Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment: Re:Something Suspicious (Score 1) 43

by phantomfive (#48928199) Attached to: Adobe's Latest Zero-Day Exploit Repurposed, Targeting Adult Websites

How come such a relatively simple files - something that essentially plays media content - continues to be such a hot-bed of vulnerabilities. And not just bugs, but zero-day exploits too. Do I need a tinfoil hat? Or is it just a tad suspicious that this one product continues to have so many vulnerabilities found in it. After all this time. After all these previous bugs.

No, it's not suspicious, it's exactly what you would expect from corporate programmers in a system that wasn't designed with security in mind.

When people try to make code secure, it's difficult. When people don't even try, it's impossible.

Comment: Re:"Science"? (Score 1) 198

by phantomfive (#48927293) Attached to: Bjarne Stroustrup Awarded 2015 Dahl-Nygaard Prize

I do not believe there are ANY field studies in Meyer's book that show OOP "being better". You are welcome to prove me wrong.

I don't think so either. Furthermore, they probably wouldn't be accepted generally as OOP, because his definition of OOP is different than most people's (Java and C# still don't have support for contracts).

However, such studies do exist. I particularly like that paper, because the authors made an effort to understand the data, instead of merely giving a P value and hoping it would get published. For example, when the data allowed several alternative explanations, they interviewed the developers and managers of the projects to understand which interpretation was most realistic.

THAT is object oriented computer science.

Comment: Re: There are still contingency plans (Score 1) 298

Examples of flammables including soaked flaming blankets used to stop and then incapacitate tanks are all over history of war, from Spanish War (writings of Tom Wintringham) to Finnish Winter War and World War II etc.

Tom Wintringham wrote of technique of using rifle or shotgun fire to make tank crew close all the hatches, then men could rush it out of reach of its guns to either jam stout iron rod in tracks or to apply the flammables such as molotovs or soaked blankets. That's when fuel soaked tire slices (not his technique) could be jammed into tracks, then more tires throw on later when the conflagration gets going.

In WW II, your Marine predecessors used device to kill tanks that was diesel fuel with a self-igniting system, tube of nitric acid with sodium, many of those applied did all kinds of neat things like making internal fuel and ammo cook off

Comment: Re:Open source code is open for everyone (Score 1) 201

by phantomfive (#48926205) Attached to: Serious Network Function Vulnerability Found In Glibc

Managed languages eliminate C/C++'s largest (and most critical) attack surface.

Do they? Do you have data to back this up, or are you just guessing? Because from where I'm sitting, it looks a lot like the hardest security problems are the features you expose to users.

Something we can probably both agrees on is that there's no substitute for knowing how things work.

True, we do agree on this point. Although you contradict yourself at the end of the paragraph and try to come up with a reasonable substitute. When someone says "however" immediately after they say they agree with you........that's a strong sign they don't agree with you.

The Wright Bothers weren't the first to fly. They were just the first not to crash.

Working...