Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:A lot of apps use SSL (Score 1) 141

With android a common problem is which CAs are recognised, which versions of their root certs and which operators have decided to fuck up the cert chain due to political reasons.

Also - whether webview in applications support the same cert chains that browsers do or subset at mercy of 3 year old out of date build.

So yeah, as far as I'm concerned the SSL on android is generally useless. Due to SSL being unusable in real world more so than due to 'lazy devs'.

Comment Re:That's a bit beyond a 'performance machine' (Score 1) 303

Apart from the PSU requirement* (really, WTF? The rest describes a 500W system at peak load max) it's not a high end system - a mainstream system within 18 months max.

* Then again, cheap 1000W PSU's are only reliably capable of 500W or so anyway. Which actually translates to approx. 150W for the system + 200-250W to the GPU at the peak load + margin.

Comment Yes, Hans Reiser was convicted (Score 0) 317

As far as anybody should care this does not matter much - it says fairly little with regards to whether he actually did or did not kill his wife and unless there's a body and physical evidence (and as far as I know there is only circumstantial - his wife has been in his car, yeah, surprise), this will remain a not quite shut and sealed matter.

If the filesystem is any good the issue above is moot regardless. Just stop with the cheap puns. Guilty or not, being convicted is a very shady metric to determine it reliably.

Comment Re:Easy to defend against (Score 1) 229

Someone who runs Windows. In an environment where upgrading to SP1 is unlikely (runs on at least Windows 7 vanilla, exits on SP1 - can also be explained by assuming more sophisticated detection on SP1 boxes), yet both x86 and x64 versions are in use (two versions of binaries - so perhaps previous versions with variants?), someone who is running a particular software package the name of which is known and which follows the normal windows software installation procedures (key hash generation and the fact it's looked up from under the program files - can be a distraction though!).

I actually think that the program files path is a distraction. The actual key is a hash of a particular known file in a system, the non-ascii entry in the program files is ether a null result to be matched against or an extra test.

Slashdot Top Deals

All seems condemned in the long run to approximate a state akin to Gaussian noise. -- James Martin

Working...