Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment: Re: DNS without DHCP (Score 4, Interesting) 382

by bytesex (#49516627) Attached to: Why the Journey To IPv6 Is Still the Road Less Traveled

Per-connection MTU's are a pain. You shouldn't be making that point if you think that routers having a PNAT table is a hack - having state is awful. And IPv6 has other flaws too: some headers fields are unprotected from bit-errors in transit. There is no specification as to how many extension headers I'm allowed to use. Higher layer fragments are completely unrecognisable to stateless concentrators (more so than in IPv4). UDP- and TCP-checksums are not allowed to be all zeroes (which was neat when you provided a better checksum yourself over, you know, fragments, which got ripped out).

No there's plenty rotten in the state of IPv6. And it's not just because 'interests' ripped things out.

Comment: Article runs in circles (Score 2) 66

by bytesex (#49516475) Attached to: How Security Companies Peddle Snake Oil

No, we certainly are not all targets of nation states. But there are more potential targets of nation states than that currently actually have proper IT security measures in place. I'm talking about you, waterworks / electricalworks / etc. To say you can 'predict' an attack is to say that you can 'predict' Putin's next move. You can only anticipate statistically. And how do you do that? By using security products to fill in a security plan.

Comment: So? (Score 1) 161

by bytesex (#49368827) Attached to: Europol Chief Warns About Computer Encryption

The cat is out of the bag. Crypto and its application is an academic subject now, with plenty of companies and open-source projects using the fruit of the work. That is to say, for another ten-fifteen years or so. Then, quantum will start taking it all apart. The amateurs will not have the resources to follow there.

Comment: Re:Normal women... (Score 1) 765

by bytesex (#49314833) Attached to: A Software Project Full of "Male Anatomy" Jokes Causes Controversy

This is not about a workplace situation. This is a about doing volunteer work. You know, the environment that requires a little begging from the person who initiates it. Something about making sure you're not excluding somebody who might otherwise turn in great work. Because you're not *paying* them, you're kindly asking them if they want to do something for you in their spare time.

Comment: Re:why? (Score 1) 677

by bytesex (#49042557) Attached to: Empirical Study On How C Devs Use Goto In Practice Says "Not Harmful"

I use a standard for coding in C that *requires* the use of goto. It goes like this:

#define CHECK(fnc) { int __r = (fnc); if (__r) goto CLEANUP; }

Then define each function to have a CLEANUP: label, and surround the call of every function from within this function by CHECK(). The CLEANUP label usually has a return 0; just before it, and in most cases a return nonzero; after it. Gives you clean code that always eats up the stack in case of error.

"But this one goes to eleven." -- Nigel Tufnel