Become a fan of Slashdot on Facebook


Forgot your password?

Comment: Re:Need to think about why it is being done (Score 4, Interesting) 68

by oggiejnr (#47588161) Attached to: Recipe For Building a Cheap Raspberry Pi Honeypot Network

The aim of honeypots in this scenario isn't to bait out people but software. The first thing that a targeted piece of malware is likely to do is find other systems to infect and map out the internal network. If a computer in the accounts department is suddenly firing off CIFS requests at your honeypot it is an anomaly that should be investigated. It's much easier to find dodgy traffic if there isn't supposed to be any rather than looking for it in the corporate network as a whole.

If it turns out it was a bored intern browsing the local network then the situation can be explained. If it was an opened dodgy e-mail or other attack vector then the machine can be wiped and connection logs gathered so that a clean-up operation can be attempted.

Comment: Re:Several enigma machines (Score 4, Insightful) 210

by oggiejnr (#44336919) Attached to: Alan Turing Likely To Be Given Posthumous Pardon
What you have stated is not the entire truth either. The Poles cracked Enigma by relying on a protocol weakness (the Germans sent the initial rotor setting twice). Even before cracking the naval Enigma, Turing et al devised a way to break Enigma should the Germans realise they had a vulnerability by using a known plaintext attack. The Germans changing the protocol to only send the initial rotor setting once rendered the Polish cryptanalysis unusable. They also developed the machinery needed to automate the cracking of Enigma on a far larger scale than the Poles had managed.

Comment: Re:Start with curiosity, them experiment ... (Score 1) 623

by oggiejnr (#43858335) Attached to: How Did You Learn How To Program?

In my opinion, the "quirks & different ways of doing things" are a key part of knowing a language and are essential for building large or complicated systems. For example, while I may be able to look in the documentation to find the library classes and methods to open a file and write to it, Java/C#/C++ have quite different idioms and constructs to ensure that handles are properly closed in the presence of exceptions. While it would be possible for me to very easily write something hacky that worked most of the time in Java, there is a good chance I will miss some quirks of the language and runtime which either cause things to break or could have been exploited to make the code smaller and more readable.

I agree that a lot of the hard work goes into the learning the first language most of which can be reused for subsequent languages, but at the same time I would feel uncomfortable putting myself forwards as a Java programmer despite good C++ and C# knowledge and experience.

Comment: Re:21st Century Lobotomies (Score 1) 385

by oggiejnr (#42431227) Attached to: China's Controversial Brain Surgery To Cure Drug Addiction
A Hemispherectomy is occassionally used to treat very serious epilepsy. Resorting to brain surgery is usually done only in young children as the brain has an ability to reroute most of the affected functionality. In adults this does not happen as easily. However when patients are having 1000+ seizures a month and anti-convulsants aren't working it is very effective (assuming the source of the seizures is localised)..

Comment: More Information (Score 2) 180

by oggiejnr (#35048058) Attached to: UK Research Aims For 100x Speedup In Fiber-Based Broadband
There is slightly more information in the grant overview from EPSRC although it is quite light of specifics.
The proposal appears to be usual blend of new modulation techniques, all optical switching and the usual "green" nonsense which is required to get anything approved these days.

Comment: Re:They could just use (Score 1) 109

by oggiejnr (#33172342) Attached to: Counting the World's Books

ISBN check codes are designed to catch common errors back when hand entry was common -

a run of two digits in the wrong place (eg 556 instead of 566)
a mistyped digit
two digits swapped around by one place

The UPC code does not support the latter at the expense of only requiring the check symbol to be one of 10 regardless of the number of digits in the code. The ISBN algorithm requires n+1 where n is the number of data digits. Whether this is required nowadays given that very few ISBNs are entered by hand is another issue.

Comment: Re:cue the skeptics (Score 1) 128

by oggiejnr (#32205270) Attached to: BT Gets Exclusive Rights To OnLive In the UK

Except that electrons travel a fuckton slower than the speed of light through a wire. 66% through standard coaxial

Electrons travel a lot slower than that - although you are correct that that is the wave propagation speed in coax which is what really matters.
It's still faster than wave propagation in an optical fibre though.

The life of a repo man is always intense.