Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:What the hell (Score 1) 321

Let's have a larger number for dedicated silent calls. 999 111 999. A lot harder to accidentally put in. Publicity of it will make sure people who *need* silent calls will use it (and those who don't are Darwins). All calls to 999 111 999 would be followed up, and pranksters would be severely fined / jailed on the first offense.

Comment Re:A couple questions about passwords (Score 1) 499

For 'online' systems which lock accounts after a small number of tries, it would *seem* like an 8 digit alphanum password (which isn't one of the trivial ones discussed earlier) would be sufficient, wouldn't it?

More than likely it would be fine. I guess I was commenting more on your question of brute force attacks being relevant in the days where you get X tries then the account is locked. If you choose even a moderately sane password (i.e. no sequential numbers, no keyboard sequences, no common words) then you'll be a lot safer than most people.

But attackers these days are more interested in *any* account, not a specific account. So brute force hacking has shifted from brute force passwords to brute force usernames. Imagine trying tonnes of common usernames (johnsmith@gmail.com) against the top 3 most common passwords. You're bound to strike gold soon enough. Attackers will most likely have access to large email databases of legitimate addresses to use in their attempts. Sites allowing / encouraging / requiring you to use your email as your username these days only make such attackers easier.

Comment Re:A couple questions about passwords (Score 1) 499

One thing to think about - If you try brute force a username, yes, you probably will lock out that account for a period of time. But what if you try the same password against random usernames. There is over 200,000 users with the password 123456. All you need to do is guess the username for one. Most websites don't detect and block against this sort of attack.

Comment Re:Password strength vs. how often you change it (Score 1) 499

One thing some companies do, is require X of Y characteristics. i.e. Your password must be at least 8 characters long, and contain at least 3 out of the following 4: {lowercase letter, uppercase letter, number, special character}.

So your keyspace is far larger than: Must have a lowercase, uppercase, digit and special character. I think it's a nice compromise - but of course as this report shows, a hacker would still probably target [a-z0-9]{8}.

What would be interesting if the change password form predetermined the password requirements for this particular password, and these requirements are randomised each time the user wants to change the password. E.g. one time it may require a password of at least 8 characters, the next time it might require it to be 10 characters. One time it may require digits, another time it may require special characters. So an attacker in this case couldn't rely on a large populus having simple passwords of the bare minimum length as the system forces some variances in those minimums. Sure, it'll probably piss off users even more... (And I'm the first to admit I'd be pissed off by such an approach too).

Comment Re:Confidentiality Integrity Availability. (Score 1) 99

I've been involved in certifying a firewall to meet ICSA requirements. Let me say that it can only be a good thing to take into account what certifications the product has before using it. This includes FOSS and commercial.

While it's nice that you can review the source of FOSS tools, that gives you no guarantee that the tools are configured appropriately and securely. If you are in an organisation that requires a verifiable degree of security (or as management sees it: level of risk) then using certified products is a no-brainer. No one claims a certified product is absolutely secure, and you should never base a purchase decision purely on the 'does it have a shiny certification logo on the carton?', but when using a certified product you can at least say that X, Y & Z situations are covered. This is especially important in the situation of a breach, where the integrity of logging is important. You don't want your boss screaming at you because the timestamps were wrong or inconsistent, that some data was not logged, etc...

If you are interested, take a look at the criteria for certification for firewalls - http://www.icsalabs.com/technology-program/firewalls/modular-firewall-certification-criteria-version-41

There are a lot of FOSS based products, including the one I worked on, that are ICSA certified. You can have your cake and eat it.

Announcements

Submission + - Digital mutiny: 2,000 page iraq leak (wikileaks.org)

An anonymous reader writes: Looks like them wikileaks guys are finally putting something out there.

from the site:

This spectacular 2,000 page US military leak consists of the names, group structure and equipment registers of all units in Iraq with US army equipment . It exposes secretive document exploitation centers, detainee operations, elements of the State Department, Air Force, Navy and Marines units, the Iraqi police and coalition forces from Poland, Denmark, Ukraine, Latvia, Slovakia, Romania, Armenia, Kazakhstan and El Salvador. The material represents nearly the entire order of battle for US forces in Iraq and is the first public revelation of many of the military units described. Among other matters it shows that the United States has violated the Chemical Weapons Convention.

