Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



The PHP Singularity

leonbloy Re:Recursive? No, very iterative. (622 comments)

Ever since programming languages existed, they have been classified in 2 categories: - Those every one bitches about, - and those nobody uses...

Sounds clever, but it's plainly false.

C, Java, C# are among the most used languages today. Very few serious programmers will say that they are stupid or awful. And, many criticisms aside, most programmers respect them - even love them. I program in all these languages, I like them all, and I hate PHP with passion. It's not an issue of popularity; PHP, its community, its history, all of it, is a tale of terror.

more than 2 years ago

MariaDB and MySQL Authentication Bypass Exploit

leonbloy Re:holy motherfucking cheetah (73 comments)

I guess the db shouldn't answer to any requests outside from known address space.. but still..

There is something called "shared web hosting".

more than 2 years ago

Are Brain Teasers Good Hiring Criteria?

leonbloy Re:Well, they're a good indicator of intelligence (672 comments)

In my experience: They're a moderately good indicator of a special kind of intelligence; which is not a very useful indicator in the typical hiring process.

Puzzles help to distinguish programmers from lawyers. Not to discriminate good programmers from bad programmers.

about 3 years ago

Marx May Have Had a Point

leonbloy Re:For sure Marx had a point (1271 comments)

But identifying a problem is not identical to finding the correct solution.

It is a prerequisite, though.

Perhaps not.

A book of modern social inquiry has a shape that is somewhat sharply defined. It begins as a rule with an analysis, with statistics, tables of population, decrease of crime among Congregationalists, growth of hysteria among policemen, and similar ascertained facts; it ends with a chapter that is generally called "The Remedy." It is almost wholly due to this careful, solid, and scientific method that "The Remedy" is never found. For this scheme of medical question and answer is a blunder; the first great blunder of sociology. It is always called stating the disease before we find the cure. But it is the whole definition and dignity of man that in social matters we must actually find the cure before we find the disease .

G. K. Chesterton

more than 3 years ago

Google Uncovers China-Based Password Collection Campaign

leonbloy Linkedin teaching bad habits (186 comments)

Some days ago I tried to login in http://www.linkedin.com/ , using my gmail address as my id. I typed my linkedin password (as I remembered it) and an error appeared with this message:

"Invalid username and/or password. Please enter your email password, not your LinkedIn account password"

You can try that yourself, using any dummy email address.
I saved a screenshot here.

(notice that it's not even a secure -https- page!)

Ok, I said to my myself, it seems I must enter my google password... I entered it, press "continue"... and two seconds later I though:

"Wait a moment... What...? What I have done?? How can linkedin ask me to sent to THEM my Google password ? Are they nuts? Am I nuts?"

I immediately went to my Google account and changed my password, just in case. But I still can't understand it.

more than 3 years ago

Dropbox Can't See Your Dat– Er, Never Mind

leonbloy Re:They Lied (333 comments)

The old policy said our files were encrypted with mil-spec encryption, etc etc. Now they're telling us they'll turn our files over if asked. Dropbox lied.

I don't follow the reasoning, I really don't get the lie. Files are encrypted, but Dropbox system knows the encryption keys. That "employees" cannot decrypt them, it's an issue of internal privileges and internal security - I always assumed that we are speaking of support/maitainance people here. Mr root-Dropbox can read my files (if I've not encrypted them myself), I always have taken that for granted, as a Dropbox user.

To point to another privacy issue: it's well know, for example, that Dropbox has a clever management of file contents, based on hashes, to allow efficient renames and content sharing. Say I upload a porn clip and I call it "leaning_java.avi". If another user has upload the same clip with a truthful name, then dropbox is aware of that (and ot doesn't duplicate the storage bytes, just links both files to the same storage), and my upload is practically instantaneous. So, Dropbox knows that my "learning_java.avi" is the same file as pornaddict's file "anal_fest.avi". Go figure.

more than 3 years ago

Happy Pi Day

leonbloy Re:Tau instead of Pi... Wait a few months (341 comments)

I too was once an ardent pi supporter. However, I have seen the light... let us eliminate spurious factors of two everywhere and embrace a more reasonable transcendental number: tau

Agree. Pi es definitely overrated.

more than 3 years ago

Objective-C Enters Top Ten In Language Popularity

leonbloy Another sign... (351 comments)

... I value most than Tiobe's dummy ranking, is the popularity of tags in Stackoverflow.
Granted, it correlates more with questions asked by programmers (many of them beginners) than with jobs.

Anyway, you can see that also there "Objective-C" has a (surprising for me) high position (as well as "iPhone").

more than 4 years ago

The Apple Paradox, Closed Culture & Free-Thinking Fans

leonbloy Re:I'm off-duty (945 comments)

You don't buy a computer because of its culture, you buy it because it serves you purposes better than other brands.

Often your real purpose is belonging to a culture (ie: being cool).

about 5 years ago

Firefox Most Vulnerable Browser, Safari Close

leonbloy Re:I wonder (369 comments)

The funny thing is that the article seems to blame the browser for SQL Injection...

...all of the exploits blamed on the browsers are based on SQL Injections and propagating malicious code from the originator of the web..

No. "Vulnerabities in web aplications" is the total set, of which just 8% correspond to web browsers. (From that 8%, the 44% goes to Firefox) The remaining 92% are problems due to web servers and applications (phpMyAdmin, and so); SQL Injections among them. I agree with many other posters, though, in that the report is bullshit, just some graphs and no information about how the data was obtained.

more than 5 years ago


leonbloy hasn't submitted any stories.


leonbloy has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?