I Am Dumb And WIN RAR And P Files Are Confusing.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link: Nobody/Anonymous - 2006-10-14 AND it's handy for conversion. AlanT • June 7, 2013 9:55 AM I suggest a browser Add-on that will take any password that you type, "process it", and then substitute the result of the process. But extensions don't change whether a file is executable like .exe, .com, or .bat do on Windows. A picture and a hamburger? have a peek here
According to the Info-ZIP article, "The first version of what would become Info-ZIP was published by Samuel Smith in March 1989, complete with the source code in both Pascal and C Ironically, the Ars article profiling that GPU cluster was actually linked on the second page of the article in the OP (I just hadn't gotten to that page yet ;)) (And Karellen says: April 14, 2008 at 10:31 am But in that case, surely Explorer should let you create a file called ".foo.txt". Re: (Score:2) by wiredlogic ( 135348 ) writes: You can't possibly remember what each and every file type icon is on a typical computer these days.
If it showed the names instead would anything other than the user notice? Not in Windows either. The main exceptions are tar on the archiving side and gzip and bzip2 on the compression side. Plus, no one in my family knows anything about WinRAR. :L What do I do?
- It's the same with some other compression and BSD OSes and other Unixes. 22.214.171.124 18:15, 8 April 2007 (UTC) Fixed.
- Geordie Stewart • June 7, 2013 7:01 AM However...as we move to online services which can control the rate of password guessing attempts then complexity becomes less of a factor.
- If you really need to be protected against attacks on a stolen hash on a website with unknown storage methods I would recommend you use a unique totally random password and
- We are not responsible for them in any way.
- Relatively speaking, how much effort would it be to hack into my always-on-the-internet desktop, and subvert it?
- On the one hand, none of the words in it are unusual, so a dictionary on the small side of medium sized would contain all of them.
- Steve Friedl • June 7, 2013 5:08 PM This is the first time I've heard of MD5 and SHA1 being "irresponsible" for use in hashing passwords; how long has this been
- A file named fishhead.jpeg can indeed be a a Win32 executable binary that gets executed by the OS as a binary if called without a named program to open it.
If not, I'm going to remove entries about extractor-only software. 126.96.36.199 (talk) 10:22, 15 November 2008 (UTC) Since noone piped up so far, I have removed both Zipeg and Stuffit Thoughts? -- Needs a Wiki account.... However, I do have some remarks to share about the conducted experiment:passwd file was made available to the attacker -- obtaining a passwd file is not necessarily an easy task on Jeff Harris • June 7, 2013 4:01 PM I'm the Password Safe on Android author.
zip has something like a 4GB limit (Or was it 2??) on uncompressed size of a file, compressed size of a file and total size of the archive, and a limit So, for example, unzipping an archive containing a file named .txt would show a ".txt" display name in explorer rather than a "" display name, which is better IMO. I was wondering if someone could get it's stats into this article? https://sourceforge.net/p/sevenzip/discussion/45797/thread/a9a0cbc7/ Message it for stories and more. × 70680461 story Why We Should Stop Hiding File-Name Extensions 564 Posted by timothy on Tuesday March 03, 2015 @10:13AM from the text-rules dept.
The reality is that no matter how simple you make something, someone is going to have a problem with it. So its not a OS level restriction. And relatively immune to combo dictionary attacks unless you luck out with abadcafeabacabcd or something as equally improbable. The filetype should be another piece of metadata. (and not just an executable flag either - a complete file type.)If the file type needs to be seen by the user, then
Why JPEG? I need to know what the filenames a When people aren't used to seeing extensions (Score:5, Interesting) by Spacelem ( 189863 ) writes: on Tuesday March 03, 2015 @11:00AM (#49171999) Whenever Would you care to share your analysis with us?" -Raymond] Johan Noodlebrock says: April 14, 2008 at 7:13 pm [I consider myself reasonably adept at the language. Its scores of 1871 (Good) and 1983 (Best) rank third and fourth out of 200.
