Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment or don't trust the Internet (Score 3, Insightful) 191

And those who are extremely educated fall into the "don't trust the Internet" group quite easily. How many security exploits do we need before people stop trusting in various internet services? But not trusting it doesn't mean we stop USING it! We simply alter our actions on the internet.

Comment T-Mobile's Reponse (Score 4, Informative) 110

For those not clicking links, this is what T-Mobile had to say about this:

We have seen the complaint filed today by the FTC and find it to be unfounded and without merit. In fact T-Mobile stopped billing for these Premium SMS services last year and launched a proactive program to provide full refunds for any customer that feels that they were charged for something they did not want. T-Mobile is fighting harder than any of the carriers to change the way the wireless industry operates and we are disappointed that the FTC has chosen to file this action against the most pro-consumer company in the industry rather than the real bad actors.

As the Un-carrier, we believe that customers should only pay for what they want and what they sign up for. We exited this business late last year, and announced an aggressive program to take care of customers and we are disappointed that the FTC has instead chosen to file this sensationalized legal action. We are the first to take action for the consumer and I am calling for the entire industry to do the same.

This is about doing what is right for consumers and we put in place procedures to protect our customers from unauthorized charges. Unfortunately, not all of these third party providers acted responsibly—an issue the entire industry faced. We believe those providers should be held accountable, and the FTC’s lawsuit seeking to hold T-Mobile responsible for their acts is not only factually and legally unfounded, but also misdirected.

-- John Legere, CEO of T-Mobile USA

Comment AWS Email (Score 5, Informative) 75

13 hours ago, Amazon / AWS sent out the following email:

Dear Amazon S3 Customer,

Amazon S3 now supports server side encryption with customer-provided keys (SSE-C), a new encryption option for Amazon S3. When using SSE-C, Amazon S3 encrypts your objects with the custom encryption keys that you provide. Since Amazon S3 performs the encryption for you, you get the benefits of using your encryption keys without the cost of writing or executing your own encryption code.

Until now, in order to use your own encryption keys, you needed to encrypt your data client-side prior to uploading them to Amazon S3. With SSE-C, you now have the option to securely store your data using keys that you manage, without having to build client-side encryption infrastructure.

To use SSE-C, simply include your custom encryption key in your upload request, and Amazon S3 encrypts the object using that key and securely stores the encrypted data at rest. Similarly, to retrieve an encrypted object, provide your custom encryption key, and Amazon S3 decrypts the object as part of the retrieval. Amazon S3 doesn't store your encryption key anywhere; the key is immediately discarded after S3 completes your requests.

You can learn how to use SSE-C today by visiting "Using SSE with Customer-provided Keys" in the Amazon S3 Developer Guide.

Sincerely,
The Amazon S3 Team

Comment Re:Note to myself: (Score 1) 373

And for anyone that has filed a bug report... if you simply list the bug as a "problem", you're doing it wrong. Detailed descriptions, please! Why should it be any different for automotive? Words like these are subjective. Simply stating: "The brakes are having a problem" doesn't say anything about what is really wrong. Stating: "The brakes failed to engage when X pressure is applied to the pedal" says a hell of a lot more.

Comment Re:Note to myself: (Score 1) 373

Not just that, but we even have an RFC to deal with keywords within RFCs. Its not just exclusion lists, but also required usage lists.

https://www.ietf.org/rfc/rfc21... http://tools.ietf.org/html/rfc...

People are simply getting bent out of shape because GM defines their language and set of standards for usage of said language. This is true of ALL large companies, and not just in these types of documents. In the tech world, we live or die by these requirements, so why is it a surprise that other industries use them too?

Comment Re:Prime Example of Software Bloat (Score 1) 121

Not only this, but considering how uninformative this site is, I'm trying to figure out just what I would gain, if anything at all, over Sublime Text right now. Visually from their screen shots, it looks mostly the same? So, besides that, what features ARE there that make this project unique compared to other offerings?

Comment Re:Nope. (Score 1) 116

This is because Microsoft doesn't change stored passwords on Hotmail when they update policies for the service... Case in point, my dummy account from the '90's still has a password that is well under the minimum number of characters required to login. Very short, sweet, easy to remember, and cannot be brute forced because nobody would think to check a password outside of their "requirements"! (oh wait, fuck, I just admitted publicly there are passwords outside of their requirements)

Slashdot Top Deals

Solutions are obvious if one only has the optical power to observe them over the horizon. -- K.A. Arsdall

Working...