Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Come on, Alan ;( (Score 1) 380

That's what I hate about Ubuntu (well, one of the things at least), but love about Debian. In Debian, the default DE doesn't really matter. You just don't install the default, and apt-get install what you want later. In Ubuntu, you either install the server version (blech) or install one of the {U,Ku,Xu,Lu}buntus and install your preferred environment later after the default is already installed. Sure you can uninstall it, but why bother going through the process of instaling Unity/KDE/Xfce/LXDE if you're just going to apt-get purge it anyway? I'm an i3 person myself, and there's no i3buntu sadly, so I generally avoid Ubuntu even though I love Steam, and Steam only officially supports Ubuntu.

Comment Re:Why would it matter if it were hashed? (Score 1) 323

Well it prevents multiple-vendor networks from combining logs from different vendors, but I bet all monitoring devices from a single vendor use the same hash.

I honestly wouldn't be surprised if it was just some standard hash (like SHA-1) with no salt or anything so that even multiple vendors' equipment would produce the same hash. People that collect personal data would go to extremes, even *gasp* using standards, to enable the data to be shared more widely.

(Not to be a pedant, but it's "pretense" by the way.)

Comment Re:Why wont JS just go away (Score 1) 149

Your emacs configuration doesn't let you match other people's coding styles easily, so you blame the language? Sure, Python does require more consistency than most other languages, but if you "don't mind having to tiptoe around other people's styles for submitting patches", how on Earth do you format your code like the existing code if your editor is so broken?

Comment Re:How do they even do that? (Score 4, Informative) 264

The same thing can be (and is) accomplished in normal desktop OSs by adding a CA certificate to the certificate store. It's commonly used in businesses that have an HTTPS proxy as well as an HTTP proxy so they can filter/monitor HTTPS access as well. IIRC there was an Ask Slashdot question about it as well. In any case, no modification of the implementation is needed.

Comment Re:As a gamer (Score 1) 527

Can you run DOS games on Windows 8 (genuinely don't know)?

You can still run DOS under a VM/hypervisor or setup a dual boot and run it directly on an x86 PC.

Note how the two aren't related. They are talking about running on Win8 directly, not through a VM and certainly not by rebooting into plain DOS and back into Win8 when they're done.

Comment Re:This is a rare breed of human. (Score 1) 758

US citizens that want to assert their second amendment rights by owning a gun should be proud enough to label themselves. Their decision to hide their gun(s) draws suspicion. Therefore, they should be labeled.

Notice how your argument boils down to "nothing to hide"? Saying "these are people, not corporations" isn't valid, because "nothing to hide" is never a proper argument. How often does Slashdot tear that one up? The simple fact of the matter is that there is a huge amount of information that isn't required to be disclosed, even on food. You don't have a right to know the name of the person that processed your food nor a list of machines involved in the processing, but no one's complaining about that. What if the machine is faulty? What if the company that made the machine is EVUL? If you're so committed to buying non-GMO foods, buy locally and ask the person you buy from if the food is non-GMO.

Comment Re:this flaw only applies if you use authlogic (Score 1) 81

Do you feel witty copying my first sentence? In any case, you are correct, I neglected to say "but you need to be using it as your authentication framework". There aren't any others that are noted to be vulnerable that I can find. If you're using your own custom authenticator, there's no reason to have a marshaled hash in your cookie. If someone can provide an example of a custom authentication setup that uses marshaled hashes, please do cite it.

Furthermore, I don't know of any Rails web sites that let you submit a marshaled hash and then perform a query with it. So unless you can find one (or a custom authenticator that uses them), it's only Authlogic.

Comment Re:Great system for parents (Score 1) 372

Skype 6.0.32.126, and they only show up on the home screen. I do have a DNS server set up to block ads, so there isn't an actual ad shown, but note the "ADVERTISEMENT" text at the top. The "Hide Ad" link works, until I restart Skype. I've tried this elsewhere (not going to mess with my DNS server just to take a screenshot), and the actual ad does show up.

Comment Re:this flaw only applies if you use authlogic (Score 4, Informative) 81

A known exploitable scenario is when all of the following applies:
1. You're using Authlogic (a third party but popular authentication library).
2. You must know the session secret token.

http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/

Seems like you are mistaken. I believe they were saying that merely using Authlogic doesn't automatically make you vulnerable, but you need to be using it to be vulnerable.

Slashdot Top Deals

Kleeneness is next to Godelness.

Working...