Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:How were they storing the passwords before? (Score 2, Interesting) 497

From TFA:

[...] this can only mean one of two things, according to Kaspersky:

        Store full plaintext passwords in their database and then compare the first 16 chars only.
        Calculate the hash only on the first 16 and ignore the rest.

I’m fairly certain Microsoft isn’t stupid enough to go with the first option. Storing passwords in clear text would be a disaster,

I wouldn't doubt for a second that MS would go with the first option. They are, after all, competing with Yahoo :-) Also, wasn't it Microsoft that came up with the oxymoronical term "reversible encryption"?

On the other hand, Hotmail was originally built on FreeBSD by non-MS types, so who knows? To this day I still find it amusing to think of all the difficulty they must have had porting the platform to Windows.

Comment Re:Explain me? SSL is not sufficient? (Score 1) 198

Traffic analysis does not require decryption. Someone watching the traffic can still see that you are on Wikipedia, what time you were on the site, how long, and the approximate size of the content you downloaded...or uploaded for that matter.

Say you submitted a post; even encrypted its still possible to see that more bytes were sent than in a normal GET request. Even if your IP is hidden behind your WP login, it is feasibly possible that the timestamp combined with the approximate byte count could be used to identify you. Of course, HTTP keepalives would make this more difficult, but other tricks like checking the referrer header when clicking off to another site could betray you. Even if you are just clicking around, it could be possible to establish a fingerprint of your traffic pattern, using things like byte counts, number of concurrent connections (to identify the number of images on the page perhaps?), etc. that could be used to identify the pages you visited.

Comment Re:Confusing data and information (Score 1) 64

No, I'm sorry, but your analogy is flawed. What actually happened was that Judge Dredd used his Lawgiver-II grenade launcher to destroy a car that was ilegally parked. Within seconds he triumphantly announced that justice had been served via his megaphone. Minutes later, other cars in the megacity were trembling with fear. It wasn't until several hours later that the coucil of judges came up with an adequate rationaliztion for what, on the surface, appeared to be an egregious misuse of police force.

FTFY.

Comment FUD! (Score 1) 161

This article reeks of FUD. The technical challenge alone is pretty unbelievable when you think about it. It's one thing to set up layer 3 policy-based QoS on a handful of service provider core switches, but to coordinate that policy across hundreds of access level devices is quite difficult to say the least...assuming those devices even support it. Never mind that the relationship of consumer to service provider has been less the focus of net neutrality policy than the issue of fairness to content providers.

Comment Re:Another reason... (Score 3, Interesting) 1030

You'll still be able to add your my-cat-fluffys-enterprise-weblog.com and it will still work.

That's unfortunate because, as others have noted, the hosts file "feature" is indeed a relic of a bygone era that should be laid permanently to rest rather than being broken for certain use cases. There seem to be two camps here; the ones that say "leave our beloved feature intact!" and those who say "kill it for the sake of the enterprise!" They are both right -- What MS should do is not break the hosts file or make it behave inconsistently, but replace it with something better.

A Windows service that allows DNS names to be overridden by user request is what is called for here. It could be added as a supported feature ...something that is controlled by group policy and managed through Windows RM to satisfy the enterprise IT folks ...something with a nice UI and possibly new features like pattern matching for the ad-blocking/web-developing user base.

Practically speaking that probably won't happen, as it's always easier to shoot a piece of software in the head than actually improve or replace it...

Comment Re:My previous employer must be desperate right no (Score 1) 337

In a former position, I designed and maintained a recurring billing system for a monthly subscription product that had difficulty retaining customers through each billing cycle. Every March, I would look forward to the inevitable calls from upper management asking why our billing numbers for 3/29, 3/30 and 3/31 were so much lower than the projections on their spreadsheets. It got to the point where I had prepared canned email responses to be automatically sent to remind people of the number of days in February. Leap years were nice (fewer accusations coming my way) considering that only two anniversary dates were missed for first-time billings (3/30 and 3/31) instead of three.

Comment Your own personal Sputnik (Score 1) 119

...is how these sprites being sold to us. Yet it wasn't what Sputnik did while in orbit that made it such a marvel, but the ingenuity that got it there. This is a neat idea, but sorry, geek cred can't be bought for $300 or any other amount. For the same money I could build a rocket that would not make it a fraction of the distance (assuming it didn't blow up on the launch pad), but it would be uniquely mine, as would be whatever "cred" that came with it.

Comment Re:Hi Lazyweb! Alternatives? (Score 1) 80

It's been a while since I looked at Xen so I decided to do some searching to see what additional value XenServer adds to it. I found this document, which says:

Differentiation between virtualization offerings, and between Xen offerings, comes from the value added management features enabled by the parent console.

...and not much else. They took an open-source project, "bought" it for $500 million, did nothing more than put a GUI on it, and were then shocked to discover that no one wanted to buy it. Corporate incompetence never ceases to amaze.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...