Comment Toby (Score 1) 47
Toby is the way to go.. tabs and bookmarks: https://www.gettoby.com/
Toby is the way to go.. tabs and bookmarks: https://www.gettoby.com/
I have noticed that everyone that has expressed deep concern to me about drone spying seems to have little to not a care in the world about digital mass surveillance. Based on this correlation, I wonder if, amusingly, this list may be a great way to identify easy targets for digital identity theft.
Seriously though, when I think of the resulting abuses from the do-not-call registry idea, where for a nominal fee, marketers could get a full list of these active, valued phone numbers, I can't help thinking of the abuses. What does this group of people have in common, and can that be leveraged with political messaging in support of a particular state or federal party?
I'm not going to speculate on how many people will refer to the registry while logging their drone's flight plan with the FAA.
Not to be a nitpicker, but that site looks like a cheesy rip-off of Apple... Why do companies insist on doing this? Be original. Personally, I like the Asus laptops with a Costco return policy. 2 years only, but no hassle.
Look at this picture, particularly the bezel right below the screen, reflecting the keyboard... what is with all that warping????
http://www.system76.com/product_images/serval-8f6a631ac4a249b.png
Addendum (also, this problem is not just bad because of the password hash exposure):
You could argue that brute forcing passwords is not the most common approach. For example, harvesting a million accounts and walking away with the passwords that can be cracked through an efficient "smart dictionary" attack, and abandoning the other ones, is probably bar far the most common harvesting strategy.
It's sort of like putting a club on your car.. It's not that they can't steal your car... but there's an easy to steal one next to yours.
So having a hash+salt with SHA-512, and a secure password? If you have a cryptographically strong password, this is a low severity aspect of the problem. The other issue is being able to use the same dscl subsystem to *change* passwords, under certain circumstances, without using credentials. If you can change the logged-in user's password, su to them, sudo
Its hard to explain how important Slashdot was to all of us 10 years ago. Indeed, without it it would be hard to imagine HN, Reddit, Digg, Fark or any of a thousand lesser sites. The editorial perspective of Rob and the other editors of
Throughout, while some have left for those greener shores, slashdot abided even while buffeted by the markets and the de/evolving internet news world, and it has remained a default tab in my and many others' browsers.
I didn't mean this post to be about Slashdot though, but about my friend Rob. I'll only say that while the site will be the lessor for you leaving, I firmly believe that computer science will gain my. While this note reads like an epitaph or the last pages of a book, it is really no more than a thank you note from me and many I know to your for your decade+ of work on the site. So...
Thanks.
1e100.net is a Google-owned domain name used to identify the servers in our network. Following standard industry practice, we make sure each IP address has a corresponding hostname. Starting in October 2009, we started using a single domain name to identify our servers across all Google products, rather than use different product domains such as youtube.com, blogger.com, and google.com. We did this for two reasons: first, to keep things simpler, and second, to proactively improve security by protecting against potential threats such as cross-site scripting attacks. Most typical Internet users will never see 1e100.net, but we picked we picked a Googley name for it just in case (1e100 is scientific notation for 1 googol).
So there you go!
Windows 2000 did this flawlessly in 1999. My powerbook did it flawlessly in 2002.
My Ubuntu 9.10 and Gnome XFCE desktops still cannot do this properly today.
X is needed for many things in enterprise... SPECTRUM, polling, whatever. Great. Run X when you need it, use something that isn't a terrible piece of junk the rest of the time.
It's time to bin X.
-db
"You need tender loving care once a week - so that I can slap you into shape." - Ellyn Mustard