topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Friday December 19, 2025, 4:43 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 45 46 47 48 49 [50] 51 52 53 54 55 ... 364next
1226
You can say what you want, but MS has been putting a lot of effort into securing IE in later versions - sandboxing, running in reduced privilege mode (unless you're stupid enough to be running with UAC disabled), ASLR, fuzzing the hell out of their code, et cetera.

What security measures does firefox have? :)
1227
Living Room / Re: The plot thickens - iPhone and iPad sales banned in Europe ...
« Last post by f0dder on December 10, 2011, 08:53 AM »
Yep - so Google is taking on Apple - wait for the war!
Time to go shopping for popcorn and beer! :-*
1228
In fairness, Microsoft has had some of the capability for a zillion years, with ActiveX kill bits.

But yeah, this is a bigger thing, and I don't like it at all.
1229
Developer's Corner / Re: Overhead of cross platform development
« Last post by f0dder on December 09, 2011, 12:05 PM »
Are you going to target ONE specific linux distribution, or are you going to try and aim for "linux in general"? Keep in mind that a lot of opensource programmers consider "portable" to mean "works on (most) linux distributions", and there's enough work on making code work there... which has led to horrible atrocities like autoconf.

Don't underestimate how much time you'll be spending :)

I guess we should also ask: is this background service kinda stuff, or something with a GUI, or...?
1230
Living Room / Re: What were these architects thinking?
« Last post by f0dder on December 09, 2011, 12:02 PM »
I think it looks damn cool.

Yeah, I can see the similarity to 9/11, but I didn't think of it until I read the comment. Too bad for the americans that have too much trauma to appreciate the building.
1231
Living Room / Re: Kicked Off the Plane for Games
« Last post by f0dder on December 07, 2011, 05:13 PM »
Words with Friends kinda implies(*) it's not a single-player game. Not being single-player, it means WiFi (hardly in the plane) or cellular data traffic. I haven't got a link handy, but I recall a report that showed that while on modern planes, radio interference shouldn't be a problem, there's some serious problems on older and not so well shielded planes.

(*): no, I haven't checked.
1232
...except when attackers get hold of the (hashed passwords | public key).
Understood. But that's kind of a different (Typically SQL code security) issue. A way in is a way in, and once "they" are in... :)
Well, yes and no - systems aren't isolated these days. Most people use the same password(s) for multiple accounts. If it's breached (or lured away from you) once, an attacker typically has access to a lot more sites. Keep in mind that most schemes either
1) send password in plaintext (though trough SSL) to verify at the server side, while keeping a (hopefully :)) secure hashed version server-side.
2) keep password in plaintext server-side, but can thus do verification without sending the password in plain (server sends hash of nonce+password, or similar).

#1 is vulnerable to MITM or fake site (DNS poisoning, very similarly named domains, injection attacks), #2 is 100%-game-over if the site is hacked but offers protection against #1 attacks.

With a pubkey scheme, attackers have a much more difficult situation - hacking the server gives them a "not in this lifetime bruteforceable" public key, MITM'ing doesn't work (not for the proper schemes - again, fsckyou SSL), and to do anything interesting they'd need to trojanize every individual target.

Got no problems there :) I've actually been wanting to do a bit of research on the MITM stuff for a while now. I'd like to have a better understanding of the mechanics of exactly what is done and how these attacks work as they are indeed quite troubling.
It's pretty scary for SSL. For a "criminal" MITM, you'd normally get a certificate warning, and most somewhat tech-savvy people would at least have a chance of avoiding this.

The scary part, however, is that governments have always had the capability of getting fake certs signed by a CA, and most people will not see this, because it looks legitimate. If you use something like Certificate Patrol for firefox, you'll at least see the cert has changed, and will get a warning if it happens long before old cert's expiry time. But other than that, a fake signed cert will look legitimate. And with the break-ins that have been recently at CAs, it's not only governments that have fake certs now.

If I recall, the main obstacle to the widespread use of private/public keys was that it's ok between people who know each other and exchange it, but once you are starting to do it in a more widespread way with people and companies you dont know, how do they get your key, how does it scale? Need a distribution system with some kind of validation to prevent spoofing.
Valid points - it's hard to do right, and you really need a web of trust or similar system... and even that isn't perfect if people just click "yeah yeah, sounds reasonable that this guy has updated his key" without veryfying by phone call or whatever.

