Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:Schrodinger would be happy (Score 1) 153

by BlueRaja (#43073469) Attached to: Physicists Discover a Way Around Heisenberg's Uncertainty Principle

For some reason it won't let me mod up this answer, but it's correct.

Schrodinger wasn't making a point about quantum theory, just the copenhagen interpretation. For some reason, even today this interpretation is so widespread that it's equated (even among many unaware grad students) with quantum theory itself, even though there are dozens of other equally-absurd interpretations out there.

Comment: Re:NTLM (Score 1) 330

by BlueRaja (#42194715) Attached to: New 25-GPU Monster Devours Strong Passwords In Minutes

I was about to post this same thing. I can break a 14-character LM password using OphCrack (which fits a rainbow table of all possible 7-character halves on a CD) in 6 minutes on my grandma's PC. And MD5 has become broken so badly (primarily by Wang, et al) that I can literally generate collisions on my calculator in a few seconds.

Did they try their GPU cluster against a **non-broken** hashing scheme?

Comment: But what attack does QC prevent? (Score 1) 79

by BlueRaja (#42056135) Attached to: Quantum Cryptography Conquers Noise Problem

I still don't understand the benefit of Quantum Cryptography - it only prevents eavesdropping on the wire, right? It doesn't prevent a man-in-the-middle (where someone would receive the signal, read it, and retransmit it along the wire)?

Assuming your machine is clean from infection, the big eavesdropping concerns today come from man-in-the-middle attacks: rerouted lan traffic (such as compromised clients running an ARP spoof), and intermediary nodes between endpoints (eg. your ISP, and the Internet backbone routers). The only thing QC prevents (actual, physical wiretapping), as I understand it, is not much of a concern anyways.

Time-sharing is the junk-mail part of the computer business. -- H.R.J. Grosch (attributed)

Working...