Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.

 



Forgot your password?
typodupeerror

Comment: Re:Internet Explorer (Score 1) 99

by ancientt (#48896579) Attached to: In Addition To Project Spartan, Windows 10 Will Include Internet Explorer

Yeah, I know, that's funny and yes, for a good three seconds, I had a moment of incoherent and dumbfounded shock at the idea someone could be seriously saying that. Then I saw the moderation and realized I'd been had. I paused for a second and realized I had some actual experience that wasn't so far off.

There was a time I liked VMWare. I used it until I discovered how much better Xen performed for me. I was a fan of XenSource until they were taken over by Citrix. When I took a job with Microsoft as the standard (no kidding, the boss sat me down and gave me the lecture my first week for daring to use VNC instead of MS Remote Desktop) I learned to use Microsoft virtualization instead. This was before Hyper-V and it.. well lets just say it was a hard acclimatization, so when I needed something that actually worked well, I convinced them that VMWare was a big enough enterprise player that we could use it where MS just couldn't do the job. That didn't mean I got a budget of course, it just meant I could use the free version. It wasn't great, but it was good enough. IE worked with it but keeping IE patched meant that IE stopped working, so now I had a system that couldn't work with anything but outdated and insecure software. Long story short, until I retired that system years later, I had portable Firefox 2 to run the interface.

I still don't love Hyper-V but it has performed better than VMWare free crap and if it still doesn't do some things (seriously, when will they enable USB access for clients?) at least I don't have to keep ancient browsers around to manage it. I miss Xen and still don't think KVM is as good. For that matter I miss the Phoenix browser. The best thing that could have happened to the Mozilla browser was to throw away all the crap that kept it from doing the one thing it was supposed to do best. I will appreciate it if Spartan is even half the improvement Phoenix was over Mozilla. I won't be surprised to write a comparison on how both started out with noble goals and decent performance before they were killed by the same loss of focus by their parent company in ten more years.

+ - Arrested For Not Giving Up Camera->

Submitted by ancientt
ancientt (569920) writes "The cop told him to hand over his camera, but he knew his rights. It didn't keep him from being arrested.

Andrew Flinchbaugh was approached by NJ police and ordered to give up his camera but he recorded the incident on his mobile phone. That recording has now gone viral. They did give him his camera back, but not without arresting him and not without going through the photos first, something that should require a search warrant they did not have. At one point he says that if they take his camera, they will have a lawsuit on their hands. It will be interesting to see if Mr. Flinchbaugh is true to his word."

Link to Original Source

Comment: Re:Poor choices to use proprietary cause this! (Score 1) 129

by ancientt (#48707461) Attached to: Google Researcher Publishes Unpatched Windows 8.1 Security Vulnerability

Why are you bringing up the average user when he was talking about the end user who has a strong reason to keep something patched? That's comparing a Mint home user to someone running the distribution upgrade servers.

If you are in charge of managing an important system or network, then you can either fix the problem yourself, have your programming team fix it and commit the fix back to the upstream vendor or you can potentially hire the work out. Even if you are an average end user, you could actually fix it if you were willing to put in the work, however unlikely that scenario might be.

Comment: Re:This is why "biometric" authentication is usele (Score 1) 80

As for remembering, is it harder to remember "username" and "password" or "usernamepassword"? It's the same. You just don't press return in between them.

Logically? No. But in practice, I support both approaches and yes, for no obvious logical reason, it makes a huge difference.

Comment: Re:This is why "biometric" authentication is usele (Score 1) 80

How is 8 letters username + 8 letters password harder or easier to crack than a 16 letters password?

It isn't easier to crack, but people remember usernames easier, so you get people who will enter 16 characters instead of eight. The validating server can treat them as separate lookups or not without impacting the efficiency of brute force attacks. The advantage of using multiple entries is that you end up getting more characters that have to be guessed correctly, which is a compound effect, so adding a PIN or multiple choice question compounds it further and isn't pointless at all.

Say you are trying to brute force my slashdot password and it's eight characters. That's 7213895789838336* possible combinations you have to work through to target one user, but I'm user 166417, which means you'd be 166417 times more likely (at least) to get illicit access if I weren't using a separate username.

Now, if my username were hidden and combined with the password entry and had to be eight characters, you'd have 52040292466647269602037015248896 potential combinations, which is obviously harder to crack, but you'd sacrifice functionality for that trade off and 7213895789838336 is a reasonable number of permutations for the level of security required. In reality, I'm not limited to eight characters so the real number is even higher.

Now, you have a valid point if you say that 16 characters would be a better length for passwords, but if you required that, there would be far fewer people who would sign in and make comments which would degrade the value of the whole system.

