Forgot your password?

Comment: Re:Just say block (Score 1) 226

by TCM (#47954603) Attached to: Google's Doubleclick Ad Servers Exposed Millions of Computers To Malware

I have no idea WTF you are talking about. A closed TCP port emits an RST. It even says so in the very link you posted:

"Receipt of a SYN message on a port where there is no process listening for connections."

Next time you try to be a smart-ass, get your facts straight. Idiot.

Comment: Re:So, what now? (Score 2) 566

by TCM (#47113797) Attached to: TrueCrypt Website Says To Switch To BitLocker

They're not only not convenient, they're also not secure in the sense that in order to work with your data, you have to decrypt it _somewhere_. Unless you secure erase your free drive space after zipping your files back up and deleting the unencrypted copies, I wouldn't consider that data to be secure anymore, at all.

Comment: Re:Better DNT Implementation (Score 1) 300

by TCM (#46904441) Attached to: Yahoo Stops Honoring 'Do-Not-Track' Settings

There is no job you can do if the other party is not trustworthy - other than limiting your communication. All this convoluted header bullshit is useless.

Stop crying for a legal solution when there's a perfect technical one: STOP TALKING TO TRACKING SERVERS! Advertisers had their chance. They failed it. So ignore them and let them sulk in their own bullshit.

Comment: Re:Alternative to opening admin port to world? (Score 1) 379

by TCM (#46802549) Attached to: OpenSSL Cleanup: Hundreds of Commits In a Week

OpenVPN with --tls-auth protecting the TLS layer. That protection made OpenVPN safe against Heartbleed. Doesn't work if you have untrusted users, obviously.

Don't VPN directly into your LAN. Use a hardened node in a heavily firewalled DMZ and use SSH from there.

OpenVPN and OpenSSH simultaneously having a vulnerability is pretty unlikely.

Eureka! -- Archimedes