Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:Not malicious but not honest? (Score 3, Interesting) 447

Why does the heartbeat request even contain the length of the heartbeat block? We know the length of the SSL record!

The record has two variable length fields, so you need a length field for either the payload or the padding. In this case the payload has the length field and the padding length is implicit.

Comment Re:Is there an open-source alternative? (Score 2) 69

The only problem is git needs a bare repository to push and pull from, so you're still tied to a central server.

git can push and pull to normal repos as well (though it won't push to the checked out branch), so it works perfectly fine without a central server. You still need access to the repo you want to pull from which can be annoying for things behind NAT/firewalls etc. BT Sync can do NAT traversal so it could work better I guess. git annex sounds similar to what you want

Blackberry

Submission + - Leaked Memo Says Apple Provides Backdoor to Govern 2

Voline writes: In a tweet early this morning, cybersecurity researcher Christopher Soghoian pointed to an internal memo of India's Military Intelligence that has been liberated by hackers and posted on the Net. The memo suggests that, "in exchange for the Indian market presence" mobile device manufacturers, including RIM, Nokia, and Apple (collectively defined in the document as "RINOA") have agreed to provide backdoor access on their devices.

The Indian government then "utilized backdoors provided by RINOA" to intercept internal emails of the US-China Economic and Security Review Commission, a US government body with a mandate to monitor, investigate and report to Congress on "the national security implications of the bilateral trade and economic relationship" between the US and China. Manan Kakkar, an Indian blogger for ZDNet, has also picked up the story and writes that it may be the fruits of an earlier hack of Symantec.

If Apple is providing governments with a backdoor to iOS, can we assume that they have also done so with Mac OS X?

Slashdot Top Deals

The first Rotarian was the first man to call John the Baptist "Jack." -- H.L. Mencken

Working...