Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:But... but? (Score 1) 172 172

I don't have any problem with the account verification though - it's just a variant of the 2-factor authentication so don't complain too much, it may prevent you from getting your account hijacked.

They do have a Google Authenticator app for your phone. When you log in from a new device it makes you enter a one-time PIN before you get logged in.

Comment Re:Grand opening! (Score 3, Interesting) 97 97

When you submit a CSR (Cert Signing Request), you generate the private key and keep it private; all you submit to the CA is the public key, which they sign. They never see the private key.

If this were really run by the NSA, they could quite easily create their own signed certificate and install it on a SSL decryption proxy, and then they can SSL man-in-the-middle your website to see what your website is doing. Since the "fake" signed certificate is signed by the same CA that the real one is, nobody would know the difference unless you look at the cert's serial number and fingerprint.

Comment Re: People are claiming a victory where there is n (Score 1) 176 176

Depends on the State. If police show up sans warrant and try to force entry to your home without probable cause, you can defend the home with deadly force if necessary.

[citation needed]

You really think that you can use deadly force against the sworn police department and not have any ill-effects? I'm betting that the police are better trained in firearm usage than you are and you will likely end up dead if you start a shootout.

Comment Re:Same answer every time. (Score 2) 178 178

The person who asked the question doesn't understand how computing works.

... and the person that thinks there is only one answer probably doesn't understand how encryption works. You can put data in "the cloud" and still keep it private.

Exactly. I use Dropbox to sync data between PCs, and I use a TrueCrypt vault (maybe should be changed since TC went away) that I can open from any of the PCs.

Comment Re:Hey Apple, here's some free consulting (Score 1) 155 155

Ahem... House of Cards (US), Orange is the New Black, Marco Polo... won't find those in the "bargain bin".

Those are all Netflix original programs, so they do not need to pay anyone else for the right to broadcast them. If they were to try and get new episodes of cable TV shows, then they would have to pay the same way that Hulu and Comcast do.

Comment Re:Only for the first year (Score 4, Informative) 570 570

RTFB:

We announced that a free upgrade for Windows 10 will be made available to customers running Windows 7, Windows 8.1, and Windows Phone 8.1 who upgrade in the first year after launch.*

*Hardware and software requirements apply. No additional charge. Feature availability may vary by device. Some editions excluded. More details at http://www.windows.com./

Comment Re: How can you search data (Score 1) 90 90

A store offering a subscription arrangement needs to search for upcoming expiration dates so that it can 1. notify each subscriber that the card on file with the store is about to expire and 2. charge the ETF on the last valid day if the subscriber fails to update the card by the expiration date.

Why do the expiration dates need to be encrypted? A thief can't do anything with just the expiration date without also knowing the CC number

Comment Re:Exploited sites? (Score 2) 119 119

This is true. Their website is https://sitereview.bluecoat.co....

Sometimes automated systems make mistakes, and when they do, they are corrected. Get over it and stop whining.

And by the way, all of the sites mentioned have been fixed.

The New Braunfels Republican Women (www.nbrw.com) > Political/Social Advocacy
Weston Community Children's Association (www.wccakids.org) > Charitable Organizations
Rotary Club of Midland, Ontario (www.clubrunner.ca) > Charitable Organizations

Comment Re:how would it work in the real world? (Score 1) 308 308

How do you run Windows programs?

The majority of the work that most employees do likely revolves around email or documents/spreadsheets/presentations, all of which have native OSX software.

For the few jobs that require software that only runs on Windows, there is always virtualization, or remote desktop into an MS terminal server.

Comment Re:LOL wut? (Score 2, Insightful) 188 188

"But it also raises the question of whether targeting anonymity services to hunt out fraudsters could have chilling effects for harmless Tor users trying to protect their privacy online"

Umm.. the user is ordering something using their name, credit card, and address. They are not going to use Tor to protect their anonymity.

That statement was not about normal people using TOR for online purchases. It was about people using TOR to hide their identity when doing things like posting to a controversial website, or whistleblowing. If this software catches on, and websites start using it to block TOR users, then it would make TOR less useful for posting anonymously.

Comment Re:Sigh (Score 1) 324 324

But I didn't give them permission to log anything for such purposes.

I fully expect my government to not violate people's privacy and conduct surveillance on them to stop the evil bogeymen.

Then don't use the USPS. There are plenty of other mail transport services out there, that may or may not do this same tracking, and may or may not provide said tracking to the government upon request.

Comment Re:How about no (Score 4, Informative) 203 203

FTFA:

Security. Properly configured, a router with public-access Wi-Fi should not represent a security risk for those on the router's private and secure network. The technical reasons for this are a bit complicated; read an Open Wireless Movement explanation at openwireless.org.

Service degradation. Those using the slower public portion of a home router typically won't degrade performance on the faster private side. Future routers would speed up public access when the private side isn't being used and give the private network priority if required.

Legal liability. Those who fear being blamed for misuse of their public Wi-Fi signals are said to be protected under a "safe harbor" doctrine akin to that protecting Internet service providers. In other words, they're likely not liable for the mischief of porn purveyors or music pirates.

Freeloading. Fear of freeloaders is misplaced, the Open Wireless Movement believes. "Sharing capacity helps everyone," it says. "If you've ever been without Internet access and needed to check an email, you will remember how useful open networks can be in a pinch."

Comment Re:Insurance Policy? (Score 4, Interesting) 293 293

Sure, the game companies may not want this released, but does the FBI care? If they investigate, and find and arrest the hacker, it's up to the D.A. whether or not to prosecute, not the game companies. This seems like a worthless insurance policy/blackmail, because the people going after him are unaffected by the action of him releasing the encryption key.

There are running jobs. Why don't you go chase them?

Working...