Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment The actual claim at issue (Score 1) 56

Here is the actual text of claim 1 from the US patent. The other claims are dependent (i.e., are narrower in scope). The patent examiner found that the claim here is for something novel and non-obvious, which may be true. It may also be true however, that what is claimed is not what CSP actually does, in which case CSP would not be infringing this claim.

A method of preventing unwanted code execution in a client/server computing environment executing a client-side script by an internet browser, said internet browser comprising functions, objects and properties, and their instances, wherein the client/server computing environment comprises at least one server-side resource in network communications with the internet browser, wherein the internet browser receives the script from at least one script source and executes the script, wherein the at least one script source includes any one or combination of: messages received from the at least one server-side resource in response to requests made by the internet browser; the script entered by a user of the internet browser through a debug console; the script entered by a user through the internet browser address bar; the script contained in third party browser add-ons attached to the browser; and the script retrieved from a local storage device, the method comprising:
        determining safe and at risk or restricted portions of the internet browser, wherein at least one of the portions of the internet browser comprises instances of the functions, objects and properties;
        determining at least one of the at least one server-side resource to be a trusted resource;
        determining trusted and untrusted portions of the script wherein trusted script includes script contained in messages received from the trusted resource using the network communications, and untrusted script refers to script received from untrusted script sources;
        receiving, by the internet browser, from the trusted resource at least one message using the network communications containing one or more passwords; and
        in response to the receiving, preventing, by the internet browser, unwanted code execution by:
                re-writing said at risk portions of the internet browser to require presentation of the one or more passwords to the internet browser in order for the internet browser or any script to execute said at risk portions, wherein re-writing is executed during runtime of the internet browser and includes altering the internet browser by a rewriter program executing in the internet browser,
        wherein the trusted resource includes the one or more passwords within each messages containing trusted script sent to the internet browser using the network communications subsequent to the at least one message, in order that the trusted script contained in the each messages is permitted to execute said at risk portions of the internet browser.

Comment Re:40% isn't too bad... (Score 1) 151

A German study in 2017 suggested that insect numbers have declined by 75% in the last 3 decades.

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.cnn.com%2F2017%2F10%2F19...

I don't know about you, but I remember when you couldn't go out in summertime without encountering insects all the time, and you couldn't drive for an hour without getting your car splattered with bugs. It definitely seems to me like we have a lot fewer insects these days.

Comment Re:Apple charges more to solve problems they creat (Score 1) 410

I use both on a regular basis, and Face ID is vastly more reliable than the fingerprint reader.

Dry skin from ambient weather? Sorry, your fingerprint isn't recognized. Damp skin from washing your hands? Sorry, your fingerprint isn't recognized. Got out of the pool less than an hour ago? Sorry, your fingerprint isn't recognized.

I thought Face ID was stupid until I used it.

Comment Here's how they get away with it: lack of competit (Score 5, Interesting) 410

I was a happy Android user for 7+ years. But to reliably get OS updates and upgrades, and not have to put up with a botched Android UI and bloatware, that meant buying a Nexus phone and tablet. Which I did, every 2 years or so.

But then Google decided to give up on Android tablets entirely, and give up on mid-price phones. They jacked up their prices, and a Pixel 3 now starts at $799. Well, guess what, that's the same price as an iPhone XR. And Google's last Android tablet offering before they gave up was actually more expensive than an iPad. So I switched.

With computers, nobody else is even offering a good Unix-based computer. Linux isn't competitive -- I use it for work, but sound and video are still a dumpster fire and don't count on hibernation working as well as a Mac either. If I didn't need to edit 4K video and work on music, I'd probably buy a ChromeBook, and sales of ChromeBooks seem to suggest that indeed there's an underserved market there.

Basically, nobody is putting in the time and money to clean up Linux (or BSD) and offer systems where sound and video editing, hibernation, and all the other basic functionality of a Mac is right there and just works. If you want that, you either have to put up with Windows and its myriad deficiencies, or you have to buy a Mac.

I'm a little surprised that nobody's deliberately setting out to build laptops that have exactly the same hardware as a Mac and are perfectly suited to hackintosh use. Give me a laptop with a proper keyboard and hardware that all worked properly with macOS and I'd be very tempted.

Comment Re:Fuck off with this security bullshit. (Score 4, Informative) 311

And CERT has warned against using your own internal made-up top level domains...

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fisc.sans.edu%2Fforums%2Fdi... ...which is why there's an RFC listing reserved top level domains you can safely use:

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Frf...

Slashdot Top Deals

"The chain which can be yanked is not the eternal chain." -- G. Fitch

Working...