There's a difference between requirements for web browsing and for "ensuring the identify of some random person you don't know" - for the web browsing part, I'd kinda prefer NO automatic trust over SSL's model. At least that way, as long as the first time I visit a server is without any MITM, I'll know if things are afoul from then on. (Unless of course a particular server has been infiltrated, but that'll only give the attackers control of my interaction with that server).
1233
Seriously, why even bother (joining the race) ... The computer can spit out x thousand attempts per second, which becomes completely and instantly irrelevant when a lockout policy is enabled. 5 attempts in a minute = locked out for x minutes. How successful is brute forcing against that scheme?? ...My guess is not very.
...except when attackers get hold of the (hashed passwords | public key).

Throttling verification attempts (and blocking after too many, plus raising security flags) is a very good part of a security policy. But security is one of those things that require both breadth and depth.

You'd still want a nice strong password that makes it hard to guess. Part of being a "nice, strong password" is that it isn't the same one for multiple sites/places. The hard part about having nice, strong passwords that aren't the same one on multiple sites is remembering them all. Hence public-key cryptography where you have a single nice, strong password the protects your private key which (if I understood it correctly) is then used to make a (bunch of) public keys which are each like nice, strong passwords that are hard to guess even with the lockout policy.
One private key has one public key. What you do is protect your keystore with a single strong passphrase, and the keystore then has private keys for your various sites. Yes, it's a lot harder bruteforcing a public key that's large enough, but ideally you'd still use different keys for different sites (or at least partition so you have separate keys for very important stuff, one key for forums, etc.) - for the really-really important stuff, you could opt to not include that privkey in the keystore, and unlock it manually with a separate passphrase for every use.

Agreed, no single layer is absolute ... I just get tired of all the stress being put on encryption. It does have its place but t's not a magic bullet, and sometimes simple really is best. Solutions that is, not passwords. The pass phrase idea I've always liked ... 25 character random strings is just begging for trouble.
There's good reasons for focusing on (proper!) encryption, though, as it isn't just a means of authentication, it also helps a lot in regards to MITM attacks. SSL is hopeless in this regard - I'm not very confident in the CAs.

Of course the level of security required depends on the service offered. I have different demands depending on whether I'm accessing DonationCoder, my bank, or .gov services (the kind where identify fraud can really fsck with people's lives). Unfortunately, the powers that be in Denmark don't seem to grok this, and thus we're getting a fscking insecure (by design as well as implementation) "digital signature" system crammed down our throaths.
1234
I type the passphrase in once, when i boot up my machine. The private key is unlocked for the rest of the session, and it's used automatically when i connect to any server that has the corresponding public key. Logins are instant and seamless; i log in and out of stuff all day long.
And if public-key crypto became widespread, do you know what would happen? Yes, indeed, trojans attacking the keystore. If you keep the keystore authenticated all day, the encryption keys sit in memory all day, and every major OS has privilege escalation attacks that'll allow you to get at those precious bits.

Even if i connect to server A, and then hop from there to server B, i can defer all the key-checking back to my desktop. Server A doesn't need to have my private key on it to connect somewhere else in my name.
I really, really, really hope he only does that through servers he has 100% trust in. If server A gets compromised, funny things can happen to ssh agent forwarding.

But yes, all in all, good points - I certainly do prefer pubkey authentication to servers. (Oh, and remember not to use the same pubkey for everything).
1235
Living Room / Re: AFT! Blocking Google Nonsense is HERE!
« Last post by f0dder on December 06, 2011, 02:18 PM »
I wonder if Google is going to use the blocking as feedback to their scoring engine?

(And I wonder if it's a good idea for them to do that...)
1236
DC Website Help and Extras / Re: attack of uggs
« Last post by f0dder on December 06, 2011, 02:16 PM »
What about...

