Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment They called it "agile", but was it? (Score 1) 194

From the full report:

The four reviews shown in figure 5—architecture, project baseline, final detailed design, and operational readiness— are among those required under the exchange life cycle framework, the governance model CMS specifically designed to meet the need to quickly develop the FFM and data hub using the Agile development approach.

Sounds like "waterfall" to me.

Comment Re:it's been done? (Score 1) 107

An attack like that would require installation of a keylogger. I don't recall any evidence that such a system can be installed remotely (though I don't discount the possibility). I suspect, however, that an attacker sufficiently motivated to install a keylogger would not be deterred by the necessity of installing it on another device.

Comment Re:it's been done? (Score 1) 107

A brute-force attack on a password safe that's been encrypted using AES 256 with a 256-bit key is not feasible. I don't understand your point about divulging a password. Why would one do that? Also, the access code to a hardware device would seem to have the same vulnerability. Why would it matter if the key is entered into a program running on a laptop rather than into a program running on some other device?

Slashdot Top Deals

Save yourself! Reboot in 5 seconds!

Working...