Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:It's the end of the world as we know it! (Score 1) 307

Of course they probably could have just done it much, much simpler by making a dotted quad a dotted quint:

But that would have resulted in a strange number of bits of addressing, and actually made everything much more complicated, so they skipped it. It really had to be a multiple of 32 bits, and obviously, they went big.

Comment Most of their apps are annoying anyway (Score 2) 110

They keep boning the interface for maps, someone could seriously make a buck just skinning it and giving easy access to the offline caching feature and so on. And googles, why for you no have keywords? I just wind up going to the web interface for image searches. So there's an extra step.

Inbox is pretty nice, I guess. I didn't get the impression that there was much competition in that space. Am I wrong?

Comment Re:The addresses are there... but still... (Score 1) 307

No.

Yes.

Good (IBM) politically correct message though.

I haven't worked there for years and years, and I didn't even work for IBM proper; I worked for Tivoli, which hadn't yet been fully subsumed into the IBM culture. I did, however, have access to the 9 net, and there really is a whole little world in there. It's part of how IBM keeps people on the reservation.

Comment Re:Is this true? (Score 1) 172

That is, once you convert to Win 10, if you don't like it you can't reinstall Win 7. Is this true? I hope not.

Yes and no. Yes, they're going to convert your license, so the original license will be invalidated. No, you will still be able to install Windows 7. What you won't be able to do is legally re-validate it. But seriously, if you use an activation tool to go back to Windows 7, you think Microsoft will knock on your door and sue you?

Comment Re:Err, okay (Score 1) 172

Sure, they get Windows 10 as well. Woohoo. If it's unusable for the first year, their fallback OS isn't Windows 8.

converting to a windows 10 license destroys your windows 7 license.

Sure, you can just ignore the activation prompts, or use one of the deprotection tools, but it's still an annoyance if you want to go back.

Comment Type 4 UUIDs (Score 1) 251

The combination of time (the UUID can be time boxed), activity (a successful login nullifies the UUID), and possession (control of the account's registered email address)

My concern is how to keep someone between your server and the subscriber's MUA from compromising "possession", or how to establish "possession" the first time.

Assuming the coders didn't decide to come up with their own GUID generation algorithm that is easily reverse engineered and seeded

I just use a PRNG. If I need it as a GUID, I request 120 random bits and format them as a type 4 UUID. Is that good enough?

Comment Re:Responses (Score 1) 251

Or to put it shorter: "Passwords and password reset codes go in separate fields."

I've implemented a similar system that keeps the hashed password and the one-time-use code in separate fields of the user table. I just wondered if there was any good way to protect the "login ticket" (the mail containing the one-time-use code) from interception in the 24 hours between when it is sent and the expiration time that we store.

Comment It's to confirm control of your e-mail address (Score 1) 251

In the message the portal not only assigned my username, but it also listed a temporary password that's good for 30 days! All of this transmitted cleartext.

This use of a one-time, soon-expiring autogenerated password is common in flows that include the step "To reset your password, confirm your e-mail address" or "To opt in to e-mail notifications, confirm your e-mail address". Is there an alternative, other than to either A. mail all customers a second factor of authentication used to reset a password, or B. require all customers to subscribe to mobile phone service with unlimited texting to receive resets through SMS?

Comment Security theater questions (Score 2) 251

Send an e-mail with a verification URL

How do you encrypt this unique verification URL on its way to the subscriber to your service?

security questions

I'm sorry; I misread this as "security theater questions". See "The Curse of the Secret Question" by Bruce Schneier and "Wish-It-Was Two Factor" by Alex Papadimoulis.

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...