Forgot your password?
typodupeerror

Comment Re:Hah! Take that, my bank! (Score 2) 497

The real question is how were they able to truncate your password if they used a hash?

It's not impossible. Let's see one of possible scenarios when a user sign in using his/her long password:
(1) On the server side, generate the hash from user's input and check if it is matched with the stored hash in the database.
(2) If it is matched, continue the sign in process, and truncate the long password: take the first 16 chars of the long password input by the user, generate a new hash, update the old one, set a certain flag if necessary so that in the future only 16 chars are used to generate the hash to validate the login.

AMD

Submission + - AMD joins Intel's MeeGo OS effort (idg.com.au)

angry tapir writes: "In an effort to expand software compatibility for its upcoming Fusion chips, AMD has joined rival Intel's efforts to develop the open-source MeeGo OS. AMD "will provide engineering expertise intended to help establish the technical foundations for next-generation mobile platforms and embedded devices," the company said in a blog post on its website"
Security

Submission + - Hackers Cause Generator to Self-Destruct

An anonymous reader writes: It has been revealed that in a U.S. Department of Homeland Security exercise codenamed "Aurora" conducted in March of this year, researchers were able to cause a power generator to self destruct remotely via a "cyber attack" which changed the operating cycle of the generator. "Government sources said changes are being made to both computer software and physical hardware to protect power generating equipment."

Full Story

Slashdot Top Deals

There's got to be more to life than compile-and-go.

Working...