Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:Too bad for case-sentive (Score 2, Informative) 244

It's about keyspace.

Given 4 bytes of [a-zA-Z0-9] gives you 14,776,336 possible combinations while [a-z0-9] only gives you a mere 1,679,616 possible combinations.
Assuming they'll eventually up the number of bytes up to six (ie. 4 to 6 bytes), you'll get 57,731,144,752 combinations case sensitive compared to just 2,238,928,128 case insensitive.

Image

Programming .NET 3.5 224

lamaditx writes "The world of the .NET framework is taken to the next level by the release of .NET 3.5. The intended audience of this book are experienced .NET programmers. There are no sections that tell you details about C#, SQL servers or anything like that. I don't recommend this book if you never worked on a .NET project and don't know how to set up a SQL database. You should be aware that the code is written in C#. You might use one of the software code converters if you prefer Visual Basic instead. I think the code is still readable even if you do not know C#. I appreciate the fact that the authors decided to use one language only because it keeps the book smaller. The authors assume you are using Visual Studio 2008. You don't necessarily need to update to 2008 if you are working with an older edition because you can use the free Express Edition to get started." Keep reading for the rest of Adrian's review.
Windows

Microsoft Releases Specs for Binary Formats 205

skolima writes "In response to requests for even easier access to the Binary Formats, Microsoft has agreed to remove any intermediate steps necessary to get the documentation. They're going to just post it, making it directly available as a download on the Microsoft web site. Microsoft will also make the Binary Formats subject to its Open Specification Promise by February 15, 2008. They're even planning to include an Open Source converter implementation."
Security

Microsoft's IIS is Twice as Likely to Host Malware? 163

eldavojohn writes "According to Google, Microsoft's server software is at least twice as likely to host viruses or malware. The reason why? 'Google reports that IIS is likely used to distribute malware more often than Apache because many IIS installs are on pirated Windows versions which aren't configured to automatically download patches. (Even pirated Windows versions can automatically receive security fixes, however.) Our analysis demonstrates how important it is to keep web servers patched to the latest patch level,' Google notes."
Microsoft

Microsoft Votes to Add ODF to ANSI Standards List 231

RzUpAnmsCwrds writes "In a puzzling move, Microsoft today voted to support the addition of the OpenDocument file formats to the American National Standards List. OpenDocument is used by many free-software office suites, including OpenOffice.org. Microsoft is still pushing its own Office Open XML format, which it hopes will also become an ANSI standard. Is Microsoft serious about supporting ODF, or is this a merely a PR stunt to make Office Open XML look more like a legitimate standard?"

Giving the Gift of Ubuntu Linux for Christmas? 235

Father Christmas asks: "This Christmas I have decided to give all of my friends and relatives Ubuntu Linux CDs from the Ubuntu ShipIt service. In addition, I plan to help them backup their old systems, install Ubuntu, and then introduce them to using Linux for their everyday tasks. What sort of post-installation changes should be made to Ubuntu to make it easy for everyday people to use? What extra software packages should be installed? Should I stick with the default Gnome installation, or would KDE be a better choice? Is there anything else that should be done to maximize the utility of their systems, as well as make their first experience with Linux a great one?"

New Windows Attack Can Disable Firewall 273

BobB writes to tell us NetworkWorld is reporting that new code released on Sunday could allow a fully patched Windows XP PC's personal firewall to be disabled via a malicious data packet. The exploit depends on the use of Microsoft's Internet Connection Service. From the article: "The attacker could send a malicious data packet to another PC using ICS that would cause the service to terminate. Because this service is connected to the Windows firewall, this packet would also cause the firewall to stop working, said Tyler Reguly, a research engineer at nCircle Network Security Inc."

Slashdot Top Deals

"my terminal is a lethal teaspoon." -- Patricia O Tuama

Working...