Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Something seems off... (Score 4, Informative) 76

from wiki (http://en.wikipedia.org/wiki/ID-based_encryption)

Identity-based systems allow any party to generate a public key from a known identity value such as an ASCII string. A trusted third party, called the Private Key Generator (PKG), generates the corresponding private keys. To operate, the PKG first publishes a master public key, and retains the corresponding master private key (referred to as master key). Given the master public key, any party can compute a public key corresponding to the identity ID by combining the master public key with the identity value. To obtain a corresponding private key, the party authorized to use the identity ID contacts the PKG, which uses the master private key to generate the private key for identity ID.

Comment Re:Offline cracking (Score 1) 288

How exactly does the attacker know the passwords expiration date?

How exactly WOULDN'T they? If the attacker is doing offline brute forcing of passwords, that means they've obtained at least a partial copy of the database for the site (since they have to have the hashes and salts), at which point it's probable that they would have also obtained the expiration dates linked to each password.

Expiration dates != expiration time of current password. If you assume some maximum password expiration time (lets say 3 months) then as long as user is registered for at lest that amount of time the password expiration date doesnt provide any useful information about it. Unless of course hacker gets multiple database snapshots from widely different days, but then the system is probably doomed anyway.

Comment good in short, bad in long run (Score 1) 358

I think its quite good decision in short run, since it will kill all those weird connectors with no merit to them aside from being unique and driving charger sales for manufacturer. On the other hand in the long run its bad, since it actually hampers ("why bother if we have to put usb anyway") or even completely blocks some possible innovation (eg wirelessly charged waterproof phone with no external connections at all).
IMO the best course would be to keep this legislation for a several years (5-10) to get everyone to standardize and then repeal it. Given its EU though, I expect we are stuck with those connectors long after it will become completely obsolete...

Submission + - Bitcoin Price Drops as Mt. Gox Exchange Closes Indefinitely

knightmad writes: According to Business Week bitcoin plunged more more than 7 percent today after a major Tokyo-based exchange halted withdrawals of the digital currency.

Citing technical problems Mt. Gox said in a blog post that it needed to "temporarily pause on all withdrawal requests to obtain a clear technical view of the currency processes."

Comment Re:I would NOT second this (Score 1) 166

about 2 and 3: get some normal programming language instead of provided blocks. When I played with it in college we were using some C API with it, so we pretty much had a normal language available. Obviously there were still API limitations on our hardware interfaces, but for normal calculations, delays etc we could do pretty much whatever we wanted (it was simple unix programing with some hardware api).

as for 1: yeah, number of in and out slots was always a bit of a problem. Still you can do quite a lot within those limits.

Comment Re:Lego Mindstorms kit (Score 2) 166

Ill second this: this is what we used in Introduction to Robotics course in my college.
During practicals we had to build and program robots to accomplish some moderately complex tasks on its own. It was great fun trying to program and work around hardware limitations in my teams robot - we overcomplicated it quite a bit and it turned out a bit inferior to its competitors. Still it gave me great impression of difference between controlling pure software stuff vs a real life hardware.

Comment Re:That's nothing! (Score 1) 362

2B figure relates to the total cost of program (including PR spendings and other stuff). .
On the other hand there is also some extra computer related costs:
"(...) $227 million in computer costs, including complicated application forms that slow processing times; and $332 million for other programming costs, including money to pay staff to process the forms (...)"

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...