Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

WikiLeaks To Ship Servers To Micronation of Sealand?

damian2k Re:Uh Oh (350 comments)

Its already been made into a tv show called 'south atlantic raiders' by the comic strip. Well sort of. http://www.imdb.com/title/tt0544884/

more than 2 years ago
top

Chinese Developer Forum Leaks 6 Million User Credentials

damian2k Chinese number combos (102 comments)

english 'iloveyou' is at #26 but the Mandarin for the same is 'wo ai ni' ... 'woaini1314' is at #83. the 1314 means "forever" ... because it sounds like forever when pronounced in Cantonese. At #93 is '5845201314' - when pronounced in mandarin - 'wo fa shi, wo ai ni, yi san yi si'. ... which sounds like - "i swear to love you forever and ever"... More here: http://en.wikipedia.org/wiki/Numbers_in_Chinese_culture#Combinations

more than 2 years ago
top

Law Professors On SOPA and PIPA: Don't Break the Internet

damian2k Re:The Internet vs. Cable TV (283 comments)

I think the analogy you are after here is that media corporations really want a "CLOSED" Internet that is compliant and fully under their control, as opposed to an "OPEN" Internet which they can't control ... its the inevitable swing back to a closed technology, as happened with the telegraph (started off open then became dominated by western union) and the telephone (started off open then dominated by AT&T). The problem is that the technologies behind the Internet will make it extremely difficult to pull this off, but this may be the first salvo in the battle.

more than 2 years ago
top

World's First Programmable Quantum Photonic Chip

damian2k Re:computing power scales exponentially (156 comments)

I suspect this is powerful enough computing power that there will be an argument to keep it restricted to "the cloud". Too much power for the average citizen, more than anyone but a terrorist would need, that kinda thing.

Erm, that's what they said about the first ever computer, you know, the quote that went: "there is a global market for a total of 8 computers" or something.

more than 2 years ago
top

Malaysia mull compulsory registration of tech work

damian2k two classes of people with computer skills (1 comments)

> The draft Computing Professionals Bill proposes to create two classes of people with computer skills:
> - A lower class of “Registered Computing Practitioner” — people without degrees in computing; and
> - An upper class of “Registered Computing Professional” — graduates in computing

Erm ... so these two have the same acronym ... RCP
they would be better off going with CM (code monkey) and SE (sofware engineer) ;-)

more than 2 years ago
top

Analyzing StackOverflow Users' Programming Language Leanings

damian2k Re:Dumb units. (185 comments)

I'm probably wrong here but isn't this post just showing a ratio as opposed to a correlation coefficient? e.g. the javascript number of 294% could have been shown as 2.94 but maybe the % gives it a bit more impact?

more than 2 years ago
top

Mastercard, Visa To Help Target Ads

damian2k Re:I've been expecting this for a while (222 comments)

exactly .... when all they"ve got is your full name, dob, address, credit history and maybe associated bank account getting an ip out of that lot is still going to be *extremely* difficult. hence google's insistence upon real identites for google+ it makes their marketing ability that much easier

more than 2 years ago
top

The 147 Corporations Controlling Most of the Global Economy

damian2k Banks have a license to print money ... (572 comments)

In the form of taking deposits and lending it out at interest. No wonder there is so many of them in this list.

more than 2 years ago
top

What Is the Most Influential Programming Book?

damian2k Re:Best thing ever made with a Microsoft logo (624 comments)

Jeffrey Richter's books on CLR C# development (.NET) are also excellent - they cut through so much crap its unbelievable. They are specific to one technology, but do the job very well.

about 3 years ago
top

What Is the Most Influential Programming Book?

damian2k Re:Software Tools by Kernighan and Plauger, 1976 (624 comments)

The over-obsession with building tools and/or code generators is one of the historical things that stops programmers from being productive ... i.e. actually delivering production software. I think this book would be a little less relevant now, given the frameworks/libraries and generally good development tools available off the shelf (e.g. visual studio, etc.)

about 3 years ago
top

What Is the Most Influential Programming Book?

damian2k Re:The C programming language (624 comments)

The fact that C is still 2nd in language popularity (according to TIOBE) and is possibly the most dominant language used in embedded (firmware) development says something about its simple yet powerful design. This book was the genesis of that.

