Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Why Aren't We Using SSH For Everything?

dayton967 Issues. (203 comments)

One problem with ssh-key client authentication, is the trust of the public key, now both there is x509 and openssh's certificate based authentication systems, but neither are globally adopted by all clients and servers. This leads to the "how do you absolutely know that the key listed in authorized_keys is a valid ssh key or if someone has added one to it. But you without widescale support of SSHFP, there's no method of really trusting the servers keys either, if you are connecting to a server for the first time, can you actually trust the fingerprint, and if the fingerprint changes how do you know if it's a valid change or not.

A second problem is that with key-agents, allows for the key to be used to connect to other systems, so if someone obtains your "insecure" private key, they could have access to each server that trusts that key, directly or indirectly.

A third, which isn't a problem but somewhat of missing documentation, is that of the Sub Services, So many more features could be generated with better documentation available, an example could be to provide a replacement for the time services (not ntp), and I have used it in the past to output stats from various services, but the documentation is missing.

The last thing I will say, on the server side not only deprecate ssh v1, but it's time to completely obsolete and remove it.

about three weeks ago

How the FCC CIO Plans To Modernize 207 Legacy IT Systems

dayton967 something to be aware of (74 comments)

Legacy systems have a few pros and cons, the ideal response is to evaluate the cost/benefit review, and availability for changes

Issues to evaluate
- Is this a specialized 3rd party product/hardware (may be restricted to vendor eg. ATM's were for a long time OS/2 well after IBM ceased producing OS/2).
- If it is 3rd party, do they still exist, or is there a similar product available.
- Is there specialized hardware requirements. (you may have no problem with a video card, but you might have a problem finding hardware for Wind tunnel Data collection)
- Has the amount of data processing increased/decreased.
- Is the service being utilized less and less.
- Do you have the manpower to handle the existing infrastructure for the proposed life expectancy of the product (if there are 3 people in the world that knows the system, and they all disappear, you may have a problem maintaining the system.
- Will a prolonged outage caused by system being unavailable due to the age, cause a serious impact.
- Is there a good justification that the changes will out weight the current value.

- business logic have been captured, and generated
- system has been optimized for the task
- known output

- Skilled labour, the languages, or hardware may not have limited and aging employee pools. (FORTRAN and COBOL are good examples)
- Increasing costs, technical people and/or parts become more difficult and costly to obtain. Some replacements may have to be custom made even
- Existing hardware could be slower
- Unsupportable protocols (eg SNA or Banyan Vines)
- Security, system may not have been patched for weeks, months or even years.

about 2 months ago

ISPs Removing Their Customers' Email Encryption

dayton967 Re: DMCA (Defamation) (245 comments)

One problem to the argument is that it's not actually decrypting your messages, which the topic makes the mistake on.. it's just telling the client that the server doesn't support Encryption, in which the client will then sent in the clear.

about 2 months ago

Debian's Systemd Adoption Inspires Threat of Fork

dayton967 Re:My Opinion (555 comments)

But the thing isn't systemd or the other programs. It's having a meaningful conversation, about changes of the ecosystem.

about 3 months ago

Debian's Systemd Adoption Inspires Threat of Fork

dayton967 My Opinion (555 comments)

First off many things betray the "Unix Philosophy", Bash, ZSH, Busybox, Apache, sendmail, exim, postfix, it could go on from there, because most of these programs do more then one function, such as bash, zsh, and busybox all include their own versions of system applications or once were. The mail servers, do not do a single function, they send and receive, filter, authenticate and many other mixed services, if they were to the "Unix Philosophy" then it should be more like qmail. Apache version 2.0 allows for a great deal more function, including proxy support, other protocol support, and many other things. SystemD though not perfect, makes changes, and encourages the discussion to make changes. Without some of the past changes, that go against the "Unix Philosophy" we wouldn't be here today, but with an abacus, and someone singing the news of the decade as they walked into the village this week.

about 3 months ago

Battle of the Heavy Lift Rockets

dayton967 Other reasons for NASA's slow build time (211 comments)

One thing people forget, is that the Private sector, can often do things a great deal faster as there is way less red tape. In the Public Sector, you have to have more justification on who you buy everything from, to contractors, everything. The public sector is greatly hindered by this in so many ways, to make sure everything is above board, and fully transparent, and it only gets worse as the economy gets worse, as the government wants an accounting for every last penny, because they believe the public really will care on which toilet paper is being used by government officials. Also if something is not on a standing offer for the government, it must go to be bid on by businesses.

