Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:Wanna earn $200K+? Two words... (Score 5, Insightful) 473

Lol, no, I don't think so. I took a job that pays $20K/yr less because there weren't assholes in the office. Having actually worked somewhere that was devastatingly dehumanizing* I realized the value of happiness.

You know it's time to quit when you're in the dentist office, getting a root canal, not numbed because it's infected so badly the *caine's don't work, and that is preferable to being in the office. Moment of clarity.

Comment Re:Automatic authentication by contact sounds bad (Score 1) 194

My bank has it.
Something I have, something I know.

If I am on a trusted computer I can store the something I have portion and only need to provide the something I know.
If I am at an untrusted computer (or just got a new computer I want to trust) I get a PIN texted to my phone (trusted) that I can enter along with my normal passphrase. the PIN is from a OTP, so is useless after one use or 5 min, whichever comes first.

If I lose my phone I can notify the bank (same as lost card) and both the phone number and stored token are invalidated.

To validate a new phone I take it to the bank.

Comment Re:He's right (Score 1) 368

Actually I think that the first 2 years of high school should focus on things you will need to survive: money management, how financing works and why revolving credit is not a good thing; reading and writing.
The second 2 years should allow either continued academic *or* tradescraft. fo you go the tradescraft route you'll get two years focused on only the stuff you need for a particular field. Plumbing: math and geometry (drain slopes), chemistry (solvents and glues, interaction with metals), and of course hands on.

Comment Re:Security (Score 1) 114

There is a crypto system for that. Schneier explained it in Applied Crypto.

Basically the trick is that of 7 keyholders you need at least 5 (or some other number) that will all enter their key to sign or authenticate data. This can be extended to the signature applied to null (or any other chosen value) being used as the key for an encrypted volume.

It is the system we use at my work to sign software. There are M keyholders with a minimum number of N required to sign the software.

Slashdot Top Deals

"Of course power tools and alcohol don't mix. Everyone knows power tools aren't soluble in alcohol..." -- Crazy Nigel