* - I know there is additional math that can be done here, not limited to but certainly including the tendency of people to use words and pseudo words in their passwords. I've read the manuals and brute force cracking articles too but I'm not getting paid to figure it out so my motivation to get a more accurate number is low.

Comment: Re:This is why "biometric" authentication is usele (Score 1) 80

If we're talking about protecting against unauthorized access in the real world, we do want a username and password combination because that's harder to guess than just a password. If I am running a website where I'm using a cookie as part of the authentication process, then yes, it is best to keep a database where I tie the cookie to an IP address because that makes it harder to hijack a session.

When I can force you to hand over one thing you know, I can force you to hand over two things you know.... that second factor would keep me out.

Over and over you are stuck on this idea that you're defending against a physical attack, which is quite nearly pointless. The attacker who takes family members hostage will bypass pretty much any security you can put in place.

If you're really wanting to discuss security against physical force, then you're not thinking big enough, why not discuss defending against the attacker with a gun pointed at your family member or a bomb in a school? Why not discuss defending against the attacking country with ICBM with nuclear warheads? Pick your action movie plot of choice, I'm willing to go down Diehard lane with you. I just need to make sure we're talking about the same thing.

Comment: Re:lemme guess (Score 4, Interesting) 158

by ancientt (#48688769) Attached to: Norse Security IDs 6, Including Ex-Employee, As Sony Hack Perpetrators

You're making this too hard. You can upload terabytes of data using good old SSL or encrypt files with zip tools like 7-zip and there is nothing in the stream of data that will be recognized... that's what encryption is for.

The person wanting to get data out doesn't have to work hard at all to ensure it can't be recognized as it is being transmitted. The difficulty is in making sure that the users of the system don't notice the decrease in disk IO and loss of bandwidth. If they've got a good perimeter defense or the right heuristics for the server, they may notice "hey, that's more activity than usual" and respond, but that's about the only way to catch somebody in the act of transporting data out of a system.

Unless they're stupid. Which, with Sony's security, they could have been.

Comment: Re:This is why "biometric" authentication is usele (Score 1) 80

Soon we will be wearing, burkas, sun glasses and gloves to make sure our identities will not be lifted.

No. Biometric authentication won't replace all other methods of security anytime in the foreseeable future, nothing that requires serious security will rely on them alone. I have a hard time believing they ever could. If any serious company tries anytime in the next twenty years, you have my advice to place bets that it will be compromised in short order.

I keep seeing this idea that biometrics are flawed because you can't change them if someone's information is compromised, but that idea ignores the reality that biometrics are not and will likely never be used alone as significant security.

Comment: Re:This is why "biometric" authentication is usele (Score 3, Insightful) 80

Minor quibble: using two of one group is not useless either, it is only less useful.

  • Most login prompts require a username and a password, which are both things you know, but that combination is better than requiring only one thing you know.
  • Requiring answers to security questions, yet another thing you know, is often considered better still.
  • Iris scans can be faked as can fingerprints, but both together is harder to fake than either alone.
  • Bribing one guard is easier than bribing two.
  • Checking that a browser supplies a cookie is a good thing, but checking that the IP and the cookie are paired correctly is better.

Comment: Re:This is why "biometric" authentication is usele (Score 5, Interesting) 80

Not useless, just not sufficient.

Your house key will work in hundreds of locks, but it's easier to pick the lock than track down exactly which house key might work on the house you want to break into. The reason that biometrics are useful is that they provide a second condition that has to be met for authentication, not because they provide the only one. If you give employees RFID cards and pair it with iris scanning, you're going to have moderately secure door security. It can get a lot better by adding other controls, for example introducing human checks into the system or an employee PIN.

Most businesses don't even have a second check for door security. I wish people would quit confusing a method of authentication with the idea that any single method is sufficient.

Comment: Re:Rise of the darksite DNS (Score 1) 388

by ancientt (#48621459) Attached to: Sony Leaks Reveal Hollywood Is Trying To Break DNS

You say that but maybe you won't be able to. When I was filtering the internet for my kids, I included an interception of anything on DNS ports and redirected it to my filtering server.

Your ISP could do the same thing, fairly trivially and if they do, it won't matter what IPs you tell your machine to use as a DNS server, it will use the ISPs anyway.

I think it breaks DNSSEC and I *know* it makes MITM easy for non-encrypted sites (because I did that too) but don't expect the MPAA and Sony to care, they're happy to break the security of the internet for everybody as long as it lets them think they're preventing copyright infringement. The ISPs would do it now to increase profit if it was worth the effort and complaints it would come with. Don't expect it to take more than a hint of government suggestion for your current freedom to disappear.

Don't feel too bad for my kids, they're old enough now that discussing and spot checking their habits is a better solution and most of my active interference was to block them until they completed a chore each day.

We can predict everything, except the future.

Working...