Zorro shares a report from The Register: The fourth and finest Doctor, Tom Baker, has reprised the role to finish a Who serial scuppered in 1979 by strike action at the BBC. Shada, penned by Hitchhiker’s Guide author Douglas Adams, was supposed to close Doctor Who’s 17th season. Location filming in Cambridge and a studio session were completed but the strike nixed further work and the project was later shelved entirely for fear it might affect the Beeb’s Christmas-time productions. The remaining parts have been filled in with animation and the voice of 83-year-old Baker, although he also filmed a scene. BBC Worldwide has now released the episodes, which interweave the 1979 footage with the new material to complete the story. “I loved doing Doctor Who, it was life to me, ” Baker told the BBC of his tenure as the much-loved Time Lord. “I used to dread the end of rehearsal because then real life would impinge on me. Doctor Who… when I was in full flight, then I was happy.” Read more of this story at Slashdot.
More:
Tom Baker Returns To Finish Shelved Doctor Who Episodes Penned By Douglas Adams
An anonymous reader quotes BleepingComputer: The Slovak National Security Office (NBU) has identified ten malicious Python libraries uploaded on PyPI — Python Package Index — the official third-party software repository for the Python programming language. NBU experts say attackers used a technique known as typosquatting to upload Python libraries with names similar to legitimate packages — e.g.: “urlib” instead of “urllib.” The PyPI repository does not perform any types of security checks or audits when developers upload new libraries to its index, so attackers had no difficulty in uploading the modules online. Developers who mistyped the package name loaded the malicious libraries in their software’s setup scripts. “These packages contain the exact same code as their upstream package thus their functionality is the same, but the installation script, setup.py, is modified to include a malicious (but relatively benign) code, ” NBU explained. Experts say the malicious code only collected information on infected hosts, such as name and version of the fake package, the username of the user who installed the package, and the user’s computer hostname. Collected data, which looked like “Y:urllib-1.21.1 admin testmachine”, was uploaded to a Chinese IP address. NBU officials contacted PyPI administrators last week who removed the packages before officials published a security advisory on Saturday.” The advisory lays some of the blame on Python’s ‘pip’ tool, which executes arbitrary code during installations without requiring a cryptographic signature. Ars Technica also reports that another team of researchers “was able to seed PyPI with more than 20 libraries that are part of the Python standard library, ” and that group now reports they’ve already received more than 7, 400 pingbacks. Read more of this story at Slashdot.