Comment Re:Yep! That's why the future is in smarter device (Score 1) 414
How does sniffing 443 work? I thought the point of HTTPS/SSL was to give security to the connection?
How does sniffing 443 work? I thought the point of HTTPS/SSL was to give security to the connection?
China has a right to enforce its laws. You may not agree with the law, but China is a sovereign nation and has the right to make and enforce laws. An external corporation has to abide by them or pay the price.
I have wondered if ATT is a victim of their own success with 3G congestion. They largely sold the iPhone on the merits of all the cool data features and these users consume a lot of wireless data. 3G networks aren't designed to handle many concurrent heavy users. So I wonder, if Verizon gets the iPhone and folks make the switch, will the situation just naturally improve for ATT? Will Verizon suddenly feel the pain of all those heavy users?
Thank you for a sensible post. I agree that the only real solution has to be some abstraction or alternate mode for memory access that prevents the problem outright. C and C++ not only make it possible, but extremely easy to trash memory.
The people claiming that the problem is programmers who are incompetent or stupid and believing that they are superhuman genius programmers who are somehow immune from errors are living under a delusion. You are not a beautiful and unique snowflake. We are all human and imperfect. I have seen many intelligent and competent programmers write incorrect code. I have personally written code with errors. We need to move beyond unproductive blame assigning mentalities to achieve real solutions or we will never be able to advance the state of software. Realistically, the prima donnas will continue on and other people will actually do something.
memcpy_s is not a step forward for numerous reasons already mentioned. strncpy provides functionality that strcpy does not, namely a bound on its region of effect. memcpy was already bounded and neither memcpy_s or strncpy can prevent bad parameters from causing memory corruption. Hardware support like the NX/ED bits to mark pages as not executable are a good advancement on the security front, but still do not prevent data corruption. Complete removal of memory access like many languages do solves the problem with a high performance cost. Emerging techniques like STM may be able to incorporate data safety while maintaining hardware efficiency.
Why does every browser have Mozilla in the User Agent string?
Don't hit the keys so hard, it hurts.