Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re: Good way to remove the trolls from the platfor (Score 1) 46

It's a shame then, after years of working in SQL, that you hurt the query processor optimisation like that. Having a sub query, instead of a join, the query propcessor is forced to evaluate your subquery and spool that (probably) to a temp table, then join to the outer query table, increasing I/O overall. If it was an inner join, then the query processor optimisation could leverage index joins and get things done faster. Also, just a joke, but even funny SQL responses propegate poor practices. See what (more) years of SQL has done.

Comment Re: Ill prepared Aussies? (Score 0) 227

As an Aussie, I havn't written a single cheque in at least 20 years. The only hold out market I know of is deposits at the hammer for real estate actions. Besides that, yeah... the US backing system is as antiquated as suggested above. Australian banking (as frustrating as it can be at times) is way way ahead of the US system. Same goes for our ca$h, way ahead on security features. An no, power hungry eCoins are not the solution, particularly BitCoin, although Etherium dies have utility and Ripple will probably be the preferred method of transfer in the future die to low cost of transactions.

Comment Re: So... (Score 0) 37

I think a keypair per site would be the norm since using the same keypair doesn't prevent site1 from encrypting data using your public key from impersonation by site 2 that is then decrypted by your password manager. Public/private encryption/decryption is indirection but the directions work both ways depending on which key you use for encrypting and then decrypting.

Comment Meh, been there, done that...twice. (Score 1) 60

I've done that twice. First time, we lost 4 files (from 100M), second time, 0. It took about 6 hours to get back up and running reach time and about 100Gb was encrypted each time. We didn't even need to resort to backups. You can architecture your infrastructure to be cryptolocker-resilient. It's not that hard but you need to do things the right way.

Comment Re: Why would anyone use a cloud based manager? (Score 0) 25

KeePass already uses PBKDF2 based key derivation function. Even without a keyfile, it's plenty safe, even from bruit force attacks so long ad you password is sufficiently long (e.g. 10 characters). I share mine via One drive across my devices. Hit save, a few moments later, it's on my PC, etc. (Similar behaviour for Dropbox)

Slashdot Top Deals

Two wrights don't make a rong, they make an airplane. Or bicycles.

Working...