Forgot your password?

Comment: Re:for a library... (Score 1) 445

by Lennie (#46732495) Attached to: Heartbleed Coder: Bug In OpenSSL Was an Honest Mistake

Of course these companies should do that. I wouldn't be surprised if many will do so.

What I meant was, more people could be on the mailinglist and look at the code as it develops. You only have to look and say: this looks a bit off.

I'm not saying you should be a formal reviewer that signs off on changes like the Linux kernel developers do.

Comment: Re:Meh (Score 1) 179

by Lennie (#46703155) Attached to: "Nearly Unbreakable" Encryption Scheme Inspired By Human Biology

Here is what I remember:

- things like cataract for retina scanners
- wear/tear and less grease for fingerprints
- facial recognition had problems with parts of the face sagging
- also applies to ears

And these aging processes are ongoing they keep changing things, you can't scan one year and have it still work 2 years later. So really annoying for passports. ;-)

Comment: Re:Do you need a database? (Score 1) 272

by Lennie (#46703103) Attached to: Ask Slashdot: Which NoSQL Database For New Project?

There are a whole lot of things PostgreSQL was less user friendly, but they take their time and keep improving it in a consistent way. It has many, many features.

Personally I really like PostgreSQL. It scales really well.

And if there is anything missing, there might be things some people want.

But I think you'll find it will be added in the next 3 releases. 9.4 is now in development:
- upsert/merge in 9.4
- basis of logical replication in 9.4 (has been available in out of tree tools for many years), upcoming versions will built on that.

I'm not sure what people still need if those are done other than multi-master. And this is where logical replication can really help. We don't know if the developers will implement it of course. These things take effort and time.

Comment: Re:Gee, that's worse than no encryption isn't it? (Score 3, Insightful) 303

by Lennie (#46694121) Attached to: OpenSSL Bug Allows Attackers To Read Memory In 64k Chunks

"known for 2 years"

No, no, this has been the code part of the stable release of OpenSSL for 2 years. The bug has only been known by non-blackhats for up to a few weeks.

If anyone else like a blackhats or NSA or whoever knew about the bug before hand, we don't know.

Center meeting at 4pm in 2C-543.