Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Web Trolls Winning As Incivility Increases

someSnarkyBastard Re:They don't go away (443 comments)

I think the GP was referring to the Westboro Baptist Church, which could be considered a "cult" instead of a "church" depending on who you asked.

4 days ago
top

Comcast Drops Spurious Fees When Customer Reveals Recording

someSnarkyBastard Re:Recording Apps (363 comments)

Total Recall in my case, it's a freemium app, $10 to unlock full features though.

5 days ago
top

Snowden Granted 3 More Years of Russian Residency

someSnarkyBastard Re:First post (266 comments)

You did not address the point parent was trying to make. just because there are court systems worse than our does not excuse the failings within our own system.

I believe the name of your logical fallacy here would be tu quoque.

about two weeks ago
top

Microsoft Tip Leads To Child Porn Arrest In Pennsylvania

someSnarkyBastard Re:In the clear? SRSLY? (353 comments)

Files generally are not encrypted on a one-off basis, instead they are saved within an encrypted "container". This encrypted contain could contain other arbitrary files and will likely use a unique seed value to start encryption, both of which will ensure that you will not be able to find a reproducible file hash for bad images. What you are describing is basically a known-ciphertext attack and is well understood within encryption.

about two weeks ago
top

Ask Slashdot: Datacenter HDD Wipe Policy?

someSnarkyBastard Re:IRS (116 comments)

...when it suits their purpose.

Note the fine distinction made there.

about two weeks ago
top

Massachusetts SWAT Teams Claim They're Private Corporations, Immune To Oversight

someSnarkyBastard Re:Oy (534 comments)

I was thinking more along the lines of Snow Crash or Shadowrun actually; privatized police enforcement working for super-national sovereign mega-corporations.

about 2 months ago
top

Teaching Creationism As Science Now Banned In Britain's Schools

someSnarkyBastard Re:You show me yours, I'll show you mine (649 comments)

null hypothesis --> there is no god or he/she/it/they do not interact with the observable universe in any meaningfully detectable way.
your hypothesis --> there is a god and he/she/it/they do interact with the observable universe in a repeatable detectable manner.

The null hypothesis is the default in science. Proving something is not due to random chance is how science works. That's why we have confidence limits, these limits may be very small but there is still always the chance that it the null hypothesis is correct. This caveat, that a scientific theory must always be falsifiable, is the core of the scientific method; the thought that whatever phenomena we are measuring could still be due to blind luck is why science works as well as it does because it means that we only accept something only after rigorous testing.

Also, as an aside, saying that life evolved from simpler organisms into more complex forms as opposed to fully formed ex nihilo does not automatically preclude the existence of a god. Deism is perfectly compatible with evolution for example.

about 2 months ago
top

New OpenSSL Man-in-the-Middle Flaw Affects All Clients

someSnarkyBastard Re:MITM needs to be designed around (217 comments)

Diffie-Hellman Key Exchange allows you to securely share a secret key over an insecure medium. Combining this with asymmetric cryptography to identify parties is how modern handshake protocols work.

The problem here how to trust Bob's asymmetric key really came from Bob and not Eve.

You are correct in that the ideal solution would be to talk to Bob over a different medium (like phone) and ask him if that is his key but there are ways to do this over the wire. As an example, several Linux distros sign their LiveCD images with cryptographic keys and post the keys' fingerprints on their web page. Can these be spoofed? Sure, hack the server hosting the files. That requires additional effort (and risk) though which would dissuade most cyber-criminals from attempting it.

Is this perfect security? No, but there is no such thing short of chucking whatever you want secured into a black hole.

about 2 months ago
top

Microsoft Reports Record Revenue

someSnarkyBastard Re:Rumers..demise..exaggerated. (289 comments)

You have no idea what Microsoft's culture is like do you? Half of Microsoft's problems are related to it's culture, stack ranking (bottom 20% of workforce gets the boot) destroys morale and actively encourages sabotage and office politics ("I'm sure as hell not gonna be the poor SOB on the bottom of the stack, I'll arrange for Bob's project to go to custard and then HE'LL be the poor SOB on the bottom and out the door!")

Not to say Sony is any better, they are Evil incarnate, but your rosy view of Microsoft's culture, especially considering how infamously corrosive it is, makes me think you are a fanboi.

about 7 months ago
top

App Detects Neo-Nazis Using Their Music

someSnarkyBastard Re:Protect your freedom of speech.. (392 comments)

Not necessarily the second group, Republicans certainly acknowledge the existence of the Tea Party but you can be damn sure they aren't gonna give them even a farcical version of "good healthcare" (not that they would take it)

about 8 months ago
top

Anonymous Member Sentenced For Joining DDoS Attack For One Minute

someSnarkyBastard Re:And they wonder why... (562 comments)

...create civil disobedience and not get caught.

