Harvey: Stealth Wear started as an experiment using the fabrics I was researching for the OFF Pocket. I did research on thermal surveillance and was very interested in where it was going and at some point realized that metalised fabrics work as a shield against thermal imagining cameras. I was able to get access to a thermal camera and started testing swatches of fabric. When I realized that it worked well enough, I got in touch with my friend Johanna Bloomfield and she came up with the hoodie design. Everything was pretty much still an experiment at this point. Then we showed the hoodie to Andrew Green from PRIMITIVE. He loved it and decided to include it and make it a major part of this upcoming show. Originally this show was to be based on work from CV Dazzle and a few other counter surveillance art projects. This whole idea of stealth wear line was very emergent.
He then concludes, "If you're a Free software developer, user and/or supporter and buying into these claims, I don't know how else to put it other than this: you're being duped. Consider what supporting those who employ such tactics means for Free software."
Our own Bruce Perens said that on Slashdot — "Working for free to make Mark Shuttleworth richer just isn’t very smart."
Constantly streaming interactive graphics, even if only at 720p, will still require a fast internet connection. Services like OnLive have struggled in the past due to the large amount of bandwidth they require, and many consumers complained of laggy connections and horrendous graphics. There is no word yet regarding the features of the games being streamed, including whether or not they will support online or local multiplayer.
Facebook officials did not identify the specific kind of malware that the attackers installed on the compromised laptops, but said that the employee's machines were infected when they visited a mobile developer Web site that was hosting the Java exploit. When the employees visited the site, the exploit attacked a zero-day vulnerability in Java that was able to bypass the software's sandbox and enable the attackers to install malware. The company said it reported the vulnerability to Oracle, which then patched the Java bug on Feb. 1.
I know slashdot's general sentiment towards marketing. Without being judgmental one way or the other, I must say that for a product to reach the widest possible audience in a given time period, marketing is a necessity. Short of doing everything myself, I see a couple of options: 1. Hire marketing people, or an outside marketing firm; 2. Take in willing partners who are good at marketing (currently there are no shortage of people who want in).
With these options, my major concerns are how to quantify performance, as well as how to avoid getting trapped in a partnership with non-performing partners — I already have a tangible product with a huge amount of time, money, and effort invested. Budget is also limited. Budget is always limited unless you are a fortune 500 business, but for now that's more of a secondary concern. So here is my question to Slashdot: how do you address these concerns, and in a more general sense, how would you handle the situation: technical people with a product in need of marketing?
The paper was published in the Proceedings of the Royal Society. You can also watch modularity evolve in this video."
Hashing algorithms are used to secure passwords by taking the plaintext password, passing it through the cryptographic hash algorithm, and then storing the resulting digest, rather than the plaintext password itself. That way, if attackers are able to compromise the database of passwords, what they get are the hashes and not the actual passwords.
However, the algorithms used to hash passwords in most cases are functions such as SHA-1 and MD5, which have known weaknesses that open them up to brute-force attacks. So if an attacker is able to access a database of hashed passwords, he may be able to crack them, given enough time and compute power. When these algorithms were designed years ago, the hardware needed to crack a hash produced by one of them was not commonly available. But now, powerful GPUs and FPGAs are widely available and can be used by an attacker to crack hashes relatively quickly.
"Password hashing is important because it's where we have a problem. NIST has given us some great standard hashing algorithms. The problem is that these hashes aren't necessarily designed for the specific problem of password hashing — where you need something that's fast enough to hash on a server at login time, but slow enough that a GPU can't crack ten million of them," Green said.