jason-old
Jason
jason-old

I'm not an iPhone user, but is there an option instead of (or in addition to) the full wipe option where you could instead choose a password slow-down? For example, after 5 unsuccessful tries it goes to one try every 2 minutes. That makes it effectively impossible to brute force attack (not even sure whether you

It's already been well documented in the comments how easy it is to skew statistics like these to bash the US or whoever you're targeting. But for those who are skeptical, I'll give you one example that always rankles me. Infant mortality. I've heard people talk about how China and Cuba have lower infant mortality

@richbeales: I think the issue is that the likelihood of someone being sophisticated enough to run a dictionary attack against your WPA encryption but not knowing how to spoof your MAC address is near zero. Since MAC filtering has downsides (the time it takes to add plus a level of inconvenience when you want to add a

Neat idea but I agree with most of the impracticality themed comments below.

@ImSpartacus: Once you go the "all-space" route you'll be freaked out to see how many places your password is concealed. It's like the lotto numbers in LOST. I've even found my password cleverly broken up into individual spaces and embedded between words in an otherwise innocuous-looking sentence. It's like textual

@egoods: The bypass you're talking about might be lock bumping, which is the reason that I wouldn't use a Schlage lock in the first place — wireless or not.

@DeadlyForceInstructor: I did say it's an impressive hack :-) but many people (myself included) would not put something that steampunk-worthy on my front door.

If you're looking for something with a more "polished" look (and for the record, it's an impressive hack) there is a product on the market that does this:

@JimboLodisC: I'll do you one better. I did the same 10 spaces, but I did THREE random spaces but then . . . wait for it . . . I reversed it. The only trouble is now it's too hard to remember. So I had to write it down. :-(

@jbaranski: The clip story reminds me of some movie (can't remember which) where someone was engaged in a gunfight with a really dumb guy. After many shots were fired back and forth, the not-so-dumb guy called out "click click click" and the dumb guy (yes, it was meant to be this obviously dumb) stepped out from

@JimboLodisC: Well, duh, not now that you TOLD everyone :-)

@fauxtronic: Wow, that seriously is an unusual level of paranoia. Even by LH standards :-)

As long as your facing a deaf enemy, this is a great idea!

This is exactly how you should test your pan to see if it's ready to cook with. Once you have this temp, food will not stick to your pan, even if it's just stainless steel.

@popennell: I don't get it . . . was that an answer?

@clockradio: I guess it depends on the type of work one is taking one's tools to. I brought the case for low voltage and networking work, an occasionally TV install, some light electrical work, etc. The most abuse it's likely to see is being tossed unceremoniously into my trunk. I can see where an extremely abusive

@popennell: Sorry, you'll have to explain what relationship you see between the subprime mortgage crisis (brought on, for the record, by the foolish actions of the House Banking Committee and the Government Sponsored Entities FNMA and FMAC) and how a private company like Facebook protects data versus how federal

@popennell: I would fundamentally disagree with your assertion that a private firm does not have a vested interest in data security. If you call a bank and ask them to send you their customer files, what stops them from doing so? Oh, right, their vested interest in keeping them secure.

@popennell: They are two separate objections. First: Nowhere among the enumerated powers which the Constitution grants to the federal government is this mentioned.