Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:WTF? (Score 1) 114

The host key pairs are NOT used to authenticate the incoming user.

They're used to prevent MITM attacks (by uniquely identifying the endpoint), so this statement

"It’s hard to say if the key errors means that a remote attacker could log into all of the devices, as it would depend on how the routers are configured for remote authentication."

It's complete bull; the article is written by a clueless moron.

Attackers would have to use the keypairs to setup MITM attacks for EVERY machine they wish to compromise.

Comment Re:Business problem != technology problem (Score 1) 343

Revision controlling machine generated xml (or any other machine generated code) with the assumption that it is human readable (because of the format) is a bad idea, just like keeping compiled binaries under revision control is a bad idea. It is just as non-human readable.

You want to keep the actual human generated source under revision control... which you obviously can't do for any document generated by a GUI.

Sure, you can use revision control to simply keep a history of versions, but that doesn't do anything for any of the multitudes of other reasons to use a RCS.... hell, you can keep a history by just timestamping every revision of file in their filenames.

Slashdot Top Deals

The system was down for backups from 5am to 10am last Saturday.

Working...