Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:A smart watch? (Score 1) 260

What if the watch can do more than just a watch?
How about you can sit on the couch and turn down the lights on a movie settings? What if you need to turn off your stove while being in the basement?

With cellphone capable of being the computer (in 3 - 5 years), your watch maybe able to do the little things remotely for your computer. It is hard to imagine the widgets for smartwatch, but I think there is a bigger market then a traditional watch.

Comment Re:Why this is idiotic (Score 1) 104

Furthermore, it requires an "action" to be performed. I hope that action is convenience to do in public, plus doing it quick.

However, I suppose this is the first step of "reading" data from the brain. By collecting enough data, we may actually understand individual (hint for Google). If we actually can understand living things by brainwave, it can replace password as a way to recognize people (I suppose this is how we "know" others by understanding their ways of doing things).

Comment Too much focus on Social Media (Score 1) 346

There are games targeted to hardcore players, while there are games focus on social media/softcore players. Perhaps the conclusion is, don't try to make complex games for softcore, or don't promote a social media game to hardcore. Diablo 3 and SimCity are supposed to be hardcore games, and they failed every aspect for hardcore, while make the focus in softcore (pay to win, connect to friends, ...). If they want to take the softcore market, just make something less complicated and funny. They shouldn't have mixed the male dominant market with female dominant market, it should fail as expected.

Comment Re:So, 'Open Source' is bad? (Score 1) 315

At the end, is it difficult to change the code? I never try changing the code, but I believe the most difficult part is to move away from Google Market/Google Play.

The whole purpose of using Android (to me) is to find more apps from Google Play, and if the tracking/monitoring system is within Google Market/Google Play (daemon), then it makes no difference for me to change the Android source code. I might even use a BlackBerry if I can use those Google apps with it (and still be tracked). So the real question is, is it really about Android OS? All these MS complains, is it about the OS? Or is it because the Google Play platform that hook up with the Cloud system that may give Google a much powerful connection to the digital world?

Comment Re:Good idea to ban common passwords (Score 1) 140

I agree with ATM card or physical key, since you are aware of these things being taken away.
However, password can be different. You never know MITM attack.

I really hate changing my password every 6 months (my company policy is every 30 days, 15 different passwords). And the only way to remember my password to start my workstation is to have a pattern (sigh, add a different number once in a while), which is not very secure, I believe.

Comment Re:Password Recovery vs Google Two Way Auth (Score 1) 140

How would you expect to `reset your password` for your email, while the validation process requires you login to your email account?
How do you envision to reset your password on Hotmail, while the requirement might be for you to login to get the reset password link?

Actually, its good to mention Google's two way authentication here as well.
I know HSBC or some other banks had been using similar way 20 years ago, and with better technologies, Google expands this with an app on Android phone (it works on my Android, never had an iPhone).

Comment Re:Password Encrypted? (Score 1) 140

Yes, I assume they can sort by hashed password, and actually my question is how they ended up with "common password" if Hotmail encrypted the password. If there is a decrypt function, then I am curious how secure it is being hosted.

And I suppose they are here to study the pattern, which included related passwords, eg. 123456 qualify as linear f(x) = x, therefore 1234567 will also be categorized as the same thing for study, no?
If I am a hacker, I am interested in the pattern more than just common passwords, and for a security expert to counter hackers, would they be studying the pattern instead of general `common passwords`? Or provide suggestion on those pattern, instead of just some isolated password case?

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...