Forgot your password?

Comment: PRT, SPF, and DKIM (Score 1) 405

by kbahey (#48382183) Attached to: Ask Slashdot: How To Unblock Email From My Comcast-Hosted Server?

I had similar issues, though on a machine hosted outside my home network.

The solution was to implement SPF, pointing to the PTR of machine (i.e. what a reverse IP lookup will resolve to), and DKIM.

In your case, doing a PTR will be hard, since dynamic DHCP may change what the PTR is, but the rest does apply.

I wrote the following detailing what I did: Setting up SPF and DKIM on Postfix.

Comment: Yahoo DMARC caused mail bounces (Score 1) 139

by kbahey (#48296663) Attached to: Ask Slashdot: How Useful Are DMARC and DKIM?

I had lots of mails bounce after Yahoo implemented DMARC.

However, with a bit of patience, I was able to implement DKIM and SPF for my domain, and now all the mails get delivered to Yahoo addresses.

I wrote about how ot configure SPF and DKIM in this article: Setting up SPF and DKIM for Postfix.

Comment: Was OK until mid or late 19th century (Score 1) 272

by kbahey (#48251695) Attached to: A Library For Survival Knowledge

Things were easy until the mid to late 19th century. Anything could be produced in a carpenter, blacksmith or watchmaker's workshop. Lenses were ground, metals were machined, ...etc.

Then in the early 20th century things started to get far more specialized. By the mid 20th century, we had the transistor then the integrated circuit.

Now, everthing from ubiquitous phones to home appliances to street lights have complicated integrated circuits, CPUs, RAM, ...etc. that can only be designed by specialized teams, and fabricated in very high tech fabs.

I wrote about it here : Information readability and longevity in the digital age.

Comment: Hypothesis by researchers (Score 1) 139

by kbahey (#48058437) Attached to: Lost Sense of Smell Is a Strong Predictor of Death Within 5 Years

Contrary to all the speculative guesses in the comments, the researchers do have a hypothesis for this.

From the linked PLOS article:

Unique among the senses, the olfactory system depends on stem cell turnover, and thus may serve as an indicator of deterioration in age-related regenerative capacity more broadly or as a marker of physiologic repair function

Comment: Re:There are no "remote" exploits for bash (Score 1) 329

by kbahey (#48020463) Attached to: Bash To Require Further Patching, As More Shellshock Holes Found

/bin/sh is linked to /bin/bash and vulnerable

Not on Debian/Ubuntu. On those, /bin/sh is symlinked to dash, which is not vulnerable to Shellshock.

To test this, I created a small PHP script, as follows:

$ cat > x.php
system('echo hello there');

I run the php script, and do an strace following children:

$ strace -f -o output php x.php

In the output I find this:

28302 execve("/bin/sh", ["sh", "-c", "echo hello there"], [/* 24 vars */]) = 0

And here is what /bin/sh links to ...

$ ls -l /bin/sh
lrwxrwxrwx 1 root root 4 Mar 29 2012 /bin/sh -> dash

Comment: Who in their right mind ... (Score 1) 399

by AftanGustur (#47991381) Attached to: Remote Exploit Vulnerability Found In Bash
... is using bash scripts to generate web content in 2014?

Look, there is a bug, obviously, but to say that it is "remotely exploitable" is a half-truth, and that it is "on level with or worse than heartbleed" is nonsense.

There are a lot of things that need to "line up" in order for this to be remotely exploitable.

+ - GNOME 3.14 Released

Submitted by Anonymous Coward
An anonymous reader writes "GNOME 3.14 was released today and it includes some interesting changes such as re-worked default theme, multi-touch gestures for both the system and applications, and new animations. Information including details on all the new features, can be found here."

Comment: Did it a long time ago ... (Score 1) 129

by kbahey (#47825023) Attached to: The Frustrations of Supporting Users In Remote Offices

I had to deal with a remote customer whose person on site does not speak English, by getting him to enter UNIX shell commands. His native language (and mine) was Arabic.

What I did was to tell him what Arabic key to press so that the English equivalent would be the one sent to the shell.

We were lucky that his Arabic keyboard layout was the same as mine. That was not a given in those days (Late 80s, early 90s), but we lucked out.

He was describing to me the output in English (vertical bar, vertical bar with a circle at the bottom, ...etc).

It worked out and we solved the problem in less than an hour.

Comment: They store credit card data with the transaction (Score 5, Informative) 132

by kbahey (#47812843) Attached to: Banks Report Credit Card Breach At Home Depot

Home Depot stores credit cards with the transactions.

I know this because when you go to return something I bought, they don't ask you for the credit card, and sort of highlight that this is a convenience that is unique to Home Depot.

I complained more than once to the cashiers about storing credit card numbers (it is not their fault, it is management and IT). The cashiers would say: "Don't worry, we don't have access to it!"

My response was: it is not you whom I am worried about.

Now we know that storing credit cards is a bad idea, and why ...

Comment: Re:Russian Programmer's are Brilliant! (Score 1) 157

by AftanGustur (#47783121) Attached to: Software Error Caused Soyuz/Galileo Failure

I've been hearing all this about the much vaunted chops of these Russian coders, but frankly I don't ever see it.

There is also the possibility that the project was sabotaged by an external actor.

Maybe it is a coincidence but the one who profits the most from this failure is the same as has been working hard during the last 10 years to get rid of the Galileo program and is also the same nation as is known for being the most technically capable in electronic warfare/hacking.

Old programmers never die, they just hit account block limit.