Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Betteridge says (Score 5, Insightful) 184

I remember when Americans thought pre-WWII German security was outrageous. Papieren, bitte (Papers, please)!

Americans were proud that they could go anywhere they wanted without being stopped and harassed or even asked who they were, and made fun of those not so lucky.

These days, if Americans were only asked for papers, they would be confused.
It has become a land of chickenshit cowards who shiver in fear, and behave like cattle being prodded.

No, the terrorists have not won, but we have lost far more than what the terrorists could have hoped for: Our hearts.

Comment Re:class act (Score 1) 171

IMO though, Chelsea should be depicted as a girl IRL. Also. I played a game with a nerd who use to go by the name Chelsea.

What I don't get is that she changed from a first name that was a surname to a place name which by definition is unisex in nature. It's like changing your first name from Davis to Islington.

Anyhow, the point of a statue would, I presume, be to depict what people remember and recognize. We don't see many statues of Rosa Parks, Elvis, Jo DiMaggio and Neil Armstrong from their latter years, for example.

Comment Re:Here come the certificate flaw deniers....... (Score 1) 80

A private key can be used to generate a public key.

No, it cannot. You probably think it does because of files that save both the private key and public key in the same file, like your typical .ssh/id_dsa file does.

A certificate is just a piece of data signed with a private key.

Not _just_ data. Among other things, it contains the public key.

A cert does not have to include the public key. It is often included for convenience, but it is enough that it contains a signature for the key and description on how to get it.
For large keys, or repeated traffic, including a short URI can be far more bandwidth friendly and time saving than including it - if the recipient already has the key, it does then not need to be re-sent.

Comment Re:Here come the certificate flaw deniers....... (Score 1) 80

Fail. A certificate contains a public key. This is nothing like a password. You're thinking of a private key. The whole point of a certificate is that you can prove your identity to someone without sending them your password.

I see what you're trying to tell him, but you make it sound like there is a technical difference between private and public keys.
They are really just two keys of a key pair, and anything locked with one can only be unlocked by the other. Which one is named "private" and which one is named "public" does not really make a technical difference.
It's customary to have the shorter of the two keys be designated the public key, and also common to store a copy of the public key with the private key for convenience, so it can be extracted on need. But that's not a technical difference.

A certificate is just a piece of data signed with a private key.
A key chain is just a bunch of public keys with certificates, one of which you're supposed to trust, and then you let that trust be inherited to anything below it. Inherited trust has always had its flaws, and signing does not change this. Just because you trust Anna and Anna vouches for Bridget, doesn't mean you should trust whoever Bridget vouches for, and whoever those in turn vouches for. That's like betting that friends of friends of friends will always be good people (or even who they claim to be).

Comment Re:This whole Sony story (Score 1) 80

When you're talking about a company like Sony, which is really a zillion separate entities under one umbrella, I find it hard to believe Sony could have reacted so quickly as to lock down all other sites in one day.

I'm betting no company that big is capable of responding that fast.

It depends on what kind of people they have hired. Those who actually take an interest and read underground news multiple times a day are more likely to have fixes in place long before the need is evaluated, determined and requested up and down the corporate chain.
Even if it should break with policies to patch without permission, a halfway decent sysadmin would invoke emergency powers in cases like this, and do the paperwork later.

Comment Re:uh oh (Score 1) 209

NASA is concerned about the health of its employees. Especially the ones who go off planet.

I can understand that.
What I do not understand is NASA having a need to know who I am and whether I have been treated for hemorrhoids, dog bites and male pattern baldness, or why my girlfriend visited Planned Parenthood.

Comment Re:On the other hand, the Jihadists perform (Score 5, Insightful) 772

It's also beside the point.
The people in Guantanamo has not been found guilty of beheadings. Do you really think it's the right thing to torture individuals for something other individuals of the same faith and complexion did at a later date? Can I torture you a little for what Jeffrey Dahmer did?

If anything, torturing prisoners is used as a justification for what's done to hostages by others.

No one has a right to condone inhuman behavior and then act offended when others respond with inhuman behavior. We reap what we sow.

Comment Re:Really? .. it comes with the job (Score 1) 772

The US Constitution only applies to US citizens. Certainly not to unlawful enemy combatants.

