Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:But how did it become widespread in Flash? (Score 1) 39

Simply became common practice as Flash apps were developed.

Moving Flash to mobile touch devices didn't cause developers to go back and re-write existing Flash apps. So we're stuck with the crap that doesn't work on touch devices, or idiotic solutions that add button crap to the screen to work around it.

Had Adobe created a Mobile Flash compatibility standard and only allowed Mobile Flash to load it, but otherwise supported the whole Flash environment it could have been possible to pressure developers to migrate.

Comment Re:It's Surprising (Score 2) 333

Right at opening the staff of various stores are often occupied with opening duties. Putting out new signs, fresh food in the deli, etc. I could easily see walking in, picking up a few items and going through the self-checkout without knowing the stores was otherwise empty. I mean, sure, I might clue in something is wrong when going through the checkout and seeing no cashiers, but hey the self-checkout is working so why worry about it...

Comment Provide Root, or get stuffer (Score 1) 1307

If it were my network you would either provide IT with root access, or it would be physically removed from the network permanently.
If you were to do such again and firing you was not an option I would revoke your access to all network resources.

Rogue users in a hospital environment (where privacy regulations have teeth) are not to be tolerated.

Comment Re:You can never sanitize inputs enough. (Score 1) 288

The trick to handling specialized, user configurable sort and column selection isn't all that hard; if you can't do it any other way you use a Table to translate a string like "SERIAL NUMBER" to the fieldname "SERIAL_NUMBER". The data actually used from the table is created and maintained by the developer and is therefor trusted. The field displayed, or even entered by the user is used for selecting the appropriate field to build the query. The users input is NEVER used directly to build a query.

This means you can build the initial query using bind variables, and use the results of the query to build whatever dynamic queries you need.

Comment You can never sanitize inputs enough. (Score 1) 288

You can never sanitize inputs enough.
Repeat that to yourself 1,000 times. It's impossible(*).
Parameterized queries / bind variables are the only valid solution.

If you keep convincing yourself you don't need to use bind variables, and that you can sanitize your inputs enough you've already failed.

* - Of course it's mathematically possible to sanitize inputs enough; because theory, and reality don't have a damn thing to do with each other. Reality says you will fuck it up and the hackers will find it in less time than it takes you to read the code.

Comment Re:Ummm... no. (Score 2) 244

Some modems would report the link speed as 115000bps. This was the speed the computer talked to the modem at, not the speed at which the modem talked to the other computer. Some modems would only report 115000bps if the connection had certain data compression functions enabled.

The effective rate for transmitting data on a 56Kbps link could exceed 115Kbps when compression was used, but if the modem used a standard serial interface then 115000bps is the maximum rate it could support.

Non-compressed data would never exceed 56Kbps on such a link.

Slashdot Top Deals

"Remember, extremism in the nondefense of moderation is not a virtue." -- Peter Neumann, about usenet

Working...