Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Paywalls; HTTPS proxy (Score 1) 396

It's not a behind paywall, it's a free site.

Sites that do not require payment still need to distinguish between users that have registered and visitors that have not as well as between users, such as for comment sections (are you LordWabbit2 or someone who Firesheeped his session cookie?) or "free reg. req." policies.

What network administrator in his right mind would hand out the root certificate to the HTTPS proxy?

Anyone who wants his users to know they are connecting to the correct proxy. Remember that a root certificate contains only the public key, not the private key.

Comment Re:The Legit Bay (Score 1) 81

Hate copyright? Change the friggin' law.

How is that possible when all major TV news sources that cover candidates for federal office share a corporate parent with one of the members of the MPAA? Fox=Fox, CBS=Paramount, ABC=Disney, NBC=Universal, and CNN=Warner. A candidate for federal office who openly opposes the excesses of what copyright has become will draw smear campaigns from all five of these studios' co-owned news channels.

Comment Re:Definition: Secure systems keep working, no mat (Score 1) 343

SQL injection. My work place had a typical example:
INSERT INTO users SET fname='$fname', lname='$lname';

Apart from the fact that you're mixing UPDATE syntax with INSERT syntax, substitution is perfectly valid so long as each string has been sanitized in the correct manner for a particular database connection (that is, not addslashes()). For the MySQLi client library, it looks like this:

$fname = $db->escape_string($fname);
$lname = $db->escape_string($lname);

Don't get me wrong; it's bad practice to escape manually unless you're using operator IN on a database client library that supports neither array parameters nor named placeholders (such as MySQLi). But code that correctly uses $db->escape_string() (or the equivalent for other languages or database drivers) should be safe from SQL injection, just as code that correctly uses htmlspecialchars() should be safe from script injection.

With Clonebox, if a customer's web server is hacked or otherwise damaged, we can switch it over to a ~read-only mirror. Sure that protects against hackers, and some customers have been hacked and used the protection. More often, customers simply screw up and delete important files or databases.

But how long do you keep these mirrors around, in case there's a screw-up that goes undiscovered for a while?

Comment Welfare to discourage Robin Hood gangs (Score 1) 484

The existence of public goods as an argument that taxes are not theft assumes:
1) There is no other way to provide public goods

Please provide a counterexample to the claim "There is no other way [than taxation] to provide public goods" and I'll believe you. Preferably more than one, so that other Slashdot users don't shoot each down as impractical.

would it not be stealing if I took your money and gave it to orphans?

Would it not be stealing if I took your money and used it to shoot other people who try to take not only more of your money but also your life? Police and military are public goods. Giving a reasonable peaceful livelihood to orphans helps reduce the cost of police by keeping orphans from forming gangs that use violence against rich people.

Slashdot Top Deals

Love makes the world go 'round, with a little help from intrinsic angular momentum.

Working...