Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment If it were possible... (Score 1) 265

April fools i know but, The Speed of Light is simply that, a recognised speed. If I was travelling 10 light seconds at twice the SOL, I would get there in around 5 secs depending on massive magnetic interference. Something could not arrive b4 it's sent, a tiny fraction over 0 yes. I don't believe travelling at the SOL slows time, mearly presents a huge issue where hitting a tiny particle would be a disaster xD the forces involved would be insane. I could also be wrong but prove it!

Comment Re:So why aren't you protecting yourself? (Score 1) 97

I disable cookies and ONLY allow the sites I want. I use Firefox and ABP (Ad Block Plus). They can have my IP but that's all they will get. I hate the advertising companies as on some sites, especially when downloading, they swamp the whole page with "Download" buttons which look like the download buttons from the actual website they are advertising on. Total nightmare!

Comment Re:RC4 has been broken for years (Score 1) 90

I'm no expert with regards to symmetric encryption granted, but I do know a lot about it. It makes RC4 look like plain-text in comparison. I disagree with regards to using a larger key as it means there is a lot more overlap when rotating the key, why have key(x) when you can have key(x, y)? It's technically as easy hence the speed is only just slightly slower, a fraction. The problem with keys that are 256 is the rotation. I came to the conclusion that there wasn't enough scope to randomize it enough hence the 64K key. I did numerous custom tests with a 256 key and I wasn't satisfied. It doesn't waste any computation and also I found it very good at securing large files. I still can't believe that RC4 is still used with the likes of WEP, SSL. In the end, it'll never get used and just be my own personal symmetric encryption algo :)

Comment RC4 has been broken for years (Score 2) 90

I run tests on RC4 years ago, run it thru a plain text file full of the same char repeated and then run through RC4, guess what? Oh the password is showing every 256 chars, hence the "weak" key. I developed a newer version of RC4 called RC64, uses a 64K (65536 or 256 ^ 2) key. The randomisation process is very complex and the algo was only just slightly slower than RC4, which is very fast anyway. A graphical representation of the 64K key visualized pure white-noise when the key was viewed in grey-scale. They need to start using mine me thinks :) Oh, and in a 50MB file full of the same repeated char, the password was not even hinted at and no 4 bytes were the same.

Comment Scaremongering as usual (Score 1) 646

It wont make any difference, the 2 main ways viruses etc get into a machine is: 1). Browser 2). Email. The router acts as a natural firewall so it's all down to the browser, anti-virus and the user being a bit savv and looking out for anything that's not right. Security nightmare my arse! We already have a security nightmare and it's the users fault mainly for not watching out.

Comment Experience (Score 1) 480

Funny you should be in this situation as I starting working from home 2 years ago and I've been ok. I travel to our main office 270 miles away every 4-6 weeks but travel expenses are paid for. I have a room with an office setup in my house and do try and keep the door closed. I do miss the office atmosphere but in all, I have no problems and work like I would from the office, (OK sometimes I get distracted!).

Comment Third party websites (Score 1) 69

The reason Hotmail, Gmail, Yahoo and Facebook accounts get hacked is because of the shitty third party websites like those little small "gameing" sites, they get hacked and guess what? Oh! the user has used the SAME password for for their main email accounts. If people used just 2 passwords, this would stop their primary email accounts getting compromised. 1 main password for main account, and another for the shitty freebee websites which will probably get hacked. Simple!

Comment Normal passwords are becoming useless (Score 0) 615

http://hashcat.net/oclhashcat/ runs numerous tools for this and with some users GPU rigs going totally insane: 4 x ATI Radeon 6990 throwing MD5 hashes out @ 45.7 Billion/sec, that's mixalpha-numeric password of length 8 in 1 hr 20 mins and then we can start on the dictionaries / hybrib-dictionaries / case-mutations / etc. The way passwords are used / stored is becoming broken by design.

Slashdot Top Deals

Work without a vision is slavery, Vision without work is a pipe dream, But vision with work is the hope of the world.

Working...