Forgot your password?
typodupeerror

Comment Re:Any encrypted transmission protocol actually (Score 1) 536

On the other hand, use of SFTP in place of FTP is mandatory in this day and age.

You must be kidding. Most SFTP clients suck. The OpenSSH SFTP client doesn't even have the equivalent functionality of the 80's vintage BSD FTP. No SFTP client even comes close to the functionality offered by something like ncftp.

FTP sends passwords in clear; anybody using it is wearing a big red sign that says HACK ME!!!!

Only if they're able to perform a man-in-the-middle attack. At best they have to be on the same physical network segment as you and able to sniff all traffic: hardly a likely scenario in most businesses, or via. the internet. If someone is able to do this, you have bigger problems anyway.

You've got this completely backwards. When using an encrypted protocol, such as SFTP, then a MITM attack may be necessary to see the unencrypted data. In that case, then it would be easiest if they were on the same physical network segment. (Although, careful not to get a false sense of security here. There are many ways to do this, even without physical access.) Fortunately, there are things we can do to detect and protect against those.

With unencrypted protocols like FTP, there's no reason for a MITM attack or any kind of attack at all. You've just potentially saved a future attacker or curious troublemaker a ton of work. You have literally sent your full login information on many separate networks, each of which have many devices connected to them. If anyone is monitoring traffic on any of those networks, your password could just sit in a dump file (along with your login name, your server's IP address and the port your FTP service is running on) until sometime down the road when someone stumbles upon it or scans for it. Unlike a MITM attack, nobody has to even be trying to attack you. There's no practical way to ensure that there isn't a single insufficiently-secured device on any of the autonomous networks that your info traveled across.

If you're using an encrypted protocol, someone usually has to take the time to attack you. If you're using an unecrypted protocol, you're just gambling on whether or not anyone who stumbles upon your login info will find any value in it.

Comment Re:-1 Flamebait (Score 1) 562

Unlike everyone else, they're honest - and this is a huge PR problem.
Or do you seriously think that the internet had a positive effect on let's say.. Microsoft?

I seriously think that the internet may have had a positive effect on Microsoft.

Many people have purchased computers primarily for accessing the internet, and the majority of those purchases benefited Microsoft through license fees (even if only those paid by an OEM) and by further increasing their market share.

Comment Re:Lol (Score 1) 936

If Linux were the the only OS in the mass market, people would be doing wonderfully, just like in the 80s when MS-DOS was king.

Oh? Then why did Windows (and Mac) even happen? I'm sure Bill Gates, with his immense college-dropout fortune and huge influence, illegally monopolized OEM's to ship Windows 2.0 and 3.1 instead of DOS. Yeah. Or maybe, just maybe, DOS wasn't enough, and Linux/UNIX didn't go fast enough for the average consumer on the user-friendly side of things.

Windows was built on top of DOS, and you had to have it installed to even run Windows 2.0 or 3.1.

Windows was around before Linux was ever written.

UNIX was not available to everyone, and the only computers that it was made to run on were far too expensive for someone to have one of their own at home for personal use.

You really should read up a little on the history of the personal computers. Judging from your comments, you'll be surprised by some of the things you learn.

Comment Re:I've always said this. (Score 1) 307

Since we're using condom analogies for web browser security practices, which would you prefer?

A condom brand that has a long reputation of producing faulty condoms with holes in them, as well as a reputation for ignoring these problems and waiting a considerable amount of time before they work to correct them.

A condom brand that has a reputation for improving their manufacturing process to correct any potential problems as they're discovered.

The Media

Congress Creates Copyright Cops 533

I Don't Believe in Imaginary Property writes "Not satisfied with pitiful potential penalties of $150,000 for infringing upon a $0.99 song, Congress is proposing new copyright cops in the "'PRO IP' Act of 2007, specifically the creation of the Office of the United States Intellectual Property Enforcement Representative (USIPER). They also feel that the authorities need the authority to seize any computers used for infringement and to send copyright cops abroad to help other countries enforce US laws. MPAA boss Dan Glickman praised the bill saying that, 'films left costs foreign and domestic distributors, retailers and others $18 billion a year,' though Ars points out that it allegedly costs the studios only $6 billion."

A Working 5D Rubik's Cube 171

Melinda Green writes "Readers who enjoyed the previous Slashdot postings regarding the 4-dimensional Rubik's cube called MagicCube4D will be interested to know that a couple of brilliant developers have recently created a working 5-dimensional Rubik's cube. Operating a 5 dimensional puzzle projected all the way down to a 2D computer screen may seem a hopeless task but the full 5D puzzle has already been solved by 3 people. Also noteworthy is the fact that the 4D puzzle has now been ported to Java and is available as both a full-featured desktop application and as an Applet."
Upgrades

Journal Journal: Troll Slaying Roundup 3

I apologize for the time between entries, but as many of you know, CmdrTaco has now all but eliminated trolling on Slashdot - and deserves our thanks for all his hard work! However a recent upsurge in trolling over the last four months has created some changes in the Master Troll Blacklist, and I'll document some of these changes for you now.
  • Fortknox - Beloved by many, Josh Marotti recently announced that he is in fact a
User Journal

Journal Journal: Answering the Mailbag 9


miagfmu writes:

To: TrollBlacklist HinduHome.com
Subject: Non-troll request

Hi,

I was looking at your list and am about to sign up. But, I saw a friend-of-a-friend
on the list, and thought it might not be such a great idea.

Slashdot.org

Journal Journal: Curbing Slashdot Abuse 1

Like many web based discussion boards, Slashdot has a small vocal minority of abusive and disruptive users. Many of these users spend hours online attempting to harass and provoke normal Slashdot users. CmdrTaco et al have devised a trust referral system which allows users to mark bad accounts and assign them a penalty. This account in particular has a running list of ALL of Slashdot's worst abusive users. You can leverage this account to 'block out' this i

Slashdot Top Deals

God may be subtle, but he isn't plain mean. -- Albert Einstein

Working...