Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Headline is misleading (Score 1) 351

8) Now enter the command:
"C:\Program Files\Internet Explorer\iexplore.exe" "http://info.prevx.com/download.asp?GRAB=BLACKSCREENFIX"

...which starts the download of an executable file. Now, I have no idea who that guy (owner of prevx.com) is, and maybe he has nothing but good intentions, but I have this personal rule never to execute files downloaded from some random blog reassuring me they are going to "fix" my computer.

Comment Re:First post (Score 1) 783

Likening Bush to a monkey is not insulting him because he is white, and so is not racist.

Well that is a preposterous statement. I'm of the opinion that comparing any human being to a monkey is an insult to that person's mental capabilities. Whether or not it is also racist is a separate dimension of the insult, but fundamentally calling anyone a monkey is an insult. I might be wrong, but I think that those who called Bush a monkey were not using that word to make a factual statement about his biological makeup...

But then again, I come from South America, so I was never taught that "monkey" is a particularly racist insult (our monkeys are not all black, e.g. http://en.wikipedia.org/wiki/Golden_Lion_Tamarin).

Btw, Google fail in Switzerland: http://images.google.ch/images?q=Michelle%20Obama - first result.

Comment Re:And now thanks to /. and microsoft (Score 1) 275

It doesn't matter if you've got the best encryption on the planet, if I can gain physical access, YOU'RE FUCKED.

Shows how little you know. If I have the best encryption algorithm on the planet, and my data is encrypted, I can give you all of it (data and encryption algorithm). No amount of physical access to that encrypted data will get you closer to the plain text than knowing the key used for encryption. That is the whole point of encryption. The best you can do is crypto-analysis of the algorithms based on their mathematical formulas, and not on any particular set of data. I suggest you read more about attack models before spouting that kind of non-sense.

Heck, the whole idea of SSL/TLS is that you can have a secure, authenticated, private conversation over a completely unsecure, unauthenticated, compromised channel. Yes, you read it right: using SSL I can give you complete, 100% control of the communication channel. This will not give you any insight about the content of the conversation. The best you can do is deny service - which is, in fact, a physical security issue.

Another evidence of your ignorance about security: make a computer system completely secure from a physical point of view, so that no one can get physical access to it. If that system does not have also a strong layer of software security, your physical security is worth nothing. The botnets with millions of zombies PCs are an example of that. Or do you really think that whoever controls those botnets went from home to home to install the botnet software? I'm pretty sure that most of those PCs were safely locked in their owners' homes.

That is to say that I do acknowledge the need for physical security, but again, the whole thread was not about physical security, it was about software security. Which leads me back to my previous answer (which you quite conveniently ignored) that your rant is at best offtopic, if not just trolling. The unrestrained use of caps confirms that suspicion.

So there you go. My point was that indiechild was wrong to claim that security by obscurity was the same as hiding your personal info, since the definition of the term is about algorithms and not data. Then you came along and tried to shoehorn physical security in the conversation, for reasons unknown. I tried to tell you that in the scope of this conversation, physical security is irrelevant. And now you go even further out of topic, on some rant about how encryption cannot withstand scrutiny from physical access. In this post I showed that software security can resist some types of physical access attacks and that physical security is nothing without software security.

Ugh, just by reading your post again makes me cringe. What are "physical security protocols" anyways? I have heard about physical security policies, physical security mechanisms, but protocols? Is this when one spy says: "The polar bear collects spare change" and the other one answers "The cheese stands alone"? Seriously, for someone who is trying to criticize someone else's knowledge about a specific field, you should pay more attention to the terminology of the field.

By the way, those were rhetorical questions. I really do not need to read more half-baked, I-learned-it-from-teh-interwebs, non-sense about security.

Have a nice day.

Comment Re:And now thanks to /. and microsoft (Score 1) 275

One of these days someone might come around to explain to you the idea of conversation context. This whole thread is about software security. The OP mentioned security by obscurity, which is a concept usually used in the context of software security. Why would you bring a completely unrelated context to the thread?

Heck, if we wanted to be picky about it, we could say that your post is almost offtopic...

Comment Re:And now thanks to /. and microsoft (Score 5, Informative) 275

Security through obscurity is not about relying on secrecy of data, but about relying on secrecy of the algorithm or implementation. Those two things are different.

If you do not make the distinction between data/information secrecy and design/algorithm/protocol/implementation secrecy, then you do not understand what security is.

Comment Re:Come on. (Score 1) 622

> Burning of scientists at the stake? Uhmmm... I'm trying to think of an example. Do you have one? I really can't think of one.

One. Google. Query. Away: http://www.google.ch/search?q=Burning%20of%20scientists%20at%20the%20stake
First result: http://en.wikipedia.org/wiki/Giordano_Bruno and now you know.

> Galileo got in trouble as much for being a jerk about it as for what he taught.

Citation needed. What I have found about Galileo is this: "Most historians agree Galileo did not act out of malice and felt blindsided by the reaction to his book." There are *five* references to other scholars confirming this point of view in there.

> nor to the millions of Christians who regard Constantinian Christianity as no Christianity at all.

Ahh, the good old "No True Scotsman" fallacy. Why then do you even bother to defend "them" at all?

