Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:It's a small thing... (Score 1) 327

by Harodotus (#49008585) Attached to: Swatting 19-Year-Old Arrested in Las Vegas
Oh come on, Westlake probably meant that by describing the accused as a teenager you label him in a way to inspire thoughts of childhood vs adults.

Yes technically 19 is a "teen" age, but anyone accused of crimes that is older than 18 should be described as an adult. I would maybe extend the reasonability of extending the Teenager label to somebody still in high school even if 18 by calendar timing.

Comment: Re:Angry, lost my template at this story (Score 0) 181

I was going to strongly disagree, but I didn't want to hear the Whoooosh of the Parent Post's Sarcasm passing over my head...

At least I hope it is sarcasm, I wouldn't put anything past Comcast
<forced meta-insert by Comcast net> but they are the most customer focused and patriotic company who only deserves further deregulation  </meta-insert>

Comment: Re:Easy to kill this one (Score 1) 206

by Harodotus (#48227075) Attached to: Verizon Injects Unique IDs Into HTTP Traffic

Not really. Even if your derivative work idea was valid and could be used to stop Verizon, they would just update their Terms of Service (TOS) to explicitly have you grant them this right and waive any claims.

Frankly, while i haven't checked, is very likely that their existing TOS grants them the right to make any change to your traffic they see fit, so it's likely that any derivative work would fail on it's face based on your existing contract.

Comment: Re:Here's his best defense.. (Score 1) 802

by Harodotus (#43858639) Attached to: Judge Orders Child Porn Suspect To Decrypt His Hard Drives
I'd always wondered if someone's decryption passphrase was a short description of how he committed a crime like:

"I buried the murder weapon at gps xxx,yyy"

"I had premeditation in committing my illegal acts"

Then it would definitely be self-incriminating to reveal his passphrase, and if forced to, he could get the conviction overturned on appeal.

+ - Northern Ireland Town Fakes Prosperity for G8 Summit->

Submitted by Anonymous Coward
An anonymous reader writes "

A town in Northern Ireland is getting spruced up for the arrival of some special guests. World leaders are gathering in the town of Enniskillen for the G8 summit next month. And to get ready, the town is putting up fake storefronts on shuttered businesses. Anchor Marco Werman speaks with Irish Times reporter Dan Keenan about the efforts to make the town look prosperous.

"

Link to Original Source

Comment: Re:Warning! Security hole in ROT-13 and ROT-26! (Score 1) 261

I'm afraid that your information is out of date, with the progression of Moore's Law, even ROT-39 now fails to today's botnet based distributed key cracking apps, i recommend using 128-bit ROT keys (or even-256 bit ROT keys for super secure data) despite the performance impact requirements.

Using just ROT-128bit (aka ROT-3.40282367e38 or ROT-340,282,367,000,000,000,000,000,000,000,000,000,000) should keep your data secure for years.

Comment: Re:Outward Appearances (Score 5, Informative) 175

by Harodotus (#42714845) Attached to: Aaron Swartz Case: Deja Vu All Over Again For MIT
I might add the Swartz was charged with 13 felonies, with a maximum sentence of 65 years in felony lockup, effectively life in prison. Murder, even multiple murders, has no more harsh a punishment (except in death penalty states).

You're point is valid, but it's, at best,a Type D "crime" being punished as a type A "the most harsh society can inflict" and might not even be a good civil suit for mild contract violation.

Comment: Re:Single point of failure (Score 1) 127

by Harodotus (#33505622) Attached to: NYT Password Security Discussion Overlooks Universal Logins
Well, it was mainly meant as a tongue-in-cheek dig at the folks in Redmund.

However, while it's not like I've gone to trouble of checking it, it's my understanding that modern password guessing dictionaries are incredibly extensive and have lengthy sections of common key combinations such as single letter repetitions of all acceptable lengths, numeric sequences, and keyboard patterns like qwerty, extended qwerty (qwertyuiop[]\asdfghjkl;'z), as well as many more folks have been dreaming up for decades now.

Of course the webpage is just a local javascript for simple complexity checking, but it's important to remember that it's not really a good simulation of a password's unguessability.
Privacy

NYT Password Security Discussion Overlooks Universal Logins 127

Posted by timothy
from the your-voice-is-your-password dept.
A recent NYT piece explores the never-ending quest for password-based security, to which reader climenole responds with a snippet from ReadWriteWeb that argues it's time to think more seriously about life beyond passwords, at least beyond keeping a long list of individual login/password pairs: "These protective measures don't go very far, according to the New York Times, because hackers can get ahold of passwords with software that remotely tracks keystrokes, or by tricking users into typing them in. The story touches on a range of issues around the problem, but neglects to mention the obvious: the march toward a centralized login for multiple sites."

MOUNT TAPE U1439 ON B3, NO RING

Working...