Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment compared to hash database, with antivirus (Score 5, Informative) 790

It seems National Center for Missing and Exploited Children has a database of hashes, or "fingerprints" of known child porn images. When you use Gmail, it checks attachments against a database of viruses and also apparently against this CP database.

A distinction can be made here. What the database does NOT do is any kind of image analysis to see if the picture LOOKS like child porn. It checks only against known, reported child porn, apparently.

Comment Millions $ through Wheeler to Obama campaign (Score 1) 28

> who I guess are better at "lobbying" the FCC, where "lobbying" probably means effectively mailing them giant boxes of cash).

They mailed checks to Wheeler, made out to "Obama campaign". Obama then appointed Wheeler.
Bundlers like Wheeler only have to report the amount as "over $500,000", so we don't know the exact number but it's likely to be a few million dollars.
http://www.opensecrets.org/pre...

Comment On which the most common hash is based (Score 3, Informative) 80

DES is the encryption standard which is the basis of what for many years was the most common type of hash.
For DES-based hashing, as used in .htpasswd files, the least significant bits of the first eight characters are used as a 56-bit key. This key (the users password) is used to encrypt a null bytes, 25 times. crypt(3) accepts a two-character salt, but uses only the lowest six bits of each character, so it's a 12 bit salt and a 56 bit password (maximum).

crypt(3) can also support better hash algorthims by passing salt values such as $1$xxxxxxxx$ or $5$xxxxxxxxxxxx$

Comment partly true. It's harder if they validate their in (Score 2) 45

I agree you're not going to teach someone to be a hacker / cracker unless they have that innate talent and interest. That's true for a lot things. Athletics certainly involves some things that can't be taught. You CAN start with a strong, athletic kid who knows nothing about about football and TEACH him the game, the techniques, and the skills. Same thing with cracking. Starting with a cunning, devious kid who knows little about computers, you can teach them to look for unvalidated input, etc. the same way a con man can learn new cons.

Further, I regularly teach programmers who aren't naturally devious important basics - always validate input carefully, never use eval(), always multiple argument form of system() if it's used at all, don't write your own encryption, etc. What they learn may not be enough to keep me from hacking their systems, but it can certainly make it a whole lot harder.

Have a look through the nine online cyber security courses offered by TEEX I think you'll find they cover some good stuff, especially the more advanced courses. TEEX is part of the Texas A&M system and the courses are approved by DHS, do they demonstrate that a university system CAN provide some good education in this area, with courses approved by the relevant concern government agency.

Before I saw the TEEX courses, I expected them to suck. I was pleasantly surprised.

Comment yep, welcome $large_organization networking (Score 1) 68

> > active directory

> I see now - fully trusted hosts, potential malware ridden with no way to keep it off other than hoping the antivirus
> updates arrive before the malware, and a closed system where you have to guess at the legitimate traffic to boot.

Yep, welcome to office networking. In a government office, throw in a few DOS terminals and other systems that haven't seen a security update since 1982.

Comment ps My office has been investigated != fired (Score 1) 68

I should emphasize strange traffic being investigated doesn't mean anyone gets in trouble. The head of security cut off my network port once when he detected something weird. I explained what I was doing. He pointed out a security concern, and we agreed to a compromise configuration we could both live with.

Comment real storage, active directory servers get legit t (Score 2) 68

Let's consider the last piece of malware I dealt with. It searched the network for shared storage and did nasty things on the storage. The REAL storage server is used by thousands of people, so it gets many, many requests per minute. Sorting out legitimate use of the storage vs something suspicious would be nearly impossible. The honeypot storage, on the other hand, gets NO legitimate traffic. Any traffic to the honeypot is worth investigation. That makes it a much more reliable way to find malware or other traffic sources that merit investigation.

Same with the active directory, the mail server, the database ...
Do you have any idea how much traffic a corporate mail server can get? Looking for suspicious connections is worse than a needle in a haystack. An otherwise unused machine with the mail ports open quickly flags strange behaviour for investigation.

Comment Forgot to read your own link? (Score 1) 224

Did you forget to look at that page before linking to it?
Iron Dome, fully deployed in November 2012, is a system for intercepting medium-range rockets. Count the number of ROCKET fatalities after November 2012. For that matter, look at the number after they STARTED deploying Iron Dome in the first location compared to before they had iron dome.

Iron Dome is not designed to defend against snipers, flu, mortars, or insults. It defends against rockets.

Comment vi CAN run in the browser, or plugin lynx (Score 1) 402

There are assorted plugins to integrate vim and other vi-like editors with web browsers. So I might be using vim keystrokes to write this. Alternatively, a vim plugin can also call lynx. I'm not sure why you'd want to do the latter. The former might be handy if just avoid accidentally ending your posts like this. :wq

Comment Local very important. More working-age voters. (Score 2) 190

I'd agree with others who have said local elections are very important. My local fire, police, schools, roads, and job opportunities are more important to me than whatever Washington did today.

I think you've missed the largest difference that online voting might make. Retired people are over-represented in local elections because they take the time to vote, more often than working-age people do. Online voting might make that more balanced or even swing the other way. Retirement age people also have the majority of the money and therefore influence through political donations.

Along the same lines, traditional voting methods mean only people who care enough to take the time to vote do so. (Unless a politician has a pizza party on the voting bus and pays each voter $10 to get on board.) Online voting, if it takes just a few seconds, MIGHT increase the number of votes by people who can't be bothered to take a few minutes to get involved. That could be good or bad. Personally, I think that if you don't know the name of the incumbent, you probably aren't informed enough to make an informed vote and I'd prefer you choose not to vote that time around. I'd hope that everyone gets informed, but if someone isn't interested enough to know what's on the ballot ahead of time, I don't see a need to encourage them to vote anyway.

Comment True. But "how dare you do that to me!" (Score 1) 266

That's true. On the other hand, normal people are merely annoyed by this. We're also annoyed by the TSA; Senators are accustomed to walking right through. Security is there to protect them, the VIP. The ranking Senator from wherever is likely to be the type of personality that can't believe it someone did it to THEM. "How dare you! Don't you know who I am!" I wouldn't be surprised if a senator or two did something stupid when so greatly offended.

Comment Re:This might be the one thing that gets Congress (Score 1) 266

> This is also why the only way we get any changes in gun legislation is if someone shoots one of their kids.
That, and the fact that the numbers show EVERY instance of reactive gun legislation since 1940 has always been counter-productive. It works much better for the politicians to retain it as a campaign issue rather than ending up line the UK, with TWICE as much violent crime after they actually banned guns.

Slashdot Top Deals

"It's the best thing since professional golfers on 'ludes." -- Rick Obidiah

Working...