Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Communications

Twitter Sued By British Soccer Player 264

norriefc writes "Here in the UK super injunctions are all the rage. These are injunctions that bar the press from even mentioning that the injunctions exist. Recently a Twitter account exposed several of these super injunctions and named several people involved and what their alleged indiscretions were. Now one 'famous' soccer player is trying to sue Twitter and the yet to be named tweeters for invasion of privacy, apparently in ignorance of the Streisand effect. I'm doubtful of an American company paying much attention to UK anti-free-speech laws"
Classic Games (Games)

Super Mario Bros. 3 Level Design Lessons 95

An anonymous reader writes with this excerpt from Significant Bits about how the early level design in Super Mario Bros. 3 gradually introduced players to the game without needing something as blatant and obtrusive as a tutorial: "Super Mario Bros. 3 contains many obvious design lessons that are also present in other games, e.g., the gradual layering of complexity that allows players to master a specific mechanic. What surprised me during my playthrough, though, was how some of these lessons were completely optional. The game doesn't have any forced hand-holding, and it isn't afraid of the player simply exploring it at his own pace (even if it means circumventing chunks of the experience)."
Security

Detailing the Security Risks In PDF Standard 136

crabel writes with this quote from the H Online: "At the 27th Chaos Communication Congress in Berlin security researcher Julia Wolf pointed out numerous, previously hardly known security problems in connection with Adobe's PDF standard. For instance, a PDF can reportedly contain a database scanner that becomes active and scans a network when the document is printed on a network printer. Wolf said that the document format is also full of other surprises. For example, it is reportedly possible to write PDFs which display different content in different operating systems, browsers or PDF readers — or even depending on a computer's language settings."

Comment Re:Dictionnary attack doesn't show any weakness (Score 1) 217

And that is exactly what you do in the real world.

e.g., pam_unix allows you to set the 'rounds' parameter to slow the calculations, in case the increased default is not paranoid enough for you.

The original article simply gives us a bunch of SHA1 hashes, unmodified, unsalted. Far too weak for real-world use, yes.

Slashdot Top Deals

"Probably the best operating system in the world is the [operating system] made for the PDP-11 by Bell Laboratories." - Ted Nelson, October 1977

Working...