about 5 months ago

Sony Tosses the Sony Reader On the Scrap Heap

dayton967 One mistake Sony Made (172 comments)

The biggest mistakes Sony made, was not to take advantage of the educational market. There are many places that are moving from physical text books to electronic versions, Sony should have gotten in early with places like California to provide equipment for the students to access their books, but with the encumbrance created by Sony, and no large retailers in place they lost market share.

about 6 months ago

Robotic Kiosk Stores Digital Copies of Physical Keys

dayton967 Re:What could possibly go wrong? (192 comments)

You could easily get rid of physical keys, their isn't that many variants of keys out there. Just go into some Home Depot one day and look through a box of locks, you'll see paired locks with the same key beside each other, as they are meant to be sold as pairs. And often there's only a few different keys in the box. To make it more interesting if you go through a few boxes you won't see many more keys in the boxes.

about a year and a half ago

Black Sheep Blackberry Blackballed By Business

dayton967 Crackberry (349 comments)

There are a few issues I can see for Blackberry
  - Smaller Company with too many models for a company that is only in a single area (17 phones in 5 models currently on their website). This should have been reduced to a handful, in various price brackets.

- Not innovating as much as they use to. I don't recall many big news innovations or changes from RIM for awhile.

- Increased competition, more companies making phones.

One of the biggest pro's, over all of their competition is the fact that the phone can be centrally managed, though at an increased cost, with BES, it's $55/user at 500 users, and 2000 users/server. The Server price alone is $3000. They have added a product line to manage android and iOS devices as well, This looks like it's an additional cost as well, ontop of the cost for the BES server, the fuctionality should be part of BES not as a seperate server.

But the price is way high, and they would make a great deal more money, with a lower server price, with an option for licenses that must be renewed at a lower cost per year (or 3 years etc) to perpetual licenses at an increased cost.

more than 2 years ago

Firefox 15 Released: Silent Updates, Compressed Textures, Add-on Memory Leak Fix

dayton967 Re:SILENT updates? (393 comments)

to disable just change app.update.silent to false, in about:config

more than 2 years ago

Ask Slashdot: Value of Website Design Tools vs. Hand Coding?

dayton967 My 2 cents (342 comments)

Things that people forget to look at

  1 - What does the employer/client want you to use? The company may have a method they want you to use, for various reasons that you must adapt to. Or a client may want to have it in a method that they can modify later, with some tool. There may be standards or policies guiding the development process as well.

2 - The site may have special requirements, eg. database driven, etc.

3 - Legal Liabilities, have you made sure not to weaken the security of the site, through bad coding practices. Also if you copy code from another site, is there any copyright claims attached to it.

I know I am forgetting a great deal more, but the biggest thing for me is to gather requirements, what do they need, and want, and what is the end user suppose to see and get from their experience. Once you have enough information, you will know if you need to use something like dreamweaver, or you can code it yourself, or you should use some off the shelf software to provide the user experience.

more than 2 years ago

Ask Slashdot: What To Do With Spammers You Know?

dayton967 Laws to be used against spammers in Canada (333 comments)

These are the laws that can be used currently in Canada.

Theft of a Telecommunication Service (Section 326)
    (1) Every one commits theft who fraudulently, maliciously, or without colour of right,
        (a) abstracts, consumes or uses electricity or gas or causes it to be wasted or diverted; or
        (b) uses any telecommunication facility or obtains any telecommunication service.
    Definition of “telecommunication”
    (2) In this section and section 327, “telecommunication” means any transmission, emission or reception of signs, signals, writing, images or sounds or intelligence
              of any nature by wire, radio, visual or other electromagnetic system.

Mischief (Section 430 (1)(c) and Section 430(1)(d))
    (1) Every one commits mischief who wilfully
        (c) obstructs, interrupts or interferes with the lawful use, enjoyment or operation of property; or
        (d) obstructs, interrupts or interferes with any person in the lawful use, enjoyment or operation of property.

Mischief in relation to data (Section 430 (1.1)(c))
    (1.1) Every one commits mischief who wilfully
        (c) obstructs, interrupts or interferes with the lawful use of data; or
        (d) obstructs, interrupts or interferes with any person in the lawful use of data or denies access to data to any person who is entitled to access thereto.

more than 3 years ago

Help Rename the Department of Homeland Security

dayton967 I have it (382 comments)

Big Brother!

more than 3 years ago

IT Shops Coping With Overloaded 2.4GHz WiFi Band

dayton967 Re:wi-fi needs an evolutionary upgrade (165 comments)

In the case of WIFI it is an advantage. In CSMA/CD you attempt to send your frame after waiting for the line to be free, and if a collision occurs, everyone on the network backs off, and you must resend the complete frame over again. With CSMA/CA, you send a smaller packet stating your intention to send, if there is a collision there, then you back off, and try again. When a shared access network becomes heavily loaded, with collisions in CD, it almost always causes no end of problems.

