Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:MD5? Windoze XP? INSECURE LEGACY!! (Score 4, Informative) 330

Who gives a rat's ass about such golden oldies? It's been possible for the longest time to fairly quickly crack windoze passwords (if you have the file) and MD5 has been known to be insecure for quite some time already...

Yes and no.

LanMan hashes have been brute forceable for a long time but neither proper NTLM nor NTLM2 have, so hacker have had to "trick" clients into sending the LanMAN hash, or recovering it from the SAM file.

Another trick that is often used to secure the password is to simply not support LanMan.
one little known fact discovered by Urity of SecurityFriday.com is that if a password is fifteen characters or longer, Windows does not even store the LanMan hash correctly. This actually protects you from brute-force attacks against the weak algorithm used in those hashes. If your password is 15 characters or longer, Windows stores the constant AAD3B435B51404EEAAD3B435B51404EE as your LM hash, which is equivalent to a null password. And since your password is obviously not null, attempts to crack that hash will fail.

So, yes and no, security consious companies have been able to protect themselves from brute forceable passwords for over 10 years.

Comment Re:my password (Score 5, Informative) 330

To all you gloom and doom people out there, here's my suggestion. If your password is monkeys1459, change it to monkeys1459monkeys1459. That's 22 letters and equally memorable.

You are assuming that the password test function doesn't text the pattern XX i.e. the same string repeated.

Password crackers actually test a number of permutations, like adding every digit 0-9 to the end of the string, reversing the order of characters, setting the first letter to uppercase, setting all the letters to uppercase, AND, repeating the password.

So your little "trick" is already outsmarted by today's password crackers.

Comment Re:they are just bits (Score 2) 197

Ah, yes. The GPL. The only copyright most readers here defend.

It may become as a surprise to you but most people are only interested in what they see as "their Social Group", if you feel like your life is/was a struggle then you will mostly be interested in people who struggle. If you are a billionaire you will most likely only be interested in billionaire's problems.

On the other side of the coin are people who don't believe the GPL is even a valid license.

Everyone will voluntarily defend their believes.

Welcome to slashdot!

Comment It depends on who is asking. (Score 5, Insightful) 128

When big corporations want "their" data removed from a server farm they simply send a email/letter to the owner and he has to remove it.

What is the problem with doing the same for people?

Facebook actually makes it hard for people to remove their content from the service, and it doesn't even say "delete", it says "remove from timeline" (but not from the whole system).

If I want my Facebook history Wiped, it is my right to do that, it is *my* data and Facebook and others shouldn't have a operating license unless they make it really simple for people to "be forgotten".

Comment Re:Whose Data Is It? (Score 1) 227

You got something in exchange for your money, so arguably the data is half hers.

The data she is requesting was generated by my actions, it is a data about what I did. Just like the GPS data in your telephone represents your movements, and the event log in your PC tells what programs you ran and the browsing history what websites you visited. It is your data.

What we need is a law that states that metadata belongs to the person that generated it.

Comment Re:it's nokia that should sue samsung (Score 5, Insightful) 1184

Nokia should be suing google.

Nokia got killed because they didn't give consumers what consumers wanted, that was entirely Nokia's decision and Google didn't play any part in it.

The reason the damages were so high is because the jury did't just decide that the two devices looked a bit alike but rather that the similarity was willful.

Look, regarding Apple "innavation", most of the "look and feel" and even the features were copied from StarTrek by Apple.

The PADD devices seen on The Next Generation, DS9, and Voyager all did things that are major selling points for the iPad and iPhones.

* Touchscreen device
* Played video and sound
* dynamic user interface could be customized to serve the application
* Video conferencing
* Loaded and saved information to the remote storage (In this case the a ship or Starfleet computers would be "the cloud")
* Data could be synced between devices
* Device could be re-configured to remotely control a workstation (remote desktop)
* They even have rounded corners
* Devices could be encrypted

All of those functions are demonstrated or spoken of in episodes or described in Mike Okuda's ST:TNG Technical Manual
(Okuda was the lead designer on most of the newer television Star Treks)

All of this predated any patent filings by Apple.

Comment Re:Oh, stop acting surprised, Iran (Score 1) 289

The US has opened pandora's box, and there is no going back.

The US didn't *open* the pandora's box, everyone is using "cyber" and everyone knows it.

What really didn't need ho happen was that some moron in the administration started babbling about how the US was actually doing it, that should have remained unsaid.

Comment Microsoft uses dirty tactics (Score 2) 492

Google simply develops a similar technology themselves.

Microsoft makes a "cooperation" deal with companies to work together on their technology, steals the sourcecode/technology and then ends the contract.

This was the case with IBM's OS/2, Corel Word, Oracle's Database and Stac Electronics' "Stacker" where Bill Gates himself famously lied in a sworn testimony about the theft.

These are just from the top of my head, I am sure people can come up with other examples.

Slashdot Top Deals

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...