Then you are missing the point of civil disobedience. You are supposed to get caught, especially in places like the US where LEOs like to have a bit of theatricality in perp-walking someone out to the squad car. You want all the attention you can get, that's the point, you are calling attention to something you believe to be wrong.

about 8 months ago
top

Imagining the Post-Antibiotic Future

someSnarkyBastard Re:Oh nos, terrorists! (453 comments)

I dunno, he seems pretty surly to me...

about 9 months ago
top

NSA Wants To Reveal Its Secrets To Prevent Snowden From Revealing Them First

someSnarkyBastard Re:Is Snowden any less than a patriot? (216 comments)

Considering that Obama had to publicly promise not to execute Snowden if he were to be extradited from Russia I really don't blame him for running. If he stayed in the US he would likely be a martyr by now.

about 9 months ago
top

Ask Slashdot: Can Bruce Schneier Be Trusted?

someSnarkyBastard Re:Trust no one (330 comments)

OK lets say that in context your advice is sound and I now thoroughly understand the math behind modern crypto systems. How am I going to be sure the math is correctly implemented? Are you advocating that in addition to having a deep understanding of some fairly esoteric maths I now need to be an expert enough coder to judge the Underhanded C Contest as well? Because that is what you are asking and for 95% of folks on the net or event people here on /. that is asking the impossible.

about 10 months ago
top

Most IT Workers Don't Have STEM (Science, Tech, Engineering, Math) Degrees

someSnarkyBastard Re:As someone who runs an IT company (655 comments)

Bonus points for creating an expert system to play back various prerecorded messages as the sap on the phones works through a generic T-Tree until they have exhausted all options but to actually bug you. Double-plus bonus points if the expert phone system was designed by the BOFH.

about 10 months ago
top

Why Does Windows Have Terrible Battery Life?

someSnarkyBastard Re:Easy one... (558 comments)

ProcMon ProcExp and ProcDump All go a long way toward tracking that sort of info down and are all free (as in beer) to boot.

about 10 months ago
top

CryptoSeal Shuts Down Consumer VPN Service To Avoid Fighting NSA

someSnarkyBastard Re:Time to start (361 comments)

Because "our betters" use those money-saving services. Therefore they are A-OK with storing money offshore and will not prosecute such activities.

about 10 months ago
top

CryptoSeal Shuts Down Consumer VPN Service To Avoid Fighting NSA

someSnarkyBastard Re:Time to start (361 comments)

SpiderOak would be a good one. It's cross-platform, FOSS-friendly, and has a rather impressive feature-set. I'm frankly surprised they aren't better known by now.

about 10 months ago
top

The Cost of the US Government Shutdown To Science

someSnarkyBastard Re:Living paycheck to paycheck? (355 comments)

Not the Federal Government. The Federal Reserve is a private entity.

about 10 months ago

Submissions

top

Ask Slashdot: Can We Still Trust FIPS?

someSnarkyBastard someSnarkyBastard writes  |  about a year ago

someSnarkyBastard (1521235) writes "It has already been widely reported that the NSA has subverted several major encryption standards but I have not seen any mention of how this affects the FIPS 140-2 standard. Can we still trust these cyphers? They have been cleared for use by the US Government for Top-Secret clearance documents; surely the government wouldn't backdoor itself right?...Right?"
top

Parted Magic Silently Goes Commercial

someSnarkyBastard someSnarkyBastard writes  |  about a year ago

someSnarkyBastard (1521235) writes "Users of the popular disk management toolkit Parted Magic may have noticed a disturbing change of late on the sites download page: a "Buy Now" button. Users are now required to pay $4.99 USD to download a copy of the latest disk image. To add insult to injury, the site's link to Source Forge for old files is now monetized by AdFly banners. Parted Magic is comprised mostly of various OSS tools (ClamAV, Clonezilla, GParted, Firefox ,etc.) so is this legally in line with GPL?"
top

Linux Laptop Suggestions

someSnarkyBastard someSnarkyBastard writes  |  more than 4 years ago

someSnarkyBastard (1521235) writes "I am a soon-to-be-graduating starving student and I am considering getting an upgrade for my aging laptop. I have been looking online and cannot seem to find what I am looking for though, so now I am turning to the collective wisdom of /.
What I am looking for:
Linux preloaded or No-OS
Core i5 CPU
11''-14'' display (preferably LED)
Full-functionality Libre drivers for all hardware
Bluetooth"
top

How to get started in Information Security

someSnarkyBastard someSnarkyBastard writes  |  more than 5 years ago

someSnarkyBastard (1521235) writes "I'm a university student pursuing a BSc in CS as well as several industry certs; I currently have the CompTIA A+ and Network+ certs and I am now studying for the Security+ test during a summer internship for my university's networking dept. I would like to go into network security once I graduate next spring and would like to know what advice /. has to offer."

Journals

someSnarkyBastard has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>