> Religion was a post-hoc rationalization...Witch burnings...were quite rare if not unheard of prior to that time...Anti-semitism was not a Christian invention...

Which all leads to the OP's point that Christianity was either a motivator, catalyst or used as a justification for those acts. You are really making his point for him here.

> the Christian church has been a progressive force for women when you compare it to the times, not a repressive one

By having as one of the central tenants that a woman is only perfect as long she is immaculate? While having no such restriction on men? By condoning rape as long as you compensate her father for the financial loss? (Deuteronomy 22:28-29)

> it reads more like a tired list of he-said-she-said from someone who got everything he knows about religion and history from infidels.org ... So kindly exercise some discretion and actually learn something before you start flapping your gums and slandering things you know nothing about.

Since after investigating your claims for about 15 minutes, I managed to find 5 issues with, I'm gonna go and say perhaps you should take some of this advice yourself.

Comment Re:The reasons for SSL (Score 1) 432

Four words for you: man in the middle.

There is no such thing as "nobody else can read the transmission" if you don't have authentication.

How can you tell apart the proper destination and everybody else if you did not authenticate them? The very reason self-signed certificates are deemed dangerous by Firefox and others is that anyone can impersonate anyone else. In the end, you would certainly have an encrypted link to your destination, it is just that the destination could very likely not be who you think it is... and if the information is not important enough for you to bother about not letting it leak to a man in the middle, then why bother with encryption at all?

Comment Re:Someone with electrical knowledge explain this (Score 1) 183

I was always curious about long term effects. Non-ionizing radiation is proven to cause various illnesses. For example, some schools were built on cheap property in close proximity to large power transmission lines. That caused an unusually high rate of leukemia in the students. Prolonged exposure (living or going to school) at 200 meters raised the chance of getting leukemia by 70%. 200 meters to 500 meters raised it by 20%. Obviously, no research was done with Tesla's unfinished work. And for those asking for citations, search Google for "power lines leukemia" .

I did. Fourth result: http://www.quackwatch.org/01QuackeryRelatedTopics/emf.html From the link:

3. The initial study was flawed. Wertheimer and Leeper did not actually measure magnetic fields from power lines. Instead, they classified the homes according to their wiring code. The wiring code was then used as a surrogate for the powerline magnetic field, which was unmeasured and unknown. This is a flaw in the study. Later studies actually measured the magnetic fields from power lines and found no consistent relationship between measured magnetic field and incidence of cancer [13]. It is important to realize that there are important possible confounding factors in such epidemiologic studies. For example, one possible confounding factor is an income effect. Living right under electric power lines is not a desired residence, and often is a low-income housing location. People living near power lines tend to be poorer than the control group, and there is a strong and well-known epidemiological relationship between poverty and cancer. Gurney and others showed that the homes with the presumably higher-current wiring code tended to be lower income [14]. Thus the original Wertheimer-Leeper study was biased. In addition, it was based on a relatively few cases, and the statistics were consequently rather poor.

In summary: non-ionizing radiation has not been proven to cause various illnesses.

Comment Re:Goes to far (Score 1) 370

Amazon/Kindle should stick to their guns and let the end user decide to turn on the TTS engine or not.

Then the authors who complained to the Guild would stick to their guns and withdraw some works from Kindle entirely. Would you want such an outcome?

Actually, yes. Let them face the "real" lost revenue, instead of "imaginary" lost revenue (from TTS) to bash some sense in their skulls.

Comment Re:Bandwidth & processing, quantum effects? (Score 2, Insightful) 158

Reality, by definition, is "dirty". We have dust, we have imperfections in every surface, no matter how carefully machined. Houses are never truly square, roads are never perfectly level, and points in a corner are always rounded. Always.

Computers, by definition, are "clean". Squares are always truly square, roads are as perfectly level as they were designed to be, and corners are always razor sharp, no matter how much you "zoom in".

The problem with modern graphics systems is they are computed to extreme levels of precision. If they incorporated a sort of fundamental randomness, if they were intrinsically uncertain, they just might be able to really approximate reality, which is messy, ugly, and imperfect.

You seem to be confusing texture irregularity with material consistency. A house wall is not perfectly "razor sharp", but no matter how many times you look at it, they do not suffer from "randomness" or are in any way "uncertain". At least not if you are not looking at a sub-atomic level. Also, the bandwidth would not be that high, if you take into account that human eyes have very little resolution, and thus an extreme amount of detail at a distance would be pretty much irrelevant.

Comment Re:government might want to step back (Score 1) 487

When I was in Rome, a fellow I met told me that, in Italy in general but Rome in particular, you should NEVER look while crossing the street. If the drivers see you looking, they'll know you've seen them and they won't stop. He said you should just step out into traffic without the slightest hint that you might have noticed them. Only then will they stop.
... which goes completely against my experience. I was in Rome the second week of last december, and the best way of making a driver stop was to make direct eye contact until they saw you, sustain it, and cross the street. And keep a serious face.

My guess is that then they understand that not only you are aware of them, but that if you survive, you will possibly be able to identify them.

It goes without saying that I would only do that on pedestrian crossings.

Slashdot Top Deals

In any formula, constants (especially those obtained from handbooks) are to be treated as variables.

Working...