Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Another reason to try and go open-source (Score 1) 322

by DNX Blandy (#46735797) Attached to: IRS Misses XP Deadline, Pays Microsoft Millions For Patches
That's just insane! Microsoft have bended them over a table and in a gimp suit and stuck the gobstopper up their arse. We are a medium sized company and we are seriously looking at moving, as much as possible, away from Microsoft and on to open-source. I think my company should pay me half of what it would have cost us in MS licenses ;)

Comment: If it were possible... (Score 1) 265

by DNX Blandy (#43335225) Attached to: How To Communicate Faster-Than-Light
April fools i know but, The Speed of Light is simply that, a recognised speed. If I was travelling 10 light seconds at twice the SOL, I would get there in around 5 secs depending on massive magnetic interference. Something could not arrive b4 it's sent, a tiny fraction over 0 yes. I don't believe travelling at the SOL slows time, mearly presents a huge issue where hitting a tiny particle would be a disaster xD the forces involved would be insane. I could also be wrong but prove it!

Comment: Re:So why aren't you protecting yourself? (Score 1) 97

by DNX Blandy (#43255711) Attached to: Tracking the Web Trackers
I disable cookies and ONLY allow the sites I want. I use Firefox and ABP (Ad Block Plus). They can have my IP but that's all they will get. I hate the advertising companies as on some sites, especially when downloading, they swamp the whole page with "Download" buttons which look like the download buttons from the actual website they are advertising on. Total nightmare!

Comment: Re:RC4 has been broken for years (Score 1) 90

by DNX Blandy (#43180583) Attached to: Cryptographers Break Commonly Used RC4 Cipher
I'm no expert with regards to symmetric encryption granted, but I do know a lot about it. It makes RC4 look like plain-text in comparison. I disagree with regards to using a larger key as it means there is a lot more overlap when rotating the key, why have key(x) when you can have key(x, y)? It's technically as easy hence the speed is only just slightly slower, a fraction. The problem with keys that are 256 is the rotation. I came to the conclusion that there wasn't enough scope to randomize it enough hence the 64K key. I did numerous custom tests with a 256 key and I wasn't satisfied. It doesn't waste any computation and also I found it very good at securing large files. I still can't believe that RC4 is still used with the likes of WEP, SSL. In the end, it'll never get used and just be my own personal symmetric encryption algo :)

Comment: RC4 has been broken for years (Score 2) 90

by DNX Blandy (#43175705) Attached to: Cryptographers Break Commonly Used RC4 Cipher
I run tests on RC4 years ago, run it thru a plain text file full of the same char repeated and then run through RC4, guess what? Oh the password is showing every 256 chars, hence the "weak" key. I developed a newer version of RC4 called RC64, uses a 64K (65536 or 256 ^ 2) key. The randomisation process is very complex and the algo was only just slightly slower than RC4, which is very fast anyway. A graphical representation of the 64K key visualized pure white-noise when the key was viewed in grey-scale. They need to start using mine me thinks :) Oh, and in a 50MB file full of the same repeated char, the password was not even hinted at and no 4 bytes were the same.

Comment: Scaremongering as usual (Score 1) 646

It wont make any difference, the 2 main ways viruses etc get into a machine is: 1). Browser 2). Email. The router acts as a natural firewall so it's all down to the browser, anti-virus and the user being a bit savv and looking out for anything that's not right. Security nightmare my arse! We already have a security nightmare and it's the users fault mainly for not watching out.

Comment: Experience (Score 1) 480

by DNX Blandy (#39411561) Attached to: Ask Slashdot: What Are Your Tips For Working From Home?
Funny you should be in this situation as I starting working from home 2 years ago and I've been ok. I travel to our main office 270 miles away every 4-6 weeks but travel expenses are paid for. I have a room with an office setup in my house and do try and keep the door closed. I do miss the office atmosphere but in all, I have no problems and work like I would from the office, (OK sometimes I get distracted!).

Comment: Third party websites (Score 1) 69

by DNX Blandy (#37636424) Attached to: The State of Hacked Accounts
The reason Hotmail, Gmail, Yahoo and Facebook accounts get hacked is because of the shitty third party websites like those little small "gameing" sites, they get hacked and guess what? Oh! the user has used the SAME password for for their main email accounts. If people used just 2 passwords, this would stop their primary email accounts getting compromised. 1 main password for main account, and another for the shitty freebee websites which will probably get hacked. Simple!

Comment: Normal passwords are becoming useless (Score 0) 615

by DNX Blandy (#36345266) Attached to: Cheap GPUs Rendering Strong Passwords Useless runs numerous tools for this and with some users GPU rigs going totally insane: 4 x ATI Radeon 6990 throwing MD5 hashes out @ 45.7 Billion/sec, that's mixalpha-numeric password of length 8 in 1 hr 20 mins and then we can start on the dictionaries / hybrib-dictionaries / case-mutations / etc. The way passwords are used / stored is becoming broken by design.

I do not fear computers. I fear the lack of them. -- Isaac Asimov