Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Big F U to Adobe (and others) (Score 1) 983

Seems to me like a big problem for MonoTouch too :(
It is a commercial project based on Mono for compiling C# code into native iPhone code.
It's a shame how the programming languages eco-system for the iPhone is so small.
While a good programmer can program well with any language, I would still rather program in C#/Python/Java than Objective-C.

Comment Re:If you want to encrypt your data (Score 3, Insightful) 71

I think simply implementing the breaking algorithm in your favorite language on your PC would be more convenient and also give results much faster ;-))

You are right of course:

Nevertheless the victor's 1.4 GHz laptop, running his own code, took less than a minute to find the settings for all 12 wheels... 240 times faster than Colossus. If you scale the CPU frequency by that factor, you get an equivalent clock of 5.8 MHz for Colossus. That is a remarkable speed for a computer built in 1944.

You still get massive geek cred. either way :)

Comment Re:If you want to encrypt your data (Score 1) 71

while they don't showcase a running Bombe replica, I saw at Bletchley Park a fully running rebuild of the Colossus machine, which was used at WW2 to break the more complex encryption utilized by the Lorenz SZ40 machine.
Since it has programmable boolean functions I bet it can be used to break Enigma code as well.

Comment Loopholes, more like Landmines (Score 1) 307

There are things in licenses that are just made to cause trouble.

For example, Windows Server licenses are tied to a specific piece of hardware. You have to have enough licenses for every virtual Windows server on each host in an ESX cluster. The maximum number that will ever exist on one box multiplied by the number of boxes. There are other options like Datacenter, where you just have to count the chips, not the cores.

Going the other way, if anyone were silly enough to run Linux on Server 2008, they'd need Windows CALs for the Linux users too. Companies used to have to have a second license if they wanted to use their own image of a machine they bought with OEM Windows on it. They still might.

Another fun one, you can't buy an OEM copy of Windows 7 for your own use. You have to install it on a machine and sell it to someone else. If you keep it, you've violated the license.

As soon as I saw 'License Engineers,' I knew things had gone too far.

Comment Re:the solution is .. (Score 1) 91

Reading that many of the grid controllers are connected to the internet seemed odd to me too, but it turns out that there are many controllers in remote and desolate places where the only possible communication is through the internet (i.e. through phonelines).
Now, it would be a good move (security-wise) to place a new isolated fiber\copper network between those controllers, but it does sound more costly than you first think when reading the article.

Security

Microsoft's "Dead Cow" Patch Was 7 Years In the Making 203

narramissic writes "Back in March 2001, a hacker named Josh Buchbinder (a.k.a Sir Dystic) published code showing how an attack on a flaw in Microsoft's SMB (Server Message Block) service worked. Or maybe the flaw was first disclosed at Defcon 2000, by Veracode Chief Scientist Christien Rioux (a.k.a. Dildog). It was so long ago, memory is dim. Either way, it has taken Microsoft an unusually long time to fix. Now, a mere seven and a half years later, Microsoft has released a patch. 'I've been holding my breath since 2001 for this patch,' said Shavlik Technologies CTO Eric Schultze, in an e-mailed statement. Buchbinder's attack, called a SMB relay attack, 'showed how easy it was to take control of a remote machine without knowing the password,' he said."

Slashdot Top Deals

THEGODDESSOFTHENETHASTWISTINGFINGERSANDHERVOICEISLIKEAJAVELININTHENIGHTDUDE

Working...