Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Num of emails sent by code you've written to date. 1

DNX Blandy writes: I have written code to send emails alerts etc to registered users on our databases, and working out numbers, I'm easily in the 10,000,000+ range due to the size of the databases involved, but it's not SPAM, all emails were registered properly by the owners. Anyway, poll idea is below:

Number of emails sent be code you've written to date...

None
1 — 1,000
1,000 — 100,000
100,000 — 1,000,000
1,000,000 — 10,000,000
10,000,000 +
I'm a SPAMMER!
Space

Uranus and Neptune May Have "Oceans of Diamonds" 347

Third Position writes "Oceans of liquid diamond topped with solid 'icebergs' of the precious gems could be on Uranus and Neptune. The first-ever detailed research into the melting point of diamond found it behaves like water during melting and freezing — with its solid form floating on the liquid. A large diamond ocean on one or both of the planets could provide an explanation for an oddity they both share: unlike Earth, they do not have magnetic poles that match up with their geographical poles." The article doesn't mention what the pressures might be like in these outer-planets environments, but the researchers found that liquefying diamond requires 40 million times Earth's atmospheric pressure at sea level.

Comment They help, but only slightly! (Score 2, Interesting) 263

I also use SPF records for all my domains, most are simply: "v=spf1 a mx -all". "-all" as in hard fail. I don't know why there is a soft fail "~all" option, if it's not from a known host / IP, it should fail. What's the point in returning an unknown response? Like as if there was no SPF record in the first place? It's amazing how many domains actually use soft fail. Anyone know why? They only help stop backscatter and other IPs from sending emails from @youdomain.com as long as the other mail server does a SPF lookup. We have become dependant on the email protocol and the way it works, pitty it's in such a mess :( Damn you SPAMBOTS!!!

Comment Re:Lame coders who don't care about security! (Score 1) 186

Totally agree, it's a pitty out of the 132,000 hacked sites that are written in Classic ASP that the coders havent done this :) It totally depends on the methods used in the code and, unfortuntly, there is A LOT of bad ass coding about :( Example: http://www.w3schools.com/ADO/ado_update.asp Checkout the second window, "UPDATE customers SET...", oh dear!! BAD coding and w3schools is well recognized! I bet a lot of coders have fallin into this HUGE hole.

Comment Re:Lame coders who don't care about security! (Score 1) 186

Exactly!! It's depends on the methods used. You'll be amazed how many people just shove the code in and don't check. I've seen lots of code from companies that would execute the above like: Dim sSQL, sLastName, cmd sLastName = Request.Form("txtLastName") sSQL = "SELECT * FROM Customer WHERE LastName = " + sLastName + ";" Set cmd = Server.CreateObject("ADODB.Command") cmd.ActiveConnection = cn Set rs = cmd.Execute(sSQL) cmd.Close Set cmd = Nothing --------- Lets say sLastName = '; DELETE FROM [Customer] Oops!! There goes the [Customer] table. To find the table name in the first place you can inject sql queries like this as much as you like.

Comment Re:Lame coders who don't care about security! (Score 3, Insightful) 186

Very true, at which point this function simply doubled up the string delimiters, breaking the SQL injection. The major problem with Classic ASP was the casting of variables, if not done properly you were asking for it. If it's numeric, check it. .NET does not suffer from this problem unless the coder specifically passes a numeric value thou to an SQL statement as a string, which would be stupid. If everyone used stored procedures to deal with the SQL data, none of this would happen. My above checks alert you to the fact that someone if having a go, you can't do that when checking for string delimiters as they are valid characters, but yes, if your code uses a shitty "execute" command, check it. If you use proper stored procedures, this will no affect you.

Comment Lame coders who don't care about security! (Score 1) 186

Lame, or just to stupid to understand! OK, I'm a coder but I take security very seriously. Why are sites still prone to this type of attack? I used to work with Classic ASP scripts, (I use .NET now obviously), which were very prone to SQL injection attacks but I had no problems, mainly because on all pages, I simply check the query string for the following: char( cast( convert( If it contained any of these, add IP to bad list and redirect to /banned.htm page. SIMPLE!!

Comment Pay for a service thats not even guaranteed! (Score 1) 175

I should know, I do deauthentication attacks against WPA-PSK encrypted networks, hence my site has a few captured packets then need cracking: http://www.md5decrypter.co.uk/forum/forum_topics.asp?FID=9 I currently only have 1 cracked but tbh, as long as you use a very good password, no one is going to crack it. We'll all have to wait until someone figures out a major hole like in the WEP encryption ;) 5-10 mins, no problem!!

Slashdot Top Deals

Kleeneness is next to Godelness.

Working...