Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Dictionnary attack doesn't show any weakness (Score 1) 217

If the cracker HAS the hashed password file then your security has already been breached. There's about three things on any system that need access to that file: the login system, the password change system and possibly the admin.

The general idea of hashing passwords is that even if an adversary gains access to the password file it can still be secure. This accounts for things that you might not have foreseen, such as intercepted communications. They don't have to access it in storage necessarily. Now you can always say that your users should be using encrypted connections to your server, but the point of the hash is to have a second line of defense, since a password is a very unique type of information where the data doesn't need to be accessed, simply matched. Even if you encrypt your communications, are you sure it is secure? Will it always be secure?

Comment Re:Ill gotten gains (Score 1) 728

If we gained less from this than we paid, of course we'd need to either fix the system or abolish it entirely.

The funny thing though, is that I know plenty of people who make music for free, and have no problem even just giving it away. The thing that makes taxi cabs different from music, is that people make music for fun, and will do it for free. I have no doubt that if copyright no longer applied to music, the only people who would stop making music would be the giant corporations who have just turned music in to mass produced shit. Mainstream artists will still be rich, even if they never sold an album, because they'll be able to draw massive crowds to live performances. They just won't be AS rich. However, everyone else will be benefiting from a tremendous boost in culture, when they are able to download as much music as they want from the mainstream artists who are still making money, but would be exposed to more music created by people with no ulterior motive other than to have fun.

Now as a disclaimer, I don't want to step on anyone's toes here, but I personally think there is no reason being a musician has to be someone's career, it can just be a hobby, which is why if they abolished copyright laws on music tomorrow, I wouldn't have the slightest care about society's wealth of music, because people have and will continue to create it.

Comment Re:Ok great for beginners (Score 1) 640

...but I still know a LOT of people who forward X over SSH, and there are still a lot of professors who are advising their students (at least in the engineering schools I have seen) to do the same. I guess this is one of those times that just saying, "I use Linux!" will not convey what people think.

You mean, "I use GNU/Linux!"

Comment Re:Could that possibly be any more misleading? (Score 0, Redundant) 474

I think it wouldn't be too difficult to do one for /. either. All it would have to do is post immediately after the article hits the front page, and say:

"The analysis here is hugely flawed. Sure, they say [something from the summary], but clearly haven't taken into account [something taken into account halfway through the article], so it can hardly be confirmed that [title]."

That's a Score:5, Insightful comment right there.

You left out the critical, "I know I'll get modded down for this, but..."

Comment Re:Alternate Headline (Score 2, Interesting) 165

I agree, and what is the problem? When I buy something from anyone else, I don't use it, and then demand my money back. Likewise, Google hosts emails for free, in exchange for the fact that they can look at them at any time and do with them what they please. Why should I be upset when there is a breach in privacy? The only difference between posting a message on Facebook, and sending an email through GMail, is that Google has better security settings. It would be ridiculous to use GMail for anything sensitive, just like it would be ridiculous to use Facebook for anything sensitive.

Most people are lulled into a false sense of security because Google doesn't release email data. It's in their best interest not to. But people forget that they have it all there.

Comment Re:Autonomous vehicles (Score 2, Interesting) 157

So the second one person has an accident in an autonomous vehicle, you're looking at major liability and lawsuits directed towards the car manufacturer - whether or not it was their fault and whether or not a human driver could have prevented the accident in *any* car. That manufacturer now has to take responsibility for that car versus every idiot on the road, every pedestrian that runs out and everything that can confuse one of its sensors.

I've thought about this problem for a while, and here is my guess how it will proceed. When cars started being made with cruise control, the responsibility in an accident still belonged to the driver. There are cars being built today which automatically apply brakes when they sense an oncoming collision, but in the event of a malfunction or accident, the human driver is ultimately held responsible.

I don't believe anyone is going to drop an autonomous car into the market, but instead it will simply be more and more iterations of the computer taking control. The human driver will always have a manual override though, and will be responsible for the accidents, simply because that was the status quo. My guess is by the time we do get autonomous cars, people probably won't be paying attention to the road since their cars are driving themselves fine anyway, but they will have signed a disclaimer claiming responsibility anyway. I do think there will be uproars when accidents do occur, like we have seen with the Toyota problem, but not for a long while after we have become comfortable with autonomous vehicles will any law change regarding responsibility.

Comment Social Problem (Score 4, Insightful) 309

You're doing it wrong. If there's anything I've learned in dealing with people, it is never try to create a technical solution to a social problem. If someone wants to make a copy of some secret document, they will quickly learn that the copiers have this software installed and will use a different machine. You need to figure out why they would want to make copies of something you don't want them to, and solve that problem. I could see this being marginally useful for preventing accidental release of information, however the article seems to state that they are trying to stop deliberate users.

A determined user who has guessed the prohibited keyword could get around it by simply substituting numbers or other characters for letters, such as z00 instead of zoo, representatives for Canon conceded.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...