It produces much smaller archives in roughly the same time. Copy the link of the picture, and post it here.Good luck, honey.How does this have anything to do with what my problem is? [ Pingu ] Combo Commander485 posts 2013-12-04 16:33:41 Aaargh! If you would like to refer to this comment somewhere else in this project, copy and paste the following link: WiseAllec - 2006-10-14 aaaand instead of writing "sega game" I wrote
Files should have a name, a type, and a subtype.The types shouldn't be optional, but restricted to a list common to all OSs.The subtype could be the "write whatever you want, Anyway, I'm not saying you're dumb. The winner got 90% of them, the loser 62% -- in a few hours. Check This Out Without it, it'd have been "You idiot, you forgot this." -Raymond] ---- As a substantive matter, I'm confused about exactly what's meant by, "[Files beginning with a period] are considered to
Remember, Notepad will automatically append ".txt" to the end of any filename you type, even if it looks like you're trying to override the default extension. (This behavior can be overridden I take it from the reaction that in the future, I should just say, "No, you failed to take into account
That would clear up any confusion. --Wrldwzrd89talk 12:01, 10 December 2011 (UTC) Using a new color that otherwise is not used in the table would also help. --Schily (talk)
Trying to get a user used to avi vs mp3, vs mov, vs wav, vs ini vs 1000 other proprietary random extensions that one single company uses. Re: (Score:3) by wisnoskij ( 1206448 ) writes: OK, and how is opening the jpg in notepad going to harm your computer? Paul says: April 15, 2008 at 3:33 am This is only loosely related to this topic, but I am curious and I'm sure others are as well. It would barely be a noticeable wait to most legitimate users yet it would vastly slow down automated attacks was the idea.
Johan Noodlebrock says: April 14, 2008 at 6:44 pm [I actually inserted that phrase in an attempt to be more polite. if you attract the focussed attention of a national intelliugence agency. Jordan Brown • June 7, 2013 10:44 AM Some random thoughts... Re:Yes, I agree (Score:4, Insightful) by oodaloop ( 1229816 ) writes: on Tuesday March 03, 2015 @10:53AM (#49171923) It's a terrible name though.
Why would it matter to you if they had thought of a resolution to every possible case that should come up? Twitter Suspends American Far-Right Activists' Accounts Some Root For a Tech Comeuppance In San Francisco Submission: Why we should stop hiding file-name extensions in the consumer-level OS What Would Minecraft 2 Low This article has been rated as Low-importance on the project's importance scale. sum-2ch-a » Win32API?????????
Of course it's still true that using the same one over and over is asking for trouble, so a password keeper is essential. Somewhere along the way, some seem to have confused complexity and predictability but they're not the same thing. In Unices, historically the interpretation of the suffix was up to the individual app and the OS and shell didn't care much. It's cool," he said.
I can't imagine it would be *too* difficult to add a special case check to the Explorer code to determine if the name begins with a "." and act accordingly, but I think it should be included into the comparison. —Preceding unsigned comment added by GaborV (talk • contribs) 13:41, 14 September 2007 (UTC) ---NOTE: zip format supports Unicode for some time Re: (Score:2) by arth1 ( 260657 ) writes: That being said, don't make people learn useless things.What's a useless thing?Any knowledge is useful for something. Those are two completely different things!
My goal is to put enough barriers in place to deter most hacker types, and at least give our IDS time to recognize and block and alert. Inequalities are just as memorable as equations. Who set the 5%? However, treating it has having no extension places it in category 1.
Plugwash 21:38, 18 Jun 2005 (UTC) I have corrected this; GNU tar does support both gzip and bzip2 compressions and you would need to delete files in /bin yourself to disable Advantages: - Free, open-source, with console and GUI versions for both Windows and Linux. - Includes LZMA, PPMD, TrueAudio and generic Multimedia compression algorithms with automatic switching by file type. -