Networking

Submission + - Navisite Massively Botches Datacenter Move (navisite.com)

9InchRails writes: "In a move to consolidate a newly acquired datacenter, web hosting provider Navisite shutdown, boxed and transported hundreds of servers, effectively stranding in excess of 200,000 web sites and authoritative name servers. This fiasco is in its fourth day as noted here and here. How could a company been so completely incompetent?"
The Internet

Submission + - Skype outage continues (skype.com)

pdcull writes: "I'm surprised that the first news I received about Skype's big outage didn't come from Slashdot. It appears that since yesterday the service has been offline, and that only recently have users been able to start logging in again.

The Skype heartbeat blog says that the outage was not caused by a recent site upgrade nor by hackers, however it doesn't give any clues as to what may have been the reason."

PlayStation (Games)

Submission + - PS3 Price cut raises Amazon sales 2800%

wamerocity writes: The recently announced PS3 price cut seems to have achieved one objective, if only temporarily. Reports are up that the price cut, effective July 10th, has raised the PS3's sales rank on Amazon up 2800% , even outranking the Nintendo Wii, the long-time #1 seller. This deal has combined with the recent Blu-ray Disc promotion of 5 free movies with any Blu-ray player as well as Amazon's deal to include a free bluetooth remote might just be the injection needed to gain developers confidence in the systems future, as well to raise its last-place standing among next-gen consoles.
Java

Submission + - JSR-275 "Measures and Units" for Java 7 (java.net) 1

Jean-Marie Dautelle writes: "JSR-275- "Measures and Units" Early Draft Public Review terminates soon (July 8). Your comments/feedback are important to us (the latest version 0.8 is available here). The JSR-275 will be a major enhancement for Java 7 by providing "strong" typing (through class parameterization) and easy internationalization of Java programs (preventing conversion errors). The reference implementation is provided by the JScience project under BSD License."
Books

Submission + - The Edge Of Science - Inferior Design

weighn writes: "Christopher Mims directs New Scientist readers to a review of intelligent design poster boy Michael J. Behe's latest tome, The Edge Of Evolution: The Search for the Limits of Darwinism. The review itself is by Richard Dawkins " — who should need no introduction, but who will get one anyway — author of the Selfish Gene, coiner of the term 'meme', and currently famous for being perhaps the most argumentative and visible atheist on Earth — You probably don't need me to tell you how it went. Beatings this savage don't often appear in print". Bede is sticking to his guns despite his views being publicly disowned by his own university. Should science merely shine a light on the truth or is it justified to brutally tear apart the works of creation "scientists"?"
Censorship

Submission + - FL Bar Demand Jack Thompson Take Psych Test (gamepolitics.com)

TRU7H 17 writes: An official of the Florida Bar proposed late last week that controversial Miami attorney Jack Thompson submit to psychological testing and accept a 91-day suspension of his law license. The Bar has moved to hold a disciplinary hearing against Thompson based on several complaints about the anti-game attorney's professional conduct, including video game cases involving Grand Theft Auto and Bully.
Media (Apple)

Submission + - The iPhone's poor JavaScript performance (iphoneatlas.com)

An anonymous reader writes: "iPhone Atlas" reports:

"JavaScript speed on the iPhone is downright sluggish in most respects — a frustrating fact given that AJAX is the only current method for building dynamic third-party applications for the iPhone. (On a benchmark page) a MacBook Pro delivered test times of ~300 ms on average. Our in-house iPhones, however, delivered test times in excess of 9000 ms on average."
The site links to several AJAX games and an IM app that run extremely slowly on the iPhone.

Slashdot Top Deals

We are each entitled to our own opinion, but no one is entitled to his own facts. -- Patrick Moynihan

Working...