Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:An area where Java applets continue to thrive (Score 1) 371

I still continue to see Java applets being widely used in tasks that require trusted signatures â" Say, filling in the tax declarations in my country, or submitting the grades for my students. For both actions, we must use a x.509 client certificate

You're in Estonia? Just trying to figure out which country actually uses client certificates for tax filing.

Comment Re:Compared to what?!? (Score 1) 224

Equipment A (provided by Comcast) was swapped out for Equipment D (provided by Comcast) and power usage increased. What is wrong in the comparison?

It'd be interesting to see more details on power usage from other devices, if you look at the PF figure it's just over 50% which means they must be using awful power supplies (PFC != efficiency, but it's useful as a rule of thumb, once you get into efficiency classes like IV or V you generally need active PFC - optional for IV, mandatory for V - which these things obviously don't have). Most external power supplies (EPCs) now should be class IV or V, whereas these look more like class I, a.k.a. "fail".

If this is indicative of the rest of the electronics, it's no wonder that these things are power-guzzlers.

Comment Re:Who has the market share? (Score 3, Informative) 336

REMOVE Metro. (not disable, not hide; DIE.)

While I fully support the sentiment, completely removing components like this can cause Windows Updates to fail to install. For example if your Windows desktop PC or server doesn't have a "Tablet PC" folder in the start menu, some updates won't install. So you potentially need to keep gigabytes of Microsoft's crapware sitting on your PC on the off chance that some update checks for it and won't install if it's not present.

Comment Re:It's better to hear people you might disagree w (Score 1) 124

This isn't a matter of disagreement but rather than being lied to perpetually.

Well I'm not sure who Dan Greer is, but I've known Dan Geer for ages, he's a libertarian academic type who publishes somewhat philosophical texts on the economics of information security. If you're looking for some sort of evil CIA spook, you'll need to try again.

Comment Re:Looks good to me (Score 1) 67

By doing this continuously you end up with releases which are free of known errors.

Weeellll... you end up with something that's been run through gcc -wall, which is a long way from "free of known errors". Now admittedly "free of known errors" is a nice circular definition meaning "free of things gcc warns about", but even then it's not necessarily the case, there's plenty of code that ships with avalanches of warnings when you build it, but no-one's bothered fixing it up.

At best, you get something that doesn't produce warnings in gcc and clang. At worst you get code that hasn't been changed from the default release because the maintainers decided none of the warnings were serious.

Comment Re:Looks good to me (Score 2) 67

The knee jerk reaction, of course, is to look for a catch in anything Homeland Security is doing. However, this seems like a really good idea. Finally, they are contributing in a positive way to public safety.

Barely. If you look at what they're offering it's FindBugs, clang, gcc, and cppcheck. Completely bog-standard tools that anyone should be using anyway, but they're being paid $23M taxpayer dollars for it. Shee-it, I could do the same thing with $10K to cover the cost of renting some EC2 space, and I'll spend the remaining $22.99M on coke and hookers (seriously, how can they have spent $23M on this? One person could set it up in a few hours, the only constraint is how many VMs you need to spin up if lots of people sign up for it).

This looks very much a DHS solution, vast sums of money spent on something that should be nearly free. Not to mention that while gcc -wall, clang, and FindBugs aren't bad as far as free software goes, they're nowhere near the level of commercial offerings like Fortify, Coverity, and others.

OK, so in terms of cost/benefit it's more of a TSA solution then strictly a DHS solution.

Comment Re:Cause/Effect? (Score 1) 63

This also relates to the problem of the "cure for cancer" that will never be found because "cancer" isn't a single illness but a generic name for a huge range of different ones, with a wide range of etiologies and manifestations. A single "test for cancer" seems about as likely as a single "test for virus".

As you say, it's a cool study, but like far too many other studies I think it got released to the PR department of the research institute a bit too early (I've experienced this myself on several occasions).

Comment Re: Why? (Score 1) 92

And, as proof of that, starting in November, the official CAs will stop issuing those types of certs.

Not quite. As of November, the official CAs will claim that they've stopped issuing those types of certs. When something like the SSL Observatory points out that they're still issuing them, they'll say that this (and the other 8,192 times they did it) was a one-off mistake and they've updated their policies to make sure it never happens again. Then when they get caught again they'll say that it was test certificates that accidentally escaped. After that, they'll stop responding to reports. And we'll all be much, much safer, and phishing will be eradicated once and for all.

Comment Re:Super-collider (Score 1) 219

Will they have to buy a new one every year?

No, but the first one will turn out to be a cheap knockoff with out of date hardware that only gets a tenth of the advertised resolution and fails to work when it's cloudy outside.

They'll offer to replace it, but only if you pay the shipping costs to send it back to Shenzhen.

Comment Re:Big Brother has your encryption keys by default (Score 1) 91

It's not big brother, it's anyone. All of the IPMI systems used by Intel, Dell, HP, etc, are unaudited cesspits of remote-rootkit capabilities full of buffer overflows, authorisation bugs, parser errors, and so on. It's hard to know where to begin, but here's one starting point. Hack like it's 1999.

Intel SSD's have had AES encryption built in for years, it's no big deal. What they've added with their IPMI support is a capability for remote attackers to get at the encryption, which is kind of a big deal if you're worried about your privacy.

Slashdot Top Deals

IF I HAD A MINE SHAFT, I don't think I would just abandon it. There's got to be a better way. -- Jack Handley, The New Mexican, 1988.

Working...