What are the first three words of the Constitution? "We the citizens?"
No, the constitution goes to great lengths to not limit rights to citizens except where it is natural (like rights to vote or run for office).

And what court has decided that they are "unlawful"? To be unlawful, there has to be law. Not just hearsay.

Comment Re:As far as I'm concerned, Pluto is still a plane (Score 1) 77

The purpose of technical terminology is to be as clear and efficient as possible. Imagine having to say 'major planet' every time you wanted to talk about Earth or Mars or Jupiter. "Earth is the third major planet from the Sun." It's tedious.

As far as I can tell, the solar system has two major planets[1], two medium planets[2], two minor planets[3], and various microplanets[4].

1: Jupiter, Saturn
2: Uranus, Neptune
3: Earth, Venus
4: Mars, Mercury, Ceres, Pluto/Charon, Eris etc.

Comment Re:A thousand KBOs discovered, not dwarf planets (Score 1) 77

To quote Wikipedia: "The IAU recognizes five bodies as dwarf planets: Ceres, Pluto, Eris, Haumea, and Makemake".
2015 will be a great year for looking at two of these. As well as New Horizons, there is also the Dawn probe on its way to orbit Ceres.

Two, but possibly three. To quote IAU a bit more:

"For now, Charon is considered just to be Pluto's satellite. The idea that Charon might qualify to be called a dwarf planet in its own right may be considered later. Charon may receive consideration because Pluto and Charon are comparable in size and orbit each other, rather than just being a satellite orbiting a planet. Most important for Charon's case as a dwarf planet is that the centre of gravity about which Charon orbits is not inside of the system primary, Pluto. Instead this centre of gravity, called the barycentre, resides in free space between Pluto and Charon."

Comment Re: ... Everything? (Score 2) 528

If they'd had traffic shaping in place, there's no way anyone would have got 100 terrabytes of anything out of the company ;-)

And no way to have automated offsite backups either.

If I were interested in a company's data, gaining access to backups and backup servers is where I'd initially focus anyhow. You get the data from a multitude of machines without having to access all of them.
Easiest are probably a fairly common corporate backup system where the policies are set on the server for convenience, so if you gain access to the server, you can tell it to drop encryption and automatically store a copy at $remote_host. Instant pot of gold.

Comment Re:Every 30 days. (Score 1) 247

There are a few minor tweaks that significantly increase entropy will still not being hard to remember:

1) Don't capitalize the first letter in a word used in a passphrase. Instead, capitalize something in the middle.

2) When adding numbers, add somewhere in the middle of a word rather than between words.

3) If security is really important, spell one longish word backwards before apply 1 and 2.

4) Another trick I've used many times (as a touch typist) is to type words with your fingers slid over one key, left, right, or upleft/upright. Thus a simple, common word like "login" becomes ";phom", "kifub", "o9t8h", or "p0y9j" .

1: You have to remember which letter.
2: You have to remember where it was inserted.
3: You have to remember which word, and be good at sdrawkcab.
4: You have to remember which way you displaced your hands. Also, john and crack both have rules for that.

All in all, what you ensure is that the user forgets his password.

And sometimes forgetting the password is an acceptable solution. If the mail server can be considered uncompromised and always up, and the application server can deliver through a direct hardcoded route, sending a one time password might be a good solution. But that are a couple of pretty big ifs.

Comment Re:North Korea? (Score 4, Funny) 528

think what happened most likely was, NK officials went to China, hired "internet baddies", and paid them to fuck Sony Pictures in the ass with their biggest internet broomstick.

No technical expertise or infrastructure needed.

My guess is that a manager with too much access recklessly inserted a 2005-era music CD from Sony...

No expertise at all required to be a manager.

Comment Re:Lawsuits and Patents (Score 3, Insightful) 528

Plus Patents. Sony files THOUSANDS of patents a year. If that patent information (or research that could be patented) is published to the wild before SONY patents it, you have a LOT of new prior art and a fortune in IP at risk... SONY would have to patent everything within a year in the US; I am not sure that you even have that grace period everywhere else.

I think you confuse Sony Pictures with Sony Corporation.

The former is unlikely to have a lot of patents, except for things like camera gimbals or ways to strip and reattach continuity reports to digital footage.

Slashdot Top Deals

Make sure your code does nothing gracefully.

Working...