Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:My humble list (Score 1) 264

It's not ironic at all. At 35 feet viewing distance, a 120" 1080p HD image is indistinguishable from a 120" 480p standard def image. It all has to do with the distance at which the eye loses the ability to sort out an individual pixel. Since you're normally viewing your phone from less than 12 inches, and your 40" TV at 10 feet, even if they have the same number of pixels, the TV probably has better visible pixel density.

Comment Re:Am I reading this correctly? (Score 3, Informative) 417

From the Charlie Miller interview mentioned elsewhere in this thread...

Another question from the Twittersphere: What OS/browser pairing to you use? Do you do anything special (beyond default settings) to secure yourself while browsing?

You're not trying to pwn me are you??? Have you ever heard the saying about the cobbler's kids not having shoes? That's me, I'm afraid. I use Safari on OSX with no special settings. This isn't the most secure combination, by any stretch of the imagination, but I like it. It's designed by Apple engineers to be easy to use and 'just work' and it does. The risk of malware is low, and hey, I'm a security expert right :) The risk of a targeted attack is real, except I don't think I'm important enough to be targeted! So I rely on security by obscurity, I guess

Comment Re:PassGorithm - One Algorithm, infinite passwords (Score 1) 1007

I use a similar method, but then apply an additional layer of obfuscation by putting my password that I've generated with my algorithm through something like an MD5 hash. If I can't remember the password, I can always recreate it, but the chances of anyone stumbling across it with anything other than brute force are miniscule. You could even write your passwords down and it wouldn't make a difference. All you're giving them is the seed. You can also apply simple encryption to them, such as having a deviation pattern from the password you've written down (i.e. first character is to the left of the one I've written down, second one two characters up on the keyboard, etc. I've also had success just keeping a list well hidden such as making a file called .nothing_interesting_in_here (for example) and hiding it down in /var or /etc somewhere. The chances of some miscellaneous laptop thief getting root and going ls-la through all of your config directories is relatively small. You just have to remember where you put the file.


Submission + - Are Video Game Schools What's Wrong? ( 2

J Duffy writes: " just posted an expose by a self-proclaimed "game development school dropout," a woman who enrolled in a game program only to leave within a few weeks, horrified at what students were asked to do in their time there. What's really shocking is that she uses her experience to talk about how women and "grown ups" are gated from entering the video game development industry. Enjoy!"

Slashdot Top Deals

You cannot have a science without measurement. -- R. W. Hamming