We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
grep -v '.*' * (780312) writes ""We despise them – yet we imbue them with our hopes and dreams, our dearest memories, our deepest meanings. They unlock much more than our accounts."
Interesting article on people choosing their own NOT "fully safe" passwords.
For years I've used self-generated passwords as reminders or motivation. (As opposed to Stapling Batteries to Horses!) A very long time ago one of my passwords was "hYTTagt?" — have You Talked To agirl today? I'm shy, so that was a good prompting reminder.
Now, with a password manager, they're all randomized garbage to whatever the respective system will accept.
(What do you mean you want exactly 9 Latin character symbols each with exactly 2 strokes? Who the hell writes systems like that now-a-days? Do you think you're avoiding a SQL Injection Attack? (See: Bobby Tables.) )" Link to Original Source top
"A single phonon is too weak to observe, but the phonons inside the black hole bounce back and forth between the inner and outer horizons, triggering the creation of more Hawking phonons each time, much like a laser amplifies light. Physicists call this effect a black hole laser."
grep -v '.*' * (780312) writes "Now that all of the terrorists have been caught, no kids are waiting near the border, and Ebola is fully contained, U.S. Department of Homeland Security's Immigration and Customs Enforcement, or ICE, is on the hunt for those notorious killers, destroyers, and child-rapists of IP who have released "The Expendables 3" early.
I'm so glad that everything else is completely under control in Immigration and Customs Enforcement. On the other hand they just could be after Jet Li (Chinese) or Arnold Schwarzenegger (Austrian), so I guess that's OK after all./sarcasm.
PS — don't tell me about Arnold's new citizenship — *I* know a foreigner when I see one. He talks funny, y'all." top
grep -v '.*' * (780312) writes "I just ran across a new turn-of-a-phrase: "kitten-chewing software vendor." (They were maligning a software vendor for an $8K per seat application upgrade charge from XP to W7.) Now that may or may not be justified — my point here is that the word imagery was more shocking than the upgrade charge. (Then again, maybe I'm just jaded.)
So, what's your favorite new or old phrase? Mine is still: "No good deed goes unpunished", although "Just because you're paranoid doesn't mean they're not out to get you" is looking better and better. (The "I'm from the government and here to help you" joke just seems to be a lost cause.)
Now: ID-10-T error is good too, although I've lately come to realize that there are some smart people who like things other than computers and just want their immediate problem solved so they can move on to their other fun, non-computer stuff. That's was a surprise — fine, but there also seem to be a lot of ID-#-T people too, where # seems to be their IQ, or at least their interest in anything that I can detect." Link to Original Source top
Crypto decoding software and keys moved to hardware
“It provides a totally secure communications path” that uses a “downloadable conditional access system,” or DRM (digital rights management), with its hardware specifically designed so only a licensed user can access the content.
An outside expert given access to the BBT system says it appears to be a real innovation. “It is a fundamental step forward,” says Jim Turner, the former technical director of ATIS,
The BBT “core” patent is very broad. (Well, aren't they ALL now-a-days? And yes, it points to managing an on-line card game. I too don't yet know what they're extrapolating.)
“Were ready to prove what we’ve done is unique and nobody has done it before. It exists and it is in secure microchips and the implications are very interesting.”
Concern is brewing that the bad guys [will] use knowledge of Acrobat source code to intensify already widespread attacks revolving around corrupted PDFs.
"Having the source code to an application is like having the blueprints to a product," says... an IBM company, "having access to it expedites the vulnerability identification process — leading to more weaknesses being identified and used for cybercrime."
So: source code is bad, you should hide it at all costs, if not completely prevent it altogether. Gotcha.
Unfortunately I can't find the opposing text I read on crypto design long, long ago. Basically it argued that the best crypto design is completely published where everything is open and described, down to key generation and even possible starting encryption values. In addition, sample in-the-clear and coded messages and keys are given — Every Single Thing you need to encode and decode the given messages, as well as how to mint your own keys.
Here, instead of being somehow hidden and secret, everything is disclosed to everybody. Now, source code isn't crypto design, but the same rules really ought to apply. Disclose everything. Yep, the "bad guys" might find and utilize something first, but at least the "good guys" now have a chance of finding the same problem. But that goes against the trade secrets and 3rd party company contracts and NDAs though, and after all — THAT'S what's really important.
That would also create a problem for the PMs: programmers would now be wasting time producing (hopefully) secure code instead of implementing new sell-able features. And who wants to pay for features not on the box? Hell, when was the last time you saw:
* New! Now Actually Works as Described AND Implied
... on anything?
The analogy: Blueprints for a safe and lock are completely described. A compete, actual working model is given as well. This exact same safe design is then used in production.
Car analogy: describe everything about your engine, frame, and suspension design. PM / Lawyer anti-assists:... but forget about publishing the trade-secret microcode, we'll just sell the Automobile Diagnostic Tools to interested monkeys^W parties with enough money ^W^W approved credentials every year. (You DID update the ROM year-stamp so the older OBD-II machines will refuse to read it, right?)
Interesting juxtaposition: It's just a terrible, horrible thing when closed-source code becomes available, yet open source (by definition) does it all of the time, and the agreed-upon absolute best design (in another field) is when everything is completely described and above-board with no hidey holes.
Why, it's almost like closed-source is using obscurity-by-design and hiding all of their marginal cases they're not interested in fixing. After all, if you can't see the problems they don't exist — right?