Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Well said (Score 2) 218

Everybody on this thread seems to have forgotten the DEA was collecting Americam phone metadata in bulk since 1992, well before the Patriot Act. They did it under USC 21 section 876 (administrative subpoenas).

From what I've read, they were probably exceeding their authority, but carriers like Sprint gave them the data anyway.

Comment Re:Can we have ALL Federal laws auto-expire this w (Score 2) 218

What a profoundly naive and ignorant idea.

Expire all laws? Like all federal criminal law against fraud, racketeering, drug trafficking, computer misuse, theft, and murder?

All the laws enabling agencies like the FDA, which keeps the food supply safe? Laws that regulate and maintain the highway system and regulate interstate commerce? Laws that establish the FDIC and keep confidence in banks?

Not to mention the huuuuge body of procedural law, which defines how the courts work, how the military is governed, etc?

The US Congress would not have time to reauthorize the entirety of federal law, much less write new law. The states wouldnt have the time to do this either.

Businesses would hate this because there would be so much uncertainty.

Comment Re:Java API: Copyrighted, but hope for fair use! (Score 1) 223

Probably the "bright line" copyright distinction between APIs and actual works of art should come from the legislature, but our Congress is just as technologically illiterate as the judicial and executive branches.

Maybe in another 20 years we can have laws that actually bring us in to the 21st century.

Comment Re:I am amazed (Score 1) 248

Generally, if a carefully-crafted input can cause your application to crash, a similarly-crafted data may be able to exploit the same bug and cause an execution of malicious code. If â" as is usually the case â" the crash is due to buffer overflow and I can stomp over your app's memory, I may be able to place my code in the right place and it will be executed as part of the app...

This is only true for certain classes of memory management defects. There are many different kinds of defects, and many different ways to crash software that bring no possibility of remote code execution.

Comment Re:I am amazed (Score 1) 248

This isn't as difficult to find as you might think. You do not have to test millions or billions of random text strings.

Software security testing works by breaking inputs into categories, and assuming that if you test one or two items in the category, then the category is covered. Categories are derived from the software specifications.

Example categories:
1. 0-byte message
2. max-length message
3. max-length +1 message
4. message consisting of all NULL bytes
5. message with unicode characters ...

If ellipses are treated specially, then they are part of the specifications, and should factor in to the choice of categories. There is software to automate building of test cases based on the categories, and the testing could be automated as well.

If we only test likely cases, we are not doing security testing. Given that this is an unauthenticated network vector, it should be subject to security testing. Apple has the resources to do this.

Comment Re:Automatic presumption of govt incompetence... (Score 1) 206

I've worked my entire career in the private sector, and there is a huge amount of inefficiency (in addition to the profit which, as you mention, comes off the top).

Dead weight in the organization, people who are worthless but protected, executives playing turf wars for budget, leaders who block change so they can watch each others' backs, sabotage against competitors inside the organization. The worst are managers who are great at "managing up" but not actually good at leading their teams. They can cause damage for years before things change.

Sometimes the individual profit motive does not line up with the larger profit motive of the company, and the sacrosanct "invisible hand of the free market" totally fails.

Comment APK - a life of failure (Score 1) 288

0x0F. 2012 - Called out on slashdot for his text file manager's extremely poor performance (11 minutes to sort 1.8 million strings). Ironically claims he "chose" Pascal because it performs better than C++. Pasted Python but failed to indent lines, indicating he did not understand even the basics of Python.
0x10. 2014 - Zontar schooled him, doxed him, caught him in several other lies. People chimed in on Slashdot to say they hated him.
0x11. 2014-2015 - Bouldin repeatedly explained why OS hosts files are not suitable security against botnets, but Kowalrus didn't understand the technical aspects. Currently seems very confused about basic networking and how malware works. Doesn't understand basic Python, and believes the hosts file cannot be bypassed even after seeing Python code that does the bypassing. When provided proof that malware with millions of infections (Ramnit, Gameover Zeus) can bypass the hosts file (and other OS protection mechanisms), he called the malware "edge cases."
0x12. Still has not accomplished anything since his long-since-deleted "security guide" from 2007 or his text file manager from 2010. Nevertheless, he declares victory over everyone, on every forum he has ever visited. Has no friends.