1) putting people on a watchlist if their first post is made "fairly long" after registering.
2) watchlist if a "very few posts" member replies to a necro-thread.
1237
Developer's Corner / Re: Writing to Form1 textbox from Form2
« Last post by f0dder on December 05, 2011, 03:11 PM »
I probably should have been clearer about when it's a good/bad idea to do that.
Especially since it's in a thread with a question from a design/architecture novice :)
1238
Living Room / Re: Building XP SP4 !
« Last post by f0dder on December 02, 2011, 01:05 PM »
Reallocated sector count is the only S.M.A.R.T stat I've ever seen any use from, and that count doesn't go up until your drive is quite into the danger zone. Also, for most drives I've had failing, that count has been 0.
Thanks for sharing your experience.  I guess you learned about your drive failures by other means -- presumably through observing odd / errant behavior, is that right?
Yes.

If you're at the same physical location, the change in sounds from the drive when doing typical access patterns is often a dead giveaway - at least for 3.5" drives, 2.5" are do damn silent you might not notice.

I recently had the main drive (120GB 2.5" WD something-something) in my linux server crash. I started noticing that I'd sometimes get freezes in Minecraft, long SSH login times, and then stutters when copying files. Minecraft is Minecraft ;), but I had a good idea what was happening when the SSH login times ramped up. When the file copying started stuttering is around the time when DMA errors showed up in 'dmesg' output. I let it run a bit too long before getting a replacement drive, but PANTS-ON-HEAD-RETARDED-luckily lost no data (and apparently no corruption either - some data had .torrent files to check against, others .md5sums). Took around 40 hours to get all data off the drive, though.

I really should set up some dmesg logging that scans for DMA errors and the like... 40hz or Stoic (or anybody else) got any ideas?
1239
Living Room / Re: Building XP SP4 !
« Last post by f0dder on December 02, 2011, 12:33 PM »
I've also read that SMART test results often leave much to be desired, but it seems to be better than nothing -- and apparently there are certain attributes that are worth paying more attention to than others (e.g. reallocated sector count seems to be important).  I didn't use to pay attention to such things, but with multiple drives failing over the past 5 years or so with data loss...
Reallocated sector count is the only S.M.A.R.T stat I've ever seen any use from, and that count doesn't go up until your drive is quite into the danger zone. Also, for most drives I've had failing, that count has been 0.
1240
Living Room / Re: Three little words
« Last post by f0dder on December 01, 2011, 07:15 AM »
These days, I'd go with a single word: tired.
1241
fSekrit / Re: 2011 status report
« Last post by f0dder on November 29, 2011, 10:04 AM »
I primarily use fSekrit for keeping hold of my various passphrases, but I'm not sure generating passphrases is something I want in core fSekrit - I want to keep it lean_and_mean. And there's definitely enough other tasks I'll have to implement first, anyway.

Hope I can get some vacation time around xmas or January - work has been eating up pretty much all my time & energy.
1242
Developer's Corner / Re: Writing to Form1 textbox from Form2
« Last post by f0dder on November 26, 2011, 10:41 AM »
Ideally, your forms really shouldn't know about eachother - but "forms based" programming usually means lots of intertangled junky code, especially if you're a novice programmer who picked up a rapid interface design environment.

Nothing wrong with that, but if you want to do more than small programs, you need to learn proper program design :). In the short term, passing form instances around to constructors and whatnot will work, but it's not good for modularity, re-use, or being able to comprehend your code a few months from now.

The first thing you need to learn is separating your GUI from your "real code". This means having pretty much all your logic separated from the GUI code, and never directly referencing GUI controls from the logic/model code. Let your GUI controls observe your program's model state, and let GUI events be very shallow things doing little else but delegating to instance calls on your model.
1243
Screenshot Captor / Re: small file name length-related bug
« Last post by f0dder on November 26, 2011, 10:34 AM »
Looks like a typo in de code, the max normal path/filename is 261 characters, while SC allows for 161, dodgy or on purpose?
259, actually - MAX_PATH is 260, and one character is reserved for the NUL. (Yes, reserving MAX_PATH+1 characters for buffers is useless).
1244
Living Room / Re: Google scares me, I think.
« Last post by f0dder on November 26, 2011, 10:32 AM »
Okay, now I am spooked. I was talking to a friend on Google Chat (part of the GMail interface). Through stupid absent-mindedness I typed a question, then closed the GMail tab and went to other things.

A minute later the reply came to my Android phone.

