Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Re:Schrodinger would be happy (Score 1) 153 153

by BlueRaja (#43073469) Attached to: Physicists Discover a Way Around Heisenberg's Uncertainty Principle

For some reason it won't let me mod up this answer, but it's correct.

Schrodinger wasn't making a point about quantum theory, just the copenhagen interpretation. For some reason, even today this interpretation is so widespread that it's equated (even among many unaware grad students) with quantum theory itself, even though there are dozens of other equally-absurd interpretations out there.

Comment: Re:IMG Tag? (Score 1) 328 328

by BlueRaja (#42282631) Attached to: Is It Worth Investing In a High-Efficiency Power Supply?

Not sure why this is moderated as "funny," since it's true - <img> tags can be/are used in XSS and CSRF attacks. In fact, SVG images can contain executable javascript. And let's not even mention the possibility of polyglots:

Comment: Re:NTLM (Score 1) 330 330

by BlueRaja (#42194715) Attached to: New 25-GPU Monster Devours Strong Passwords In Minutes

I was about to post this same thing. I can break a 14-character LM password using OphCrack (which fits a rainbow table of all possible 7-character halves on a CD) in 6 minutes on my grandma's PC. And MD5 has become broken so badly (primarily by Wang, et al) that I can literally generate collisions on my calculator in a few seconds.

Did they try their GPU cluster against a **non-broken** hashing scheme?

Comment: But what attack does QC prevent? (Score 1) 79 79

by BlueRaja (#42056135) Attached to: Quantum Cryptography Conquers Noise Problem

I still don't understand the benefit of Quantum Cryptography - it only prevents eavesdropping on the wire, right? It doesn't prevent a man-in-the-middle (where someone would receive the signal, read it, and retransmit it along the wire)?

Assuming your machine is clean from infection, the big eavesdropping concerns today come from man-in-the-middle attacks: rerouted lan traffic (such as compromised clients running an ARP spoof), and intermediary nodes between endpoints (eg. your ISP, and the Internet backbone routers). The only thing QC prevents (actual, physical wiretapping), as I understand it, is not much of a concern anyways.

The perversity of nature is nowhere better demonstrated by the fact that, when exposed to the same atmosphere, bread becomes hard while crackers become soft.