Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Seriously? (Score 1) 497

First, you don't know how much google's passwords accept. You know that they don't tell you it's only 16, and it may be 17, but it probably isn't 10'000. So where's your line? Is 17 enough? What about 32? How about six megs?

Six megs should be enough to break to most web server configurations for the maximum HTTP POST size. :-)

Comment Re:When this happens... (Score 1) 497

Whenever I see any website that rejects passwords longer than X characters, I turn away and go somewhere else.

Allow me to nitpick: all websites do for sufficient values of X. Most browsers have a built-in maximum for the length of input fields (32-bit unsigned int for Webkit, 65535 characters) and most webservers have a maximum size configured for HTTP POST requests. ;-)

Comment Re:When this happens... (Score 1) 497

The question that should be asked is, "What's a 'Special Character' and why shouldn't it be allowed in a password?"

I had this argument with a developer the other day.

Any character that cannot be hashes or escaped before sending it to the storage backend. (Which, agreed, on a modern platform are none.)

When I started web programming in 1995 some sites had little more than CSV files for storing data. Input filtering then suddenly makes a lot of sense, especially because handy utility methods for hashing and escaping weren't as widely available in all languages as they are now. Any developer still opting for such requirements is obviously an old-timer who hasn't updated his or her skills, or was trained by one.

Comment Re:Shortens password? (Score 1) 497

Does this mean they were storing the passwords in cleartext? In a real system they would simply be storing the hashes, shortening the password would cause it to create a different hash and not match.

Not necessarily. The UNIX crypt(3) algorithm uses only the first 8 characters of any password. Given Hotmail's age I'm sure something similar is going on here. Not every website was developed in an era of HMAC-SHA-512 with proper salt and pepper flavouring.

It would however be possible for them to upgrade passwords upon login (in which case the unhashed match would be available from input), but for a system the size of Hotmail it would take forever before the legacy support could be deprecated.

Comment Re:Vodafone Netherlands (Score 1) 105

When I asked about the differences a few months ago, the Vodafone customer service told me: "The information on your Vodafone account online is the real usage. Numbers from data usage apps are not reliable." But I highly doubt that I used 36 MB over the last day of the month, so it seems that within Vodafone they have different systems.

Most likely the numbers in their on-line usage monitor are not truly up-to-date. The Vodafone website here in the Netherlands is not always the best example of engineering.

Comment Re:Collect as little as possible, throw it away... (Score 1) 120

I have been toying with a site idea. Your account name is your public key fingerprint. You public nicname is whatever you use in the message. Your login is validated because everything you send is signed wiht the key that matches the fingerprint (and encrypted with my public key for transmision). Input to user form is constrained and validated within those constraints (to prevent padding attacks).

I would then have a database "key x","paid through date y".

Sure, I couldn't sell any farmed data a-la facebook, but suppoena requests woudl be a breze... "here's your hex dump..."

If you accept payments, wouldn't those keys still be linked to contact information and/or payment transactions?

Comment Re:Doesn't matter in the end (Score 2) 472

The "TODO" flag isn't what's wrong there, the "this" part is. It's obvious that the TODO relates to the nearby code (this, not that). It's still not obvious what needs to be fixed. It could be a lack of performance, error handling, input validation. Some use-cases/states/values might not be covered/tested/identified or implemented. But the answer is always: why. Ask yourself "why am I adding a comment here" and the answer is the perfect comment.

Comment Re:Look at the bright side (Score 1) 224

People not so long ago would have said that about many of the things we take for granted today.

And those people were right, for dozens of generations to come. What we might achieve in 2300 is not relevant today. Sure, we must try to continue scientific and technologic progress. With both revolutionary discoveries and evolutionary practical solutions. But constructing a planet, as of now, is indeed totally out of reach.

What we have to show for is just a single permanently inhabited construction in orbit, just one dozen of men on the moon in total and an growing but still insignificant number of unmanned landings on other bodies orbiting Sol. While I'm hopeful our descendents could create an artificial planet, I have to agree with GP that we, the humans alive as we speak, will most certainly not.

Comment Re:bugs.txt (Score 4, Interesting) 221

I wrote find-issues.sh, a script that extracts comments of a certain type within the code and then groups them by file. Downside: your code files change when you register a bug. Upside: when done right, your bug description is next to the code that needs fixing.

Obviously won't work for distributed development, but for single-coder projects, it's really been useful to me.
Note some assumptions and grep magic to exclude third-party files and other non-code files.

#!/bin/sh

LASTFILE=""
egrep -ri "(WARNING|HACK|FIXME|TODO|BUG)" . | egrep -vi "(\.git|debug|/third-party|/locale|/prettify|doc/|/jquery-|lib/s3.php|/jwysiwyg/|^./(.*)\.(txt|conf|xml):(.*))" | while read LINE ; do
        FILE=`echo "${LINE}" | cut -d":" -f1`
        DATA=`echo "${LINE}" | cut -d":" -f2- | cut -d"/" -f3-`
        LEVEL=`echo "${DATA}" | cut -d":" -f1`
        COMMENT=`echo "${DATA}" | cut -d":" -f2-`

        if [ "x${LASTFILE}" != "x${FILE}" ]; then
                if [ "x${LASTFILE}" != "x1" ]; then
                        echo
                fi
                printf "%s:\n" "${FILE}"
                LASTFILE=${FILE}
        fi
        printf "%5s:%s\n" "${LEVEL}" "${COMMENT}"
done

Slashdot Top Deals

Reality must take precedence over public relations, for Mother Nature cannot be fooled. -- R.P. Feynman

Working...