See also: Heapify

Pages: 1 2 3 4

Security is sensible defaults

There are many things tech'y people argue about online, from vim vs emacs, Python vs Ruby, imperative vs functional languages. The list is nearly endless.

One of the most common is "Which is the most secure OS". Typically it goes that Windows is the most ridiculously insecure OS, and Linux the far more secure. Mac OS X users then point out that they don't get viruses. Then a Windows user points out that he's run Windows for years without getting any viruses, and that there are lots of exploits for Linux applications.

These arguments are all pretty much right. Windows is insecure. Linux is more secure. Mac OS X doesn't get many viruses.. But you can make Windows secure, and Linux insecure..

...

Read more

There is 1 comment on this post.

Halo 3 Activity Map: Animated

The video

Halo Activity Map

Note: the times are GMT+0

...

Read more

There are no comments on this post.

Secure website-authentication using GPG keys

Overview

Currently, most websites log you in the same way: You enter a username and password, the web-server hashes the password (generally via MD5(), or SHA1()). This hash is then compared to the one stored in a database - if it matches, the user knows the original password, so it logs them in.

This method has numerous problems, such as the password being sent unencrypted to the web-server, and the fact many users reuse passwords, if an intruder works out a users password (though any means), there is a good chance they can log into the same users email account, online banking etc etc..

The whole username/password login method has many flaws, most are down to the fact most people struggle to remember a single 5-6 character password, let alone multiple random messy looking passwords such as "Xm2K?pdT&av", as most "good password guides" suggest.

...

Read more

There are 10 comments on this post.

Pages: 1 2 3 4

RSS
Powered by Debian, Guinness, and excessive quantities of caffeine and sugar.