This is generally not an issue with switched Ethernet, unless there is a speed and duplex misconfiguration, which will happen either if one side of a link is forced and the other isn't, or some network cards and switch combinations can have problems negotiating on occassion, but it's becoming less and less common. (unless you are using the old Baystack 450's)

more than 3 years ago

Why So Many Crashes of Bee-Carrying Trucks?

dayton967 Re:sounds like a MythBusters test can bees in a tr (255 comments)

Umm get a large number of them to push a large rock into the middle of the road early, and when the truck starts driving, a large number would fly infront of the windshield to blind the driver.

more than 3 years ago

IT Shops Coping With Overloaded 2.4GHz WiFi Band

dayton967 Re:wi-fi needs an evolutionary upgrade (165 comments)

No the 5Ghz wifi range actually starts around 5.18Ghz, and 4.915Ghz in other countries. Even taking out the top end of the range from 5.7Ghz and up that 15 channels.

channel frequency(MHz)
36 5180
40 5200
44 5220
48 5240
52 5260
56 5280
60 5300
64 5320
100 5500
104 5520
108 5540
112 5560
116 5580
132 5660
136 5680
140 5700
149 5745
153 5765
157 5785
161 5805
165 5825

more than 3 years ago

Why So Many Crashes of Bee-Carrying Trucks?

dayton967 It was no accident (255 comments)

Those darn Africanized Honey Bees are doing it, they are banding together and causing the trucks to flip. What better way to get rid of your enemy then attacking when they are in the middle of being transported.

more than 3 years ago

IT Shops Coping With Overloaded 2.4GHz WiFi Band

dayton967 Re:wi-fi needs an evolutionary upgrade (165 comments)

First thing, because of the nature of the beast wifi is basically like going back to the old Ethernet Hubs, with the added benefit of it being Collision Avoidance, and not Collision Detection, but because it operates like a hub, you are only as fast as your slowest user.

There are big differences in 2.4Ghz and 5Ghz, first 2.4Ghz has only channels 1, 6, and 11 (in North America, elsewhere there is also 14) that can handle 20Mhz frequencies without interference, at 40Mhz there is 1 or 2, depending on location. The 5Ghz range has about 20 channels that have full 20Mhz ranges available (some countries have more, some less). This leads to a lot less crowding.

Secondly 2.4Ghz has a lot of other devices on this range causing interferences, such as cordless phones, leaky microwaves, video senders (and some of these use frequency hopping, with high power, but using 10Mhz), bluetooth, cordless keyboard and mice, and car alarms are ones off the top of my head, and I think there are some baby monitors in the range as well. 5.0Ghz does have anything in the range as far as I recall, with the exception of radar (in the US), but those ranges are not usable in the US.

The biggest issue with the 5.0Ghz is the penetration power, it may not pass through concrete walls or water, as well as 2.4Ghz. But I really don't plan to use an ipad while I am underwater in a pool.

more than 3 years ago

Ron Paul Wants To End the Federal Student Loan Program

dayton967 typical (1797 comments)

The extreme right wing capitalist view seems to be, make the rich richer, and the poor dumber. Next they will want to get rid of education all together. This just leads to a new form of slavery. In areas of poverty, the better the education, the number of crimes will reduce as they learn ways to be more productive.

more than 3 years ago

Intel Shows RealVNC Embedded In the BIOS

dayton967 This scares the living Bejezus outta me (154 comments)

VNC is not the pinnacle of security to begin with, unless they changed it, the default password limitation in VNC use to be at least only 8 characters. And if they haven't it just gives a much easier method of compromising a system.

more than 3 years ago


dayton967 hasn't submitted any stories.



Sony Hi-MD players are now available in Canada

dayton967 dayton967 writes  |  more than 10 years ago I know it was discussed here in January about the Hi-MD players being available around April. Though honestly I did not see them available up here in April at least not in my neck of the woods.. So I was pleasantly surprised to see the MZ-NHD600D player available. I still think the price is too high though, now will we see them put it into a car stereo, like they have for regular MD, time will tell.

Slashdot Login

Need an Account?

Forgot your password?