Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: What are the actual risks to your network? (Score 1) 114

by nuckfuts (#49088837) Attached to: Duplicate SSH Keys Put Tens of Thousands of Home Routers At Risk

OK, this is clearly a bad thing, but I don't think it means that your private LAN is immediately accessible to people all over the world does it? Multiple routers using the same keys means you could be tricked into logging in to someone else's router without knowing, but that would still require some way of directing your traffic to the imposter's device to begin with, such as DNS hijacking.

Knowing someone's keys would also allow you to encrypt/decrypt traffic as that device, facilitating a man-in-the-middle attack, but still, you need a way to get in the middle between two devices. This is not something that's trivial to do from one arbitrary location to another.

I'm not suggesting this isn't a serious problem, but I don't think it's as bad as, say, remote administration being enabled with a known default password.

Comment: Interviewer is not as smart as he thinks he is. (Score 1) 809

by nuckfuts (#49050321) Attached to: Ask Slashdot: What Portion of Developers Are Bad At What They Do?

I asked another applicant a similar question: "Suppose you wanted to send me a file with very sensitive information, how would you encrypt it in such a way that I would decrypt it?" The person started off by asking me if it was an excel file, a PDF, etc.

What's wrong with asking that? Both Excel and Acrobat have built-in encryption capabilities. There's nothing ignorant about considering whether the built-in functionality is sufficient.

Comment: Re:The most insecure OS in the world (Score 1) 136

The security of an operating system should be judged by its default configuration, not by how insecure it is after you've installed a bunch of 3rd party apps. Even a security-oriented OS like OpenBSD can't prevent other people from doing insecure things to it.

Comment: Bad Comparison (Score 1) 645

by nuckfuts (#49000489) Attached to: Does Showing a Horrific Video Serve a Legitimate Journalistic Purpose?

Once again, Godwin's Law is proven.

Seriously though, you're making the wrong comparison. From descriptions I've read, the ISIS video contains quite a lengthy rant before the murder takes place. A more apropos question would be whether the Allies should have aired Hitler's speeches to the masses during the war.

Comment: Olympics (Score 1) 227

by nuckfuts (#48953387) Attached to: The NFL Wants You To Think These Things Are Illegal
I have similar feelings about the Olympics. It's fun to feel a part of something (national pride), but so much bribery and corruption goes in to choosing locations for the games, and so much effort and science goes in to cheating (with performance enhancing drugs), I find it hard to really get on board.

Comment: Re:Office 2007 started the move into alternatives (Score 1) 148

Name one function that was removed since 2003.

Microsoft removed the ability to "Insert from Scanner or Camera". For subsequent versions, the workaroundis to scan to an image file on your computer, and then insert the saved image into the document, rather than scanning directly into the document as before.

The removal of this menu item annoyed a lot of people, including myself.

Comment: Re:I hope not (Score 1) 489

by nuckfuts (#48851095) Attached to: Windows 10: Can Microsoft Get It Right This Time?

Show me another spreadsheet program that's as good as Excel.

And I'm pretty happy with Exchange as my mail server. Using Outlook Anywhere, I don't have issues sending e-mail from Outlook if I travel outside of my ISP's network. Using Outlook Web Access, I can access e-mails, contacts, and calendars from nearly any device with a working web browser. And using Exchange ActiveSync, my e-mails, contacts, and calendars can keep in sync with iOS and Android phones. I never have to transfer contacts manually if I change to a different smartphone. I can even wipe my iPhone remotely if it gets lost. Setting up equivalent functionality with other software would involve a lot of work.

"If truth is beauty, how come no one has their hair done in the library?" -- Lily Tomlin