Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment The article is weak (Score 5, Insightful) 309

It first tried to rebuke the claims of Kodak being not able to innovate, etc, and then discussed "how people today use photos" in the examples of Flickr, Facebook, and such. It concluded with the weak argument of essentially one sentence, that "[It] is hard to see a role for Kodak in all of this." The problem with this reasoning is that exactly the same thing can be said about many of Kodak's competitors. I'm not aware whether Nikon or Canon is doing significantly better in this regard, which is to ease the "sharing and distribution" of photos through the Internet and social networking.

Comment Re:I've already got that... (Score 1) 441

Apart from others, one way to harden the GP's backup is to sign a hash of it using his[1] own GPG key. Not that it counters all attacks but it makes the recovery process safer. If a malware somehow injects itself into the backup image after the image has been generated, the hash changes, but the signed hash cannot be easily spoofed.

[1] Since he's "Livius" not "Livia" I'd think he is a "he" not a "she" :-)

Comment Re:Marketing (Score 1) 173

This is far from purely marketing. The quality of the search results is what make Google alive and a winner in the first place. Google has little other choice but doing so, even if it means a short-term dip for Chrome in their own search results.

And a little good PR after it doesn't hurt, anyway. I think Google deserves it.

Security

Submission + - Chinese developer web forum stores and leaks 6 mil (thehackernews.com)

gzipped_tar writes: The "Chinese Software Developer Network" (CSDN), operated by Bailian Midami Digital Technology Co., Ltd., is one of the largest networks of software developers in China. A text file with 6 million CSDN user credentials including user names, password, emails, all in clear text, got leaked to the Internet.

The CSDN has issued a letter of apology to its users. In the letter, it is explained that passwords created before April 2009 had been stored in plain text, while later passwords were encrypted. Users created between September 2010 and January 2011 may still suffer from email address leaks.

A summary of the most frequent passwords without the corresponding usernames is available at GitHub. Somewhat surprisingly, the cryptic sounding password "dearbook" ranks 4th with 46053 accounts using it.

Slashdot Top Deals

Why won't sharks eat lawyers? Professional courtesy.

Working...