about 3 years ago
top

Why the Fax Machine Refuses To Die

damian2k Re:It's for signatures (835 comments)

Anything important such as a land title transfer or some such has to be done on the original ... but remember signatures can also be forged or copied ... but the fax makes it relatively easy to sign something and then send it back to where it came from ... unlike the scanning/emailing method which is just a pain in the ass, and no more secure.

about 3 years ago
top

What Is the Most Influential Programming Book?

damian2k Re:Gödel, Escher, Bach (624 comments)

That was 12th on stack overflow's list

about 3 years ago
top

What Is the Most Influential Programming Book?

damian2k I'm sort of surprised there's no UML books listed (624 comments)

Not that I'd vote for one, but just a bit surprised considering the silver bullet it was meant to be for software engineering in general.

about 3 years ago
top

What Is the Most Influential Programming Book?

damian2k Re:Dragon Book (624 comments)

The dragon book came in at number 10 on the list in the original article ... quite a feat.

about 3 years ago
top

What Is the Most Influential Programming Book?

damian2k The 1st C#.NET book by Andrew Troelsen (624 comments)

I know its language specific, but the way the book was written and structured made learning a new (and challenging) language easy for me ... really inspired writing.

about 3 years ago
top

Google's Real Name Policy, Why You Are the Product

damian2k Re:Can we please stop this meme? (374 comments)

facebook, microsoft, yahoo, google ... they all issue targeted ads using any snippet of personal information they can glean from you or your browsing habits. Its been this way since the start of the internet (cookies). At least google gives you some tools such as chrome's "incognito" feature. In my mind facebook is far worse in this regard, and not many people cared that much when they started issueing targeted ads targeted to your relationship status, sex, location etc.

about 3 years ago

Submissions

top

Programming Trends on StackOverflow

damian2k damian2k writes  |  about a year ago

damian2k (2358426) writes "This animated bar chart shows the top 25 tags on StackOverflow each month, measured by monthly question counts. The y-axis shows percent and represents the proportion of these top 25 tags per month. The candlestick shows the minimums and maximums to date.

The trends listed below refer to the proportion of the top 25 tags, as shown in the chart and not the absolute number of questions. You can see these trends by watching the animation and looking at the final chart.
  • Up — javascript, android, jquery, html, css, json
  • Steady — java, php, python
  • Down — c#, asp.net, .net, sql-server
  • Tag replacement — ios replaces iphone
"
top

Big Ball of Mud Design Pattern

damian2k damian2k writes  |  about a year and a half ago

damian2k (2358426) writes "In Big Ball of Mud, Brian Foote and Joseph Yoder propose that the default (and most common) software architecture in use is the "Big Ball of Mud" pattern and go on to discuss six additional patterns and activities that it gives rise to: "Throwaway Code", "Piecemeal Growth", "Keep it Working", "Shearing Layers", "Sweep it Under the Rug" and "Reconstruction"."
Link to Original Source
top

Pricing hacks of online retailers

damian2k damian2k writes  |  about a year and a half ago

damian2k (2358426) writes "The well known and less well known tricks that online retailers employ to encourage you to buy products and services from their website. Pricing hacks of online retailers covers tricks such as the power of "free", per-customer limits, dynamic pricing, time limits, the 9 factor, easy math, pay what you want, freemium, no dollar signs and X for $X."
Link to Original Source
top

Coding tricks of game developers

damian2k damian2k writes  |  more than 2 years ago

damian2k (2358426) writes "Game developers often experience a horrific "crunch" (also known as a "death march"), which happens in the last few months of a project leading up to the game's release date. Failing to meet the deadline can often mean the project gets cancelled or even worse, you lose your job. So what sort of tricks do they use while they're under the pump, doing 12+ hour per day for weeks on end?

How about changing the background story of a game to suit a bug, or even just leaving the bug in there and making it a humorous feature of the game! There's also the game studio who keep a pair of white gloves handy, just in case you need to code up some particularly nasty hack and you don't want to feel dirty when you do it! Read more at the article here: http://www.dodgycoder.net/2012/02/coding-tricks-of-game-developers.html"

Link to Original Source
top

CLOO App Lets You Rent Your Bathroom to Strangers

damian2k damian2k writes  |  about 3 years ago

damian2k (2358426) writes "The crew behind CLOO, who apparently think putting a sassy salsa soundtrack to their demo video somehow makes the notion of a stranger coming in off the street and taking a shit in your bathroom (or doing Christ only knows what else) more palatable, are incorrect in their assumption.

