Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Experience (Score 1) 480

Funny you should be in this situation as I starting working from home 2 years ago and I've been ok. I travel to our main office 270 miles away every 4-6 weeks but travel expenses are paid for. I have a room with an office setup in my house and do try and keep the door closed. I do miss the office atmosphere but in all, I have no problems and work like I would from the office, (OK sometimes I get distracted!).

Comment Third party websites (Score 1) 69

The reason Hotmail, Gmail, Yahoo and Facebook accounts get hacked is because of the shitty third party websites like those little small "gameing" sites, they get hacked and guess what? Oh! the user has used the SAME password for for their main email accounts. If people used just 2 passwords, this would stop their primary email accounts getting compromised. 1 main password for main account, and another for the shitty freebee websites which will probably get hacked. Simple!

Comment Normal passwords are becoming useless (Score 0) 615

http://hashcat.net/oclhashcat/ runs numerous tools for this and with some users GPU rigs going totally insane: 4 x ATI Radeon 6990 throwing MD5 hashes out @ 45.7 Billion/sec, that's mixalpha-numeric password of length 8 in 1 hr 20 mins and then we can start on the dictionaries / hybrib-dictionaries / case-mutations / etc. The way passwords are used / stored is becoming broken by design.

Submission + - Num of emails sent by code you've written to date. 1

DNX Blandy writes: I have written code to send emails alerts etc to registered users on our databases, and working out numbers, I'm easily in the 10,000,000+ range due to the size of the databases involved, but it's not SPAM, all emails were registered properly by the owners. Anyway, poll idea is below:

Number of emails sent be code you've written to date...

None
1 — 1,000
1,000 — 100,000
100,000 — 1,000,000
1,000,000 — 10,000,000
10,000,000 +
I'm a SPAMMER!
Space

Uranus and Neptune May Have "Oceans of Diamonds" 347

Third Position writes "Oceans of liquid diamond topped with solid 'icebergs' of the precious gems could be on Uranus and Neptune. The first-ever detailed research into the melting point of diamond found it behaves like water during melting and freezing — with its solid form floating on the liquid. A large diamond ocean on one or both of the planets could provide an explanation for an oddity they both share: unlike Earth, they do not have magnetic poles that match up with their geographical poles." The article doesn't mention what the pressures might be like in these outer-planets environments, but the researchers found that liquefying diamond requires 40 million times Earth's atmospheric pressure at sea level.

Comment They help, but only slightly! (Score 2, Interesting) 263

I also use SPF records for all my domains, most are simply: "v=spf1 a mx -all". "-all" as in hard fail. I don't know why there is a soft fail "~all" option, if it's not from a known host / IP, it should fail. What's the point in returning an unknown response? Like as if there was no SPF record in the first place? It's amazing how many domains actually use soft fail. Anyone know why? They only help stop backscatter and other IPs from sending emails from @youdomain.com as long as the other mail server does a SPF lookup. We have become dependant on the email protocol and the way it works, pitty it's in such a mess :( Damn you SPAMBOTS!!!

Comment Re:Lame coders who don't care about security! (Score 1) 186

Totally agree, it's a pitty out of the 132,000 hacked sites that are written in Classic ASP that the coders havent done this :) It totally depends on the methods used in the code and, unfortuntly, there is A LOT of bad ass coding about :( Example: http://www.w3schools.com/ADO/ado_update.asp Checkout the second window, "UPDATE customers SET...", oh dear!! BAD coding and w3schools is well recognized! I bet a lot of coders have fallin into this HUGE hole.

Comment Re:Lame coders who don't care about security! (Score 1) 186

Exactly!! It's depends on the methods used. You'll be amazed how many people just shove the code in and don't check. I've seen lots of code from companies that would execute the above like: Dim sSQL, sLastName, cmd sLastName = Request.Form("txtLastName") sSQL = "SELECT * FROM Customer WHERE LastName = " + sLastName + ";" Set cmd = Server.CreateObject("ADODB.Command") cmd.ActiveConnection = cn Set rs = cmd.Execute(sSQL) cmd.Close Set cmd = Nothing --------- Lets say sLastName = '; DELETE FROM [Customer] Oops!! There goes the [Customer] table. To find the table name in the first place you can inject sql queries like this as much as you like.

Slashdot Top Deals

"Look! There! Evil!.. pure and simple, total evil from the Eighth Dimension!" -- Buckaroo Banzai

Working...