Other events on Jan 31st:
* Guy Fawkes was hanged, drawn, and quartered.
* Germany used poison gas at a large scale for the first time in history of warfare.
* The Soviet Union exiled Leon Trotsky.
* Harry Truman announced a program to develop the hydrogen bomb.
* Viet Cong launched the Tet Offensive.

Comment Re:In hex, because I know you don't understand tha (Score 1) 288

0x0F. 2012 - Called out on slashdot for his text file manager's extremely poor performance (11 minutes to sort 1.8 million strings). Ironically claims he "chose" Pascal because it performs better than C++. Pasted Python but failed to indent lines, indicating he did not understand even the basics of Python. 0x10. 2014 - Zontar schooled him, doxed him, caught him in several other lies. People chimed in on Slashdot to say they hated him. 0x11. 2014-2015 - Bouldin repeatedly explained why OS hosts files are not suitable security against botnets, but Kowalrus didn't understand the technical aspects. Currently seems very confused about basic networking and how malware works. Doesn't understand basic Python, and believes the hosts file cannot be bypassed even after seeing Python code that does the bypassing. When provided proof that malware with millions of infections (Ramnit, Gameover Zeus) can bypass the hosts file (and other OS protection mechanisms), he called the malware "edge cases." 0x12. Still has not accomplished anything since his long-since-deleted "security guide" from 2007 or his text file manager from 2010. Nevertheless, he declares victory over everyone, on every forum he has ever visited. Has no friends. Other events on Jan 31st: * Guy Fawkes was hanged, drawn, and quartered. * Germany used poison gas at a large scale for the first time in history of warfare. * The Soviet Union exiled Leon Trotsky. * Harry Truman announced a program to develop the hydrogen bomb. * Viet Cong launched the Tet Offensive.

Comment In hex, because I know you don't understand that (Score 1) 288

Alex Kowalrus In a Nutshell (A Life of Failure)
0x00. Birthday was January 31st (see below).
0x01. 198x - Got a mediocre degree in IT from LeMoyne University. No computer science degree. LeMoyne actually disbanded their CS department from 1994 - 2008.
0x02. Fired from Sunbelt in 2000. Never found full-time employment again, much less as a software engineer. Moved back in with mom in Syracuse.
0x03. 2000 - Banned from Arstechnica. Rejoined under another name (lied) to argue for himself. Everyone there hated him.
0x04. 2003 - Attempted to argue with Dr. Russinovich (of sysinternals.com) in the comments below Russinovich's blog. Other commenters schooled him, but he still claims he beat Russinovich in an argument that Russinovich did not realized happened.
0x05. 2006 - Someone opened petition on petitiononline.com to have APK put to death. It got (at least) 29 signatures.
0x06. 2007 - Banned from Antionline.com because everyone there hated him. Posted his "security guide," which everyone agreed was not good.
0x07. 2008 - Actually got paid $100 for his security guide as a newsletter prize, and thus claims, to this day, that he's a "security professional."
0x08. 2008 - Admitted he doesn't understand UNIX, saying, "I am more of a Win32 guy the past few years though, so I must ask [what iptables is]."
0x09. 2008 - Made legal threats against Thor Schrock. Backed down, and was publicly embarrassed by Schrock.
0x0A. 2010 - His mom gave him the house (worth $100,000). He currently lies about that and claims to be independently wealthy.
0x0B. 2010 - Wrote a buggy file manager in Pascal that performs terribly. Could not find anyone to pay for it.
0x0C. Managed to get malwarebytes to host his file manager because it's free. Lied and denied it's just a file manager, but Malwarebytes calls it what it is: a "Small program for managing the HOSTS file"
0x0D. 2011 - BarbaraHudson caught him in a lie - that he had plenty of +5 modded posts on slashdot. They were all at -1.
0x0E. 2011 - Attempted to re-add garbage to Wikipedia 20 times on the Windows hosts file. Had it removed each time. Complained in the editorial pages, but was shot down.

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...