Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Submission + - NSA Hacker Chief Explains How To Keep Him Out Of Your System. (wired.com) 1

An anonymous reader writes: Rob Joyce, the nation’s hacker-in-chief, took up the ironic task of telling a roomful of computer security professionals and academics how to keep people like him and his elite corps out of their systems.

Joyce himself did little to shine a light on the TAO’s classified operations. His talk was mostly a compendium of best security practices. But he did drop a few of the not-so-secret secrets of the NSA’s success, with many people responding to his comments on Twitter.

Comment Re:"Linux Command Line Tirckery" HA! (Score 1) 642

Well, you are being sarcastic of course, but strictly speaking... you are right...

Are not huge efforts put into alternative input devices, which should be "more direct" - like brain-computer interfaces, eye-computer interfaces, body-motion-computer interfaces etc?

Yes, the computer should know what I want to do, and just do it. That's the whole point of this AI idea; if the computer can think itself (himself?), then you don't need to break everything up into step-by-step instructions.

As for electricity: it's just because we don't know how to put the needed energy into the computer otherwise, in a more convenient way. Well, if the computer had adequate AI and a little chemical plant inside, it could forage for energy, just like humans... or, previous generations dreamed of putting atomic batteries inside, which would go for thousands of years...

Comment Re:I believe him, but (Score 1) 297

As a native: This is all true. Now, if you're learning German, please forget it again.

I believe the way we natives handle this is by associating each common phrase with the correct pattern, not by going through rules and lists of prepositions. So, if I want to express that we are going into something from outside, I recall the pattern "in [den Wald] (hinein)gehen". Walking around inside something is "im Wald (herum)gehen". So, you have bits of meaning, and associate them with language patterns, including the cases. When you learn a language, you have to memorize the patterns anyway ("how do I say XYZ?"). Just also memorize the suitable cases.

Oh, did I mention that in my native Austrian dialect, we don't have a dative at all? :-) Walking into the wood is "I geh an Woid (ei)" (Ich geh inn' Wald hinein). Walking around the wood is "I geh an Woid umanond" (Ich geh inn' Wald herum)...

Comment Re:PHP is an ugly programming language (Score 1) 519

stristr( $haystack, $needle ) for checking if one string is contained in another versus in_array( $needle, $haystack )

Netbeans, PHP support, Alt+Space. Problem solved :)

Generally, PHP all the way for me, without web frameworks or anything. Some things that I find helpful in PHP:

  • Heavily use the object-oriented features (e.g. use classes with static methods for lexical scoping).
  • Liberally add comments in the source code (makes the Netbeans autocompletion/help work nicely).
  • Make one central database access library in your project (based on PDO), and use that library throughout your project.
  • Define central configuration in a config.php file.
  • Separate presentation-oriented PHP files (to be treated as "templates") and back-end (which have a starting php tag at the beginning, and no ending tag throughout the file).
  • Use AJAJ (with JSON) if needed. Both PHP and Javascript can do it natively, and it's faster and much simpler than XML.
  • Consider REST-style interfaces if your project is big.
  • Use sane parameter semantics: POST parameters in forms, GET parameters only very rarely.
  • Use the PHP session to store context.
  • Do not trust user input; check string lengths, options, and run all inputs through regexes to validate the allowed characters. Put this string/number/option checking code into a separate backend library, and use that everywhere else.

Comment Re:No (Score 5, Informative) 601

The main problem with OpenPGP on mail for me is that due to the unique key per recipient, if you add more than one recipient or cc, you have to encrypt the mail for each and every one of them. If you add some attachments it's pretty sure that you will hit the maximum allowed mail size of some mail server along the way.

Uh, no. It's called "session keys". The content is encrypted with a random number (the session key), and this random number is in turn encrypted with the recipients' private keys. As the content is usually compressed too before encryption, the result may even be a smaller e-mail than without...

Electronic Frontier Foundation

Submission + - Google Surrenders in the "Nymwars" (eff.org)

derGoldstein writes: According to the EFF blog: "Proponents of pseudonymity scored a major victory today, when Google executive Vic Gundotra revealed at the Web 2.0 Summit that social networking service Google+ will begin supporting pseudonyms and other types of identity."
Facebook

Submission + - Facebook malicious link protection already broken (blackhatacademy.org)

mepholic writes: To be honest, this vulnerability is not anything that is actually new. Facebook was informed about it months ago (July 31, 2011 to be exact.) They really just started using WebSense to brush this vulnerability under the rug and make their users feel a bit more safe. Blackhat Academy released a Proof of Concept exploit on October 4th, the day after Facebook enlisted WebSense for link protection.

Submission + - Netherlands introduce mandatory alcohol lock on ca (volkskrant.nl)

vikingpower writes: "Although the link is, alas, in Dutch, the news is pretty much that: news. From December this year on, drivers caught with more than 1,3 parts per thousand alcohol in their blood get a mandatory alcohol lock on their vehicle. The lock will ask them to breathe into it several times per ride, and will block the vehicle's operations if and when measuring more than 0,2 parts per thousand alcohol. The measure is to be inflicted on top of judicial measures ( hefty fines )."
Iphone

Submission + - Iphone 4 Case Made 100% from Trash! (miniwiz.com)

An anonymous reader writes: Who said that Eco-Design product could be not good looking?

MINIWIZ is a Taiwanese firm that is a globally recognized innovator dedicated to eco-solutions through practicing the 3Rs – Reduce, Reuse and Recycle.

Their new product is an Iphone Case Made 100% from Trash! Yes Trash!

Basically, they use a new type of materials called POLLIBER, a post-consumer thermoplastic and semi-carbonized waste fiber composite.

Their Iphone Case is called Re-Case! RE-case’s design was inspired by the Japanese INR, a carrying case for identity seals used in the Edo Period which also served as a worry stone. Instead of a seal, RE-case holds an RFID (radio frequency ID, such as those for office security or public transit) or wave-able credit card between itself and the user’s iPhone. The graduated design improves grip and texture while retaining the aesthetic qualities of the INR.

http://www.miniwiz.com/products/materials/re-case

Submission + - Ask Slashdot: How do I start actually getting thin 1

zaydana writes: I always have 10 or 20 projects that I want to work on, and never manage to finish any of them because another more interesting problem comes along. I'm sure this is a problem that is rather frequent amongst the Slashdot crowd, so I'd love to hear from similar people what steps they've taken to help themselves get things done?

Submission + - Kindle disassembled (blogkindle.com)

An anonymous reader writes: Kindle motherboard cut open — reveals ARM Cortex-A8 CPU, 128Mb of RAM (half that of Kindle 3) and supporting hardware

Slashdot Top Deals

% "Every morning, I get up and look through the 'Forbes' list of the richest people in America. If I'm not there, I go to work" -- Robert Orben

Working...