Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment What a load ... (Score 1) 100

The examples given mostly have nothing to do with the languages having vulnerabilities at all (I only read the Python section as I'm most familiar).
For goodness sake, none of those were privilege escalation or remote access attack vectors. Yes, if you allow the user to specify their environment variables (like PAGER and EDITOR) they'll get executed *as that user* which is known behaviour.

Comment Public keys (Score 1) 209

Public key cryptography has been the solution for a long time, we've just shot ourselves in the feet by not implementing it on the client side.

Client-side certificates for instance, SSH keys, PGP/GPG keys -- they're all examples of public key cryptography that works to secure data and requires the user to only remember one good password instead of many.

Slashdot Top Deals

"Ninety percent of baseball is half mental." -- Yogi Berra

Working...