Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment Re:The Big News not Being Reported (Score 1) 172 172

I don't think you've used Total Commander Ultima Prime, furthermore there's no functionality that Windows Explorer would have and TC wouldn't.
Using TC since ages and frankly Windows Explorer is something I haven't started in months.

Comment Re:How? (Score 1) 371 371

1. Visit shady torrent site.
2. Search for whatever porn you fancy.
3. Click the wrong "Download" button.
4. Install "Updated Flash".

This is just one of the gazillion attack vectors.
There's the .exe wrapped porn file which actually lets you jerk off while the malware silenty does its job in the background. The archived video which is actually an archive, but the unpacker does more than just unpack...
And so on and so forth.

Comment Re:How? (Score 2) 371 371

Looks like a simple question but I've been pondering it.
We have very mature 14 year olds, I met a girl about 10 years ago and I swear to God she looked like she way 20 and talked like she was 20. She was 14. No, I didn't bang her if that's what you're wondering (I was engaged at the time and I'm the kind of dude who doesn't cheat).
Since then I saw many girls and boys whose age couldn't have been guessed. "Overgrown" comes to mind, there's no way you could tell they're less than 18. Now, there's people over 18 who look like they're 15, also there's people who act like they're 12 even if they're 30 and so on and so forth. The problem is that theer's no universally applicable algorithm which would say "this person is an adult, that one isn't" unless you throw in an arbitrary, universal threshold. In our society, it's age. Not perfect but probably the best of the many imperfect possible solutions.
The alternative would force a case-by-case verification using complex methods (psychological age, physical age, intelligence testing maybe, behavioral testing, etc) which simply is too tedious and complicated.

So until we figure out a better way to separate adults from non-adults... age is the threshold. Again, not perfect but there's no better solution at the moment.

Comment Re:How? (Score 1) 371 371

You'd be surprised.
I'm cleaning up malware like there's no tomorrow from people's computers - and most of it is injected through this path:
- torrent website - click on pop-ups with porn - get malware.
I guess it depends on country, though. Where I live, torrents are a BIG thing. People watch movies, play music, jerk off on porn - all coming through torrent sites.
There are private trackers which are malware-free, and those with not enough brain to get an account there will go to the malware-laden public ones. They usually search for "porn torrent" and click on the first link they see.

Comment Re:Scripts that interact with passwords fields aws (Score 1) 365 365

I'm not talking about unsafe machines, just other machines which you occasionally are an user on (e.g. meeting room presentation machine or something). Yeah, I know, those are considered unsafe but we have security solutions enabled on all our machines and they do a decent job.

Comment Re:Scripts that interact with passwords fields aws (Score 2) 365 365

Until you go to a random PC which you don't own and try logging in to that whatever website...
What I did (but is difficult to do in general) is learn an algorithm which allows my own brain to generate a password based on the website I'm logging in to.
Give me a website name and I can create an unique password for it, all in my head. And whenever I revisit the website I can re-generate the password for reuse.
The algorithm has evolved during last few years and sometimes I have to enter 2-3 passwords if I rarely visit a certain website, but overall it works great.

Thinking a password is easy - but only after you spent some time and brain cells learning the algorithm.

"What I've done, of course, is total garbage." -- R. Willard, Pure Math 430a