Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:(0.999...)st Post! (Score 1) 1260

This paper indicates 1) that in Lightstone notation, the real number .999... would be written as the hyperreal number .999...;...999 (with a caret over the last 9). And secondly, that that number wouldn't actually be the same number as .999...

http://www.math.umt.edu/tmme/vol7no1/TMME_vol7no1_2010_article1_pp.3_30.pdf

Finally, you still have not shown any flaw in the original (or any other) proof, as far as I've seen.

Comment Re:It takes time and money to code anything. (Score 1) 404

It was originally designed to allow a small inventor to not taken over or forced out of the market by a big company.

In theory, it was originally designed to encourage invention, and ensure that inventions got publicized. Protection for inventors is the means, not the end. I'm not even sure there was such a thing as big companies when US patent law was created.

Comment Re:don't ever use the word "password" (Score 1) 563

No, not all possible algorithms, but specifically the Dvorak one would surely be near the top of the list. I'm not saying it won't help, I'm just saying if it's something important you should make sure it's a strong password regardless. That way you don't have to worry about whether the obscurity is working.

Comment Re:Simple (Score 1) 563

I was thinking of office computers rather than servers. If you have someone covertly surveilling a computer, then either your security is inadequate, or whatever they might take/disrupt is not worth the security measures it would require to defeat that. But basically yes, if your physical security is compromised, which could easily be the case in an insider attack, you're probably in trouble. As for keylogging, that would only be a vulnerability because the password is next to the machine, right? I don't know a whole lot about keyloggers other than I don't want one. :-)

Comment Re:don't ever use the word "password" (Score 1) 563

I would say not by any useful definition. The real principle is that if a system depends on its design not being known, it's secure only through obscurity. The Dvorak system is like that, because if anybody knows you're using a substitution cypher, especially which one, it loses its security.

A good encryption system doesn't rely on security through obscurity just because the keys need to be kept secret. After all, any security system involves secrets, so such a broad definition of security through obscurity would render the term effectively meaningless.

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...