Apparently Google figured out that I was no longer "on" the chat and re-routed the message. Useful, yes. But scary, too! My phone is tied into my Google account, otherwise it'd be pretty useless, but I still try to keep up pretenses by disabling GPS, location services, all that. But there is no escaping anymore.
Nothing scary about this, it's simply the (extremly useful) gmail+gtalk integration. And I agree with Eóin's assessment that it's nothing to do with "detecting which device you're on", but rather your android phone doing pull updates every N seconds, and only popping up chat messages that haven't been flagged as 'read'... which they would be, when sitting on your PC.
1245
Living Room / Re: Sansa Clip Zip: Wow!
« Last post by f0dder on November 26, 2011, 10:29 AM »
Does the Clip navigate music based on folders, or does it keep an internal database?

I used to own a Sansa player (can't remember which model, and I'm away from home right now so can't look it up) - it was a very nice little device, which sadly got thrashed when I slipped on my bicycle pedal and fell off, some years ago. Anyway, getting to the point, every time I'd have it connected to my coputer, it would spent several minutes rebuilding a song database from the content on the SD card... this was really annoying!
1246
Living Room / Re: FUNNY~! Drinking Water DOES NOT Hydrate!
« Last post by f0dder on November 24, 2011, 04:29 PM »
Dumpster surfing isn't illegal? Jeez... Can we possibly sink any lower? :P
It'd probably be below my dignity, but still - there is a lot of perfectly good products being thrown out, and it's sad that there's so much waste. At least a few businesses here and there have the ethics to donate to shelters and whatnot.
1247
2) registered nationality of company hosting your data (Amerikan companies have to hand out data to NSA/FBI/whateverTLA on request, regardless of where their servers are hosted, because of TPA).
If MS had an Australian subsidiary, wouldn't it not be subject to US prying eyes?
IANAL, but I wouldn't bet on it. And it's one of the reasons I wouldn't even consider letting a Danish company handle a governmental cloud.

We had this company doing a lot of govt business, including a lot of police systems, the central person register, et cetera. They got bought up by CSC. Which country is CSC originally from? Yep, you're right.

There's not a lot of public talk about the Carnivore boxes located at every ISP edge location with direct feeds not just to the Danish intelligence service, but also the NSA. They did a pretty fscking ingenious move - enforced data logging (very publicly known), pretty useless crap (source+destination IP and port, IP protocol time, timestamp, and a full packet capture of every however-many packets) - useless, fscking expensive for the ISPs to implement and maintain.. and a DOYCdamn red herring.
1248
Living Room / Re: FUNNY~! Drinking Water DOES NOT Hydrate!
« Last post by f0dder on November 24, 2011, 03:53 PM »
Even cheaper?

Go dumpster surfing :)
watched a video lately about a guy living without money (somewhere near Bristol I think). Him & friends got mostly organic stuff out of the supermarket-skips. He said they didnt reduce it to sell it off cause they wanted to keep the prices up, so they dumped it instead...
So, good advice there f0dder ;-)
I personally wouldn't do it (at least not with my current financial situation :)), there's the risk of contamination, and that stuff isn't always visible, smellable or tastable.

That said, a lot of perfectly good food (and other items) are thrown away - stuff usually lasts well beyond expiry dates (but obviously can't be sold then), stuff is thrown away if the packaging is too badly bruised (zomg what would the customers think!), et cetera.

In .dk dumpster surfing isn't illegal, as long as you don't break&enter.
1249
Hm, paywall.

MS is right in that the physical location doesn't necessary make the data safer, though... especially for the same reasons you mention yourself.

There's three things to consider:
1) national laws where the servers are hosted
2) registered nationality of company hosting your data (Amerikan companies have to hand out data to NSA/FBI/whateverTLA on request, regardless of where their servers are hosted, because of TPA).
3) encryption, encryption, encryption, encryption.

With all that in mind, I'd still wish all government would do the fscking only sensible thing: build their own clouds, using open source technology, and not having it hosted by a third party.
1250
It works perfectly for me with the GTalk client - I find it a bit irritating that the chat Window always seem to pop up in GMail when running GTalk on the same box, but I can live with that. Having conversations stored and available from the web interface, searchable with Google powers, is pretty awesome.

Does anybody know if the GMail integration only happens with the GTalk client, or if it happens with any Jabber/XAMPP client?
Pages: prev1 ... 45 46 47 48 49 [50] 51 52 53 54 55 ... 364next