security

security

CAPTCHA Effectiveness

If you've used the internet at all in the last few years, I'm sure you've seen your share of CAPTCHAs [http://en.wikipedia.org/wiki/Captcha]: Of course, nobody wants to use CAPTCHAs. They're a necessary evil, just like the locks on

By Jeff Atwood ·
Comments

programming languages

Does Writing Code Matter?

Ian Landsman's 10 tips for moving from programmer to entrepreneur [https://web.archive.org/web/20070306071950/http://www.userscape.com/blog/index.php/site/comments/10_tips_for_moving_from_programmer_to_entrepreneur/] is excellent advice. Even if you have no intention of becoming an entrepreneur. > One

By Jeff Atwood ·
Comments

security

Brute Force Key Attacks Are for Dummies

Cory Doctorow recently linked [http://www.boingboing.net/2006/07/10/analogy_explains_str.html] to this fascinating email [http://www.interesting-people.org/archives/interesting-people/200607/msg00058.html] from Jon Callas [http://www.merrymeet.com/jon/], the CTO of PGP corporation [http://www.pgp.com/library/ctocorner/index.html]. In

By Jeff Atwood ·
Comments

security

You may be a victim of software counterfeiting.

Microsoft has finally activated the most aggressive part of their Windows Genuine Advantage program -- active notifications. After downloading the latest Windows updates, if your Windows cd-key doesn't validate against Microsoft's online database of cd-keys, you may be greeted with this unpleasant five-second mandatory delay dialog

By Jeff Atwood ·
Comments

security

Windows Vista: Security Through Endless Warning Dialogs

Paul Thurrott's scathing article Where Vista Fails [http://www.winsupersite.com/reviews/winvista_5308_05.asp] highlights my biggest concern with Windows Vista: > Modern operating systems like Linux and Mac OS X operate under a security model where even administrative users don't get full access

By Jeff Atwood ·
Comments

security

Automatic Login for Virtual Machines

Virtual machine images typically don't need much security, so the login prompt is more of a formality than anything else. Plus, if you're planning to share the VM image with others, you need to communicate the login information along with the image. It's a

By Jeff Atwood ·
Comments

security

Blocking Image Bandwidth Theft with URL Rewriting

I like to periodically watch the HTTP traffic on my server. I can see what I'm actually serving up over the wire, and how much bandwidth I'm using. That's how I noticed that I've become somewhat popular with direct-link image bandwidth thieves.

By Jeff Atwood ·
Comments

password management

The Login Explosion

I have fifty online logins, and I can't remember any of them. What's my password? I can't use the same password for every website. That's not secure. So every password is unique and specific to that website. And what's my

By Jeff Atwood ·
Comments

security

Keeping Private Keys Private

After I posted the CodeProject article .NET Encryption Simplified, a reader asked this question in the comments: I would like to know what your thoughts are on private key storage in applications. I believe the recommended practice is to use the DPAPI, but I have found this to be too

By Jeff Atwood ·
Comments

virtual machines

Our Virtual Machine Future

Lately I've been spending more and more time inside virtual machines. Whenever I need to try out a new bit of software, whether it's a small shell extension, or a giant product like Team System-- I tear off a new VM first. I don't

By Jeff Atwood ·
Comments

security

Is there an optimal piracy rate?

I've recently been struggling with a number of racing sims I bought to use after work hours in our new racing cockpit. I'm a big believer in supporting developers. I'm a developer myself. But digging around for CDs or DVDs is impractical for dedicated

By Jeff Atwood ·
Comments

regex

Regex Performance

I was intrigued by a recent comment from a Microsoft Hotmail developer on the ptifalls they've run into while upgrading Hotmail to .NET 2.0: Regular Expressions can be very expensive. Certain (unintended and intended) strings may cause RegExes to exhibit exponential behavior. We've taken several

By Jeff Atwood ·
Comments