Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Ask Slashdot: What's the Most Depressing Sci-fi You've Ever Read?

Fenis-Wolf The Books of the Wars (1365 comments)

The Books of the Wars-I've never managed to actually finish it. It's basically the ending of every hope I have for humanity. Humans have reached out to the stars, and ventured far and wide. An evil rises on Earth and seduce the colonies to rush back one by one to Earth (to save it from the evil)-only to be ground down and reduced to nothing.

about 2 years ago

Another Afghan School Poisoned — 160 Girls Hospitalized

Fenis-Wolf Re:Clearly a very serious issue, but (474 comments)

Yup. There was just plain old news on Slashdot long before even I showed up

more than 2 years ago

Cheap GPUs Rendering Strong Passwords Useless

Fenis-Wolf Re:If someone gets your hashed password.. (615 comments)

NTLM hashes are calculated on the host and submitted across the wire to a server in response to a request for authorization.

more than 3 years ago

Cheap GPUs Rendering Strong Passwords Useless

Fenis-Wolf Re:If someone gets your hashed password.. (615 comments)

You're aware of course that this is an offline attack? The way it works is you snag a hash as it goes across the wire (via man in the middle, client installed malware, or some other attack) then you take that hash and you calculate on your cracking machine passwords until you reach a password that matches that hash. Then the attacker takes your password and goes and logins with it. The server never sees 'billions passwords per second'.

more than 3 years ago

Comcast Cheating On Bandwidth Testing?

Fenis-Wolf SpeedBoost (287 comments)

What you're seeing is expected behavior. Comcast's SpeedBoost technology maxes out your connection for an arbitrary number of seconds at the begining of a transfer, and then reverts to a normal speed. If you watch their commercials advertising SpeedBoost closely you will see the disclaimer at the bottom of the screen.

more than 6 years ago



An Open Letter to Jason Calacanis

Fenis-Wolf Fenis-Wolf writes  |  more than 5 years ago

Fenis-Wolf writes "We get it. You need to create doppelganger Twitter accounts to bolster your user base and create content. Perhaps some Twitter users are fine with the fact that their tweets are being co-opted by you to drive traffic. But we wont allow you to strip out the attribution to our users simply to pad your own corpus of questions."
Link to Original Source

Spam-King Dead in Apparent Murder Suicide

Fenis-Wolf Fenis-Wolf writes  |  about 6 years ago

Fenis-Wolf writes "As reported yesterday "Spam King" Edward Davidson escaped from minimum security prison with the aid of his wife. Today he was found dead with his wife in an apparent murder suicide. Further details are here"

Ars review of Office 2008 for the Mac

Fenis-Wolf Fenis-Wolf writes  |  more than 6 years ago

Fenis-Wolf writes "Ars takes a quick look at the Microsoft Office 2008 for Mac. A universal binary version of Office is great in theory, but what about the ribbon? Article is here"


Fenis-Wolf has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>