No matter how much snazzy UI work and Google Maps integration you throw at something, some ideas are just bad ideas at their very foundation."

Link to Original Source
top

Online Banking Safety: Attack Mitigation Methods

damian2k damian2k writes  |  about 3 years ago

damian2k (2358426) writes "Specialized trojan malware infecting PCs used for internet banking are becoming prevalent. For example the ZeuS Trojan and SpyEye Trojan are both designed to infect a Windows-based PC and enlist it into a botnet of controlled PCs, from which can be harvested online banking usernames, passwords and credit card credentials.

Attack Prevention and Mitigation Methods
  • Ensure an up to date browser and operating system.
  • Avoid Microsoft Internet Explorer if possible; Mozilla Firefox and Google Chrome are generally safer.
  • Ensure an up to date and effective commercial anti-virus software is installed.
  • If possible use a dedicated PC specifically for commercial internet banking only. This means it will see no general-purpose internet usage, and is therefore less likely to get infected.
  • Change online banking passwords regularly, at least once per month for commercial internet banking.
  • Implement two-factor authentication for banking/payroll transfers.
  • Ask your bank to remove or restrict the capability to add new employees and/or new payee accounts from your online account. Replace this operation with a secure method, requiring at least two factor authentication and/or phone support.
"

Link to Original Source
top

2011 Year of the Hack: A Timetable of Ownage

damian2k damian2k writes  |  more than 3 years ago

damian2k (2358426) writes "An interesting and large infographic, featuring a table of hacker activity from March, 2011 through to August, 2011. The target organisation types are color coded as Government, Military, IT & Tech, Media, Biotech, Law Enforcement, etc."
Link to Original Source
top

Swedish man arrested after trying to split atoms i

damian2k damian2k writes  |  more than 3 years ago

damian2k (2358426) writes "A Swedish man has been arrested after attempting to split atoms in his kitchen, claiming that he was only doing it as a “hobby”. Richard Handl said that he had the radioactive elements radium, americium and uranium in his apartment in southern Sweden when police showed up and arrested him on charges of unauthorised possession of nuclear material.

Handl, 31, said he had tried for months to set up a nuclear reactor at home and kept a blog about his experiments, describing how he created a small meltdown on his stove."

Link to Original Source
top

Bitcoin Price vs Google Search Trend: Correlation

damian2k damian2k writes  |  more than 3 years ago

damian2k (2358426) writes "An interesting relationship has come to light between the closing price of Bitcoin (on the MtGox USD exchange) and the level of interest in Bitcoin as measured by Google Insights for search. The data was taken for the last 90 days. The faint blue line represents the search interest in the term "bitcoin" and the dark black line represents the closing price of Bitcoin on the MtGox USD exchange."
Link to Original Source
top

Australian Feds Unmask Evil

damian2k damian2k writes  |  more than 3 years ago

damian2k (2358426) writes "Australian Federal Police (AFP) have taken down notorious Aussie hacker 'Evil' after a 7 month operation during which they monitored his activity and traced him to the country town of Cowra, New South Wales, 330km from Sydney. The 25 year-old hacker, whose real name is David Cecil, turned out to be self-taught in the art of hacking, with no formal knowledge of IT, and was in fact an unemployed truck driver and father of two. He operated from a network of multiple computers setup in his home.

Cecil is said to be motivated by ego to prove his network security skills after complaining he could not get work in the IT sector. Sydney web developer, Glenn Evans, originally tracked Evil back in January to a chat room on EFnet, a major worldwide IRC network. At the time, chat room operators on EFnet threatened Mr Evans with a cyber-attack for trying to contact Evil."

