If you can live with Android 2.x and IE on Windows XP being unable to connect, then there is a "hostname" equivalent request, and you can host multiple SSL sites on a single IP.
I thought it was hilarious how they managed to work Oracle's name into that "POODLE" flaw they found.
People who only vote because they heard about it on Facebook (or via that stupid sticker people wear) shouldn't be voting.
THAT is a huge scam.
The slashdot objection is that slashdot itself isn't on HTTPS. Come on, guys! Does whoever posted this article not see the need??
I flew recently, and the crew was saying how much they loved not having to fight everybody to turn off their devices.
Southwest might be a bit friendlier than most others, though.
The worry (and article) is about attacks that happened BEFORE public disclosure. After, it's the admin's fault straight-up. Before, nobody (basically) had any hope of detecting or stopping it.
It proves that the NSA didn't use Heartbleed for widescale private-key-harvesting attacks.
There's more to come in the exciting adventures of Bennett Haselton!
...So why does Slashdot redirect HTTPS back to HTTP??
Be polite, Bennett.
You've got your period and comma keycaps swapped. Or you're European, I guess. Either way, it doesn't make sense to write numbers that way.
Why is this on Slashdot?
Well, you see:
The systemd integration finally allows the X server to run without root privileges, something in the works for a very long time. The non-PCI device improvements mean System-on-a-Chip graphics will work more smoothly, auto-enumerating just like PCI graphics devices do. As covered previously, GLAMOR (the pure OpenGL acceleration backend) has seen quite a bit of improvement, and now works with Xephyr and XWayland.
It's just stupid to blame a lack of policy for somebody doing something illegal. The absence of a policy in no way means the entity endorses an activity.