementing Perl's TT2 templating language