Link to Original Source
top

LinkedIn uses your name+photo for advertising

damian2k damian2k writes  |  more than 3 years ago

damian2k (2358426) writes "Business Insider's Nick Hughes has a revealing writeup today which demonstrates that professional social network LinkedIn is using member profiles, images and activity in a social network advertising campaign without first getting the permission of individual members."
Link to Original Source
top

Confessions of a Cyber-stalker

damian2k damian2k writes  |  more than 3 years ago

damian2k (2358426) writes "A recent cyber-stalking case in a Californian court has highlited the weakness of password reset 'security questions' which can be easily guessed by the attacker when some basic details of the victim are already known or even already public on social media sites like Facebook.

George Bronk, of Sacramento, California, was sentenced to more than four years in prison after being convicted of computer intrusion and the cyber-stalking of 46 women across 17 states. He carried out the cyber-stalking for a total of 10 months, from December 2009 through to September 2010, when he was eventually caught. The case illustrates the vulnerability of all Internet users, said prosecuting attorney Robert Morgester of the state attorney general's office. "The victims we went to said `I had very robust passwords.'. But it didn't matter how robust the password was if the recovery question is easy." he said."

Link to Original Source
top

AVG introduces MultiMi (pronounced Hack Me)

damian2k damian2k writes  |  more than 3 years ago

damian2k (2358426) writes "A new application called MultiMi from AVG is going to prove an irrestistible target to hackers ... as their product blurb states: "it provides users with a single point of access for all your PC files, email accounts, social media platforms (including Facebook, LinkedIn and Twitter) and content from cloud services (including YouTube, Flickr, cloud storage services and Google Docs)."

I just hope this thing has some serious security built into it."

Link to Original Source
top

Eugene Kaspersky on Cybercrime

damian2k damian2k writes  |  more than 3 years ago

damian2k (2358426) writes "Eugene Kaspersky, founder of Kaspersky labs and cybersecurity expert has used his blog to take a swipe at the state of current multilateral efforts combatting cybercrime. In his post he mentions that the Council of Europe Convention on Cybercrime is largely a waste of time and that the UN's IMPACT Alliance, which is based in Cyberjaya, Malaysia (and of which he is a member of the advisory board) is moving too slowly to be of any use. He has put his weight behind a newly launched non-profit organisation called the International Cyber Security Protection Alliance (ICSPA), which is based in London, and hopes that it can get things moving quickly. He points out that cybercriminals in most cases are beyond the borders of the country of their victims and that the mammoth task of bringing the majority of cybercriminals to justice will require joint efforts on a global scale."
Link to Original Source
top

Over-The-Shoulder iPad Key Logging

damian2k damian2k writes  |  more than 3 years ago

damian2k (2358426) writes "Security researcher Haroon Meer has built 'shoulderPad', an app for Mac OS, and iOS that's designed to snoop on iPad users' passwords by watching their touchscreen keyboards. Simply pretend to be fiddling with your phone or tablet a few meters away from an iPad user while he or she enters their PIN or password, and shoulderPad uses your device's camera to read and interpret the target's keystrokes.
Each key glows blue for a fraction of a second after it's struck, a helpful bit of feedback for any virtual keyboard. ShoulderPad's image recognition algorithms, based on Open CV's open source image recognition software, look for that flash of blue."

Link to Original Source
top

Reasons for China's blue army cyberdefence

damian2k damian2k writes  |  more than 3 years ago

damian2k (2358426) writes "As discussed previously, China has admitted the existence of a 'blue army' or cyber defence unit. This article (from the PRC newspaper's English translation) lists some of the reasons why it was established, including the menace of home grown chinese viruses (such as "panda burning joss-sticks") becoming prevalent in the PRC. As Zhang Shaozhong, a military expert and a professor from the PLA National Defense University points out: China's dependence on the Internet is now increasing. In addition, various types of Internet hardware in China are made in the United States, including many types of software. In this sense, China is only a computer user and China's Internet security is very fragile. Therefore, it is very necessary for China to establish Internet security forces under such circumstances."
Link to Original Source
top

The Business Model of Fake Anti Virus Companies

damian2k damian2k writes  |  more than 3 years ago

damian2k (2358426) writes "Researchers from the Departments of Computer Science and Economics of the University of California (Santa Barbara) have recently released the results of their yearlong investigation into three fake anti virus companies. Details of which banks were involved was covered by krebsonsecurity.com.
This post includes additional figures regarding the scammers daily and yearly sales as well as the average selling price of their fake products."

Link to Original Source

Journals

damian2k has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>