Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Crazy (Score 1) 778

Really ? You don't think there's any possibilities between no minimum wage and a $50k/hr minimum wage ?

I never gave my opinion on the matter. Your ignorant political stereotypes led you to make assumptions about what things I never even commented on. This is common amongst political ideologues and other loudmouths and pundits.

Like I said, mindless tripe. Unthinking regurgitation of conservative articles of faith.

If it were mindless tripe you'd swallow it without a second thought. The fact is you've completely failed to grasp the points which were being made. Calling it "mindless tripe" because you don't understand it is ... pretty childish. Reminds of the hick I met down in the bible belt who called evolution "mindless tripe". You two would get along great.

Comment Re:Cable operator induced upgrade treadmill (Score 1) 418

Which customer-owned DVRs work with satellite?

I know nothing about satellite receivers or equipment purchasing options for digital DVRs. Generic DVRs for years have included IR blasters to control a library of set top boxes including satellite receivers. A bit lame...

The lifetime sub is for one device. Cable subscribers end up having to replace their devices when the cable company changes technology, such as analog to digital, clear QAM to CableCARD, and CableCARD to SDV.

Cable cards are backwards compatible, have been around for a decade thus far and currently in no danger of going anywhere anytime soon.

SDV compliments rather than replacing cable card and still required to use SDV. For most people SDV means an additional box plugged into any available receiver/DVR USB port.

Comment Re:PCI-DSS (Score 1) 217

The NSA may be allowed all access to all information that an airlines has, including the full PAN, however, the airlines doesn't store the full PAN, if they were PCI-DSS compliant.

There is no prohibition against storage of PAN (e.g. card number) in the PCI-DSS. You are forbidden only from storing CVV2 and full track data from the mag stripe.

Comment Re:Crazy (Score 1) 778

Excluded middle fallacy.

I don't think you know what that fallacy actually means. Nothing I wrote is even close to an excluded middle fallacy. The particular bit you quoted might be considered a sweeping generalization, if it weren't so blatantly evident that I was mocking your kindergarten-level understanding of economics.

The rest of your mindless tripe is no better.

Hurr, durr, ad-hominem fallacy!

Comment Re:Let us keep our thoughts with our Kremlin frien (Score 1) 667

If you think I'm conservative and pro-gun, then you've clearly never read any of my other posts. In fact, if your entire reply is not just an ad hominem, but one attacking views that are diametrically opposed to the ones that I've publicly stated on numerous occasions, I can only assume that you are completely lacking any meaningful responses.

Comment Stop copying hard drives too! (Score 4, Insightful) 150

no more invasive than the long-established practice of granting a warrant to copy and search the entire contents of a hard drive

This "long-established practice" has always been a violation of the 4th amendment. The recent case where the US government used hard drive data from a *different* case is proof that they should not do this. They should never get the entire hard drive contents. A neutral 3rd-party should copy the drive, perform an appropriate search, then erase the copy. There's no reason for the government to indefinitely hold copies of data they should never have had in the first place.

Just imagine if they had a warrant to get your address book, but they kept a copy of every piece of paper in your entire home, just in case it became relevant later. There is no way that would be allowed. But the digital equivalent is somehow acceptable.

Comment Re:Derp (Score 1) 168

your characterizing Windows as "retarded" for not distinguishing between 750 char/s and the much faster network, was illogical.

There are two parts to that.

The first part is that the network log-in source can be grouped as an infinite number of terminals--lots of connections--so a per-connection rate limit is useless; thus all network service log-in (caveat: Active Directory handles console log-ins... over network) must be grouped as one thing to be effective. Console log-ins are separate so that a network attack can't function as a DOS; as well, the risk is mitigated because you can't enter passwords fast enough for any use.

The second part is that a console brute-force is slow. Your concern about what amounts to typing really, really fast (i.e. programmed HID plugged into USB) isn't a real concern because of password complexity. It's not that passwords are necessarily that complex; it's that a password which isn't complex enough can be readily brute forced under strong password policies like "3 passwords per minute", it just takes a week or two.

You dismiss the possibility that weak passwords are used, so that hardware password attacks are dismissable, but at the same time address the problem that these same non-weak passwords aren't strong enough to withstand network password attacks without lock-outs?

No, I dismiss the possibility that short lock-out intervals help with weak passwords.

You can attack 129,600 passwords per 30 days if you have a 3 failure per minute policy. Basic English 1250 extends out to about 5000 words with conjugations and domain language (medical, legal, whatever) for most people. Weak passwords in the traditional complexity scheme are like "rainman" becomes "Rainman1", so 100,000 attempts has a fair chance of getting it eventually. That's within the realm of a hardware keyboard typist. Common policy is 60 or 90 day retention, which increases the risk into strong viability; while public kiosks are too visible for a multi-hour console log-in attack, which makes these attacks less viable even at high rates.

Complex passwords reach 10^14 theoretically, and four-word passwords reach 10^16. Reasonable rate limits of 20 attempts per minute carry this out to hundreds of thousands of years. A human can type barely that fast. Remember the original argument:

Windows does stupid shit like lock the local console if you set up rate-limit log-in...when logging in through the Microsoft log-in manager.

If the attacker tries to log in over RDP or telnet or such, and locks the account, the actual console log-in box no longer works. That's dumb, because no attacker can possibly brute force the password through that, unless the password is laughably weak--in which case, as stated above, the rate limiting doesn't actually help.

tl;dr: I can lock you out of your server by constantly trying to log into your server, so you can't apply patches anymore. Then I hack it on Tuesday.

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...