- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
Admin
Admin
As part of their restructuring, GM should have made plans to build a factory in every town in America. That would have markedly improved their market share.
Admin
That's great. I have a F***N captcha quoting me.
Admin
Sooo... um everyone else on here is clearly a redditor. Why did I just learn about it a month ago... So many hours not could've wasted.
Admin
On our systems, the password actually is **************. (We are required to use 14 chars for security.) Anyway, when someone reads the source code and sees the stars, they assume it is masked and replaced by the real password somewhere else. But after hours of trying to follow our convoluted logic, they give up.
This is known as "hiding in plain sight". So far, it's working.
Admin
It's all well and good to say that you set application boundaries. It's another thing to enforce it.
Admin
Admin
For once I actually lol'ed - and by Anon, none the less... I am sad
Admin
Shoulder-surfing by malicious users isn't the problem. Malicious users will just install a keylogger when you go to lunch, etc.
The problem is when you're with a non-malicious user, and they happen to see your password. You may say that it's hard to memorize, but that's bullshit: If you see random words flying up every now and then, it's impossible not to both notice and memorize at least a partial password.
At least 90% of security is about protecting against non-"malicious" users.
Admin
Admin
What the hell? Who posted this and said "Oh lol, when it prints that messages box"????? YOu are now fired because that will NEVER happen
"if (value != null && value.Length < User.MIN_USER_LENGTH)"
So if the string is LESS than the ALLOWABLE length which is at minimum 0, and not typing anything results in a length of 0 that condition will never occur.
Thanks for playing though.
Admin
Not a problem! I can't drive anyway (never have). I don't have any depth perception.
//TODO: Insert preferred witticism here ...
Admin
A murloc is a creature from World of Warcraft that lives in the water and pummels you when you get close.
Also, a murloc is considered to be found amusing by persons 13 and younger when utilizing the trade chat area of the game.
However, from the spelling "Merlock" I would assume that rather than the fictitious creature from the overly addictive MMORPG World of Warcraft that you were referring to the mermaid warlock, the half-brother of the witch mermaid in the Disney classic "The Little Mermaid"... that clear everything up?
Admin
Can I buy a ☺?
Admin
Having worked with the motor trade as well I could not agree more. Bunch of Luddites.
Admin
i work in an autorepair centre. all passwords for everything business-related are stored in a plaintext file on the desktop of the reception PC. oh, and every file on every PC is available via the network. the unsecured wireless network.
Admin
But, my password for everything is ******** Except, of course, all my online banking. For that I use a more secure password: **************
Admin
It's a hairpiece for the nether regions, isn't it?
Admin
It's kin to that.
Admin
I can think of a couple for Java; IntelliJ IDEA's dependency structure matrix can enforce these kinds of rules; there is also another (enterprisey) tool, I think it's called Lattix.
Admin
Lotus Notes.
Never understood their weird hieroglyphs and XXXXXXXXXXXXXXXX or whatever happens when you type your password!
Admin
First of all, Lotus is almost a worse piece of software than windows. There is no security AT ALL, it is slow, thanks to networked virtualized java virtualization and I dont know how many layers of virtualization to just show plain text and then crash.
That being said, about the mystery of XXX, I think it displays three X's for each char you input, so the person looking over your shoulder (or the well known duck) cannot easily count the number of chars in your password.
Admin
Hi,
That's why, when I'm looking over someone's shoulder I look at their keyboard. For secure environments, set your keyboard mapping to "Dvorak"...
-Brendan
Admin
http://en.wikipedia.org/wiki/Merkin
Admin
Heh - didn't see this before my other post.
http://en.wikipedia.org/wiki/Merkin
Admin
Sounds pretty reasonable to me dude. Well done.
Lou www.vpn-privacy.us.tc
Admin
Admin
Admin
return "Brill*nt";
Admin
Yes, but that would then require somebody to have architected this system, set that up and actually be running automated builds (which judging from the code, might not be too likely).
Admin
FTFY (or, at least tried. There's only so much one can do.)
Fortunately, the hieroglyphs start after the third character is pressed. At any keystroke, there's 2-3 characters that will generate the same next hieroglyph. However, I haven't encountered any two character sequences that'll give the same pair of glyphs from any point.
That having been said, it's still not too horribly difficult to deduce the password from the sequence, and it's pretty easy to count the number of hieroglyph changes (of course, every so often, the hieroglyph doesn't change on a keypress...)
But, anyway, you can actually have some semblance of security if you have Lotus Notes encrypt your mail file. Before too long, it'll corrupt it, and then nobody can get anything out of it.
Admin
Why would you fret if and only if you didn't find an assmole?