Forgot your password?

Comment: Re:To the point... (Score 1) 147

by maz2331 (#46728463) Attached to: 'weev' Conviction Vacated

Keep in mind that all his script actually accessed was the login page itself, that the user agent string can be set to anything on any browser, and the request itself was no different from trying to access "" then "/p?000002"... etc. It didn't actually get to the *protected* data itself, and there isn't really any privacy interest or expectation in an email address itself, either.

Comment: Re:We've come a long way (Score 1) 146

by maz2331 (#46705057) Attached to: Born To RUN: Dartmouth Throwing BASIC a 50th B-Day Party

Case sensitivity is the one big turn-off to using C-syntax to me. If I am going to deal with it, then I want my damn pointers back, so I'd just as soon work in C++ and have some actual power to go with the inconvenience. Otherwise, for just business-logic and general DB stuff, VB.NET is quite nice to work in.

Comment: Re:bayonet mount- on a computer (Score 4, Interesting) 160

by maz2331 (#46630927) Attached to: Apple Patent Could Herald Interchangeable iPhone Camera Lenses

This is an interesting variation of the camera lens bayonet mount that includes a "breakaway mode" if it is dropped that allows the lens to snap out without damaging the device or the mount. With a normal DSLR lens mount, that doesn't happen and the lens will remain firmly attached until one of the mounts breaks, whereas this one will release instead of breaking.

Comment: Re:Never gonna happen (Score 1) 704

by maz2331 (#46547583) Attached to: Getting Misogyny, Racism and Homophobia Out of Gaming

Various social engineers have been trying for decades to change human nature. It hasn't worked in the past and it won't work in the future any better than attempting to change cats into vegans would. Even if they manage to suppress the expression of the thoughts in one place, it just pops up elsewhere, or worse, festers into a sudden explosion of rage.

Comment: Re:Recycle! (Score 3, Insightful) 323

by maz2331 (#46547543) Attached to: More On the Disposable Tech Worker

Consider the source - FTS: "Scott Corley, the Executive Director of immigration-reform group Compete America"

This isn't coming from a CEO, it's coming from a political activist. And of course, he is dead wrong about "The further you get away from your education the less knowledge you have of the new technologies...". Someone just out of school hasn't actually worked with the new technologies as they have trickled into existence as someone who has been in the field for years has.

Comment: Visibility (Score 2) 94

by maz2331 (#46525393) Attached to: Security Industry Incapable of Finding Firmware Attackers

There is really no way for any code running on top of another layer to verify that lower layer's integrity - it has to rely on what is reported and a malicious BIOS or UEFI layer can simply just lie to it. Hell, it's possible for a low-level hypervisor to run another, clean, BIOS/UEFI and simply virtualize every piece of hardware in the box. Likewise, it can block visibility of any traffic going in and out that it desires. This type of security has to happen at the network level instead - something outside of the device has to detect the suspicious traffic that such an attack must generate in order to be useful. That in turn requires that the networking gear has to be trustworthy and not itself owned by the attacker or have any backdoors installed at the factory (or chip maker, or etc etc).

Comment: Re:Oh, Hell NO! (Score 1) 324

by maz2331 (#46306091) Attached to: Schneier: Break Up the NSA

China is the only one in that group that has any actual chance. The other two would not last a month in a ground war against the US military when it is in full-blown combat mode. One nuclear attack, even an EMP strike, would not defeat the USA, though it would be badly wounded for a period of time, and the attacker would most certainly be cluster-nuked into oblivion in retaliation.

It is not every question that deserves an answer. -- Publilius Syrus