Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Idiot (Score 1) 410

That is not true at all. My company (IBM) has both technical and managerial paths. Look up IBM Distinguished Engineer and IBM Fellow in wikipedia when you get some time. Technology companies usually maintain two paths.

Comment Re:The way this is generally handled... (Score 1) 283

Last post on this topic - clearly you and I have a different understanding of security. No HTTP POST/GET variable are typed - you can throw whatever you want in them. Lazy assumptions about length won't help you either. Point is, there is an extra set of data to parse. Whenever there is data to parse, there is the potential for an exploit. See my solution above, and lets move on.

Comment Re:The way this is generally handled... (Score 1) 283

Can you explain to me how a malicious person's manipulation of the hash value could damage anything? How would they know what to change it to?

Any input taken should be scrutinized for injection, overflows etc. Another input from "out there" another set of variable to scrub. A sloppily coded hash/verification could be a vector for SQL injection for example.

I suppose they could just hash the form fields and hope, but that's easily defeated by adding in a server side session variable as salt.

If you have a session to begin with... just store it server side

Also, while this isn't exactly the best practice, the question made it clear that it was a fairly small internal web app. So worrying about malicious users on that scale is likely not an issue

assumptions regarding the scope, confidentiality, integrity or availability requirements weren't part of my answer. Only that from a security perspective, anytime you have another piece of information that's user submitted, requires a thorough check/scrub/sanitization prior to being processed.

Comment Re:The way this is generally handled... (Score 2, Informative) 283

Storing the hash of the original data client side is bad from a security perspective. A malicious user could manipulate the hash as they sought fit. I'd keep the hash in a server side session specific variable. I realize the damage that could be done seems small, but I wouldn't trust *anything* - especially a critical part of your locking mechanism - to a variable that could be manipulated client side.

Comment Get Security/Legal/HR buy in (Score 3, Insightful) 260

Are you part of the security team? If not, perhaps this is more the domain of your security guys than yourself. I'd also get the buy in of HR. As with most policy changes (especially ones with a reprimand) you gotta make sure HR is on side. Legal for good measure too - ie are you asking something which is illegal of the employee? I know its a stretch, but CYA.

Comment Re:Will a ballot really be that effective? (Score 1) 411

In another example IBM seems to like Opera for many of it's Linux/workstation machines as it's cross-architecture/platform embedded reader... again, they could "encourage" Leneovo to add that to thinkpads for their in-house teams.

IBM more heavily embraces Chrome and Mozilla internally than Opera. And Lenovo's preload has nothing to do with the image that IBM uses internally, save the drivers.

Slashdot Top Deals

8 Catfish = 1 Octo-puss

Working...