27 posts • joined 17 Oct 2007
Re: Not quite
There are often master keys involved - two examples: the private key associated with the certificate used in SSL/TLS, and the password to a password database (e.g. 1Password, Keypass etc).
Re: Banks too?
Could still be hashed. When they made this change they could have taken your first successful login and then re-wrote a hash of a lower case version into their database; then from then on they just set your input to lower case before hashing it and doing the compare...
FYI: Since "World IPv6 Launch" (06/06/2012) Google no longer requires your ISP to be approved to access them via IPv6.
Fully agree with all your other comments...
For the second woman, it's not correct to state that he was requested to stop immediately. From the victim's interview record,
"They fell asleep and she woke by feeling him penetrate her. She immediately asked 'are you wearing anything' and he answered 'you'. She told him 'you better not have HIV' and he replied 'of course not'. She felt it was too late. He was already inside her and she let him continue."
To balance; OK for me
In contrast to your experience, I've always found LloydsTSB's online interface to be reasonably easy to use, quick and reliable. Perhaps something about your browser could be causing your issues? Safari on OSX Lion here.
Check out the comments on the linked website - debating if she is really a witch or not and suggesting the woman should be forced to marry the poor guy! Personally, I wouldn't want her within a mile of me!
Running *in* VMware
Note, the check is to see if the malware is running *inside* a VMware VM - i.e. a virtual instance of OS X. Merely installing and perhaps running VMware Fusion won't help you.
Or release.gov.uk - which kind of gives us some hope ;-)
1 day, 4 hours
I was worrying that downloading Lion now would effect the available bandwidth on the video call I need to have in an hour - luckily (!?!) I don't think I need to worry given this trickle of data!
PS: Thanks go out to William Gallafent for the hint on finding the estimated download time within the Purchased tab of the App Store.
What a waste
Seems crazy to me that these systems are destroyed.
Of course proper data sanitation is required if the systems are to leave the government's control and (reasonably) secure data centres; but I would have thought they could be re-purposed for another government project providing that the classification of the their new role was equal or higher to the data held as part of the ID card scheme.
£400k may be the cost to shred the drives; but how much was the purchase cost - money that the government will surely be paying out again for more storage?
You always get the AV Vendors quoting shite like this; in the desperate hope they can scare Mac users into purchasing their wares.
Holding down both the sleep and home buttons until the device powers down - then restart - TWICE. I did that on mine and its pretty much back to normal - having sucked big time before. Good luck.
JaitcH, just how do you know that iOS4 will be chargeable for iPad? Given that iOS4 wasn't a chargeable update for the iTouch; I'd be willing to bet you're wrong.
Anyway, in your nice 'free' Android world the problem is not with billable updates; but with the likely lack of any update for your device once the manufacturer has moved onto their next model - leaving your hardware behind. Look at the Android phone world for a multitude of examples...
Because when you turn off the power, RAM loses all the data.
Memory sandwich molecule does not munch three bits!
Referencing the subtitle for the post...
Three bits can represent eight states; the Chinese device only three!
There is new; mixed up with the old...
Dr Funk; I think that there are critical differences between the outsourcing that has occurred for decades and the spontaneous availability of computing resources on the 'real' cloud.
The bio company that jimt222 referred to no doubt decided on their solution, put in some credit card details and had access to the systems to power their work within minutes. Critically, when they finished the processing the charging stopped.
With ICL; did the outsourcing of your compute requirements start with the courting by sales types, the to and fro of contracts, minimum spend (though with an element of pay for the level of resources consumed) and importantly minimum contract length - at least a year if not a lot longer? How long did it take between you deciding to outsource and having the systems available? More than an hour, more than six months?
The Cloud is the just the latest buzzword, liberally applied to any compute farm infrastructure; hence so much of the traditional outsourcing market being resold as if were something new.
There is something new here; a new level of flexibility.
Perhaps AlitVec experience is required as Apple will be wanting new employe to convert AlitVec based code from parts of OSX through to the ARM world for the iPhone OS?
Mm. Nice, so you can appear to be a 'trusted' website (forgetting any https controls) as long as the trusted website has exactly 24 characters in it. Aviv even needed to make up the domain 'securelogin.facebook.com' to get this to work right - that domain name does not even exist.
I'm an iPhone user, and now really quaking in my boots with this revelation.. Honest gov..
XenExpress unfortunately has a number of limitations, such as number of VMs, amount of RAM supported on the machine (4GB) and no support for VLANs. Hopefully a free ESXi will not be limited in these ways...
Chad, you can only SSH into an iPhone if you jailbreak it and install the ssh daemon. If you've done all that and not changed your password, you deserve what you get...
Sounds reasonable to me..
Apple/PA doesn't need to design its own processors as such; ARM's whole business is about selling processor core designs for its customers who integrate these cores with other more specialist logic to form the final chip.
Apple, with PA's expertise, will take these building blocks and combine them to produce the exact mix of facilities that they feel their products require - allowing the products to be made smaller and more power efficient as a result.
Once they've pulled together a design; they will find someone to actually fabricate it for them.
All very sensible.
"...though I'd like to see the ability to limit its ability to grab as much space as is available on the back-up drive to a user-defined size."
I had the same requirement; simply partition your external drive and point Time Machine at one of your partitions.
OFCOM, not fit for purpose
Another great example of what a waste of space and money is OFCOM. Miss Hilton chosen as I'm sure she'd be able run OFCOM better.
...all you've forgot is the mandatory bible...
An interesting paper...
Thirty Years Later: Lessons from the Multics Security Evaluation
Perhaps Dell finally realised that selling awful gear like the AX150i is not a great idea? I've never used Equallogic's products - I can only hope they are an improvement...
Maybe I'm just warped by the Reality Distortion field, but given that Apple is a US company, based in California, any changes are bound to start from there - does it not seem sensible to give them the benefit of the doubt and at least wait 24 hours before bashing them over pricing differences between trading zones???
- Apple stuns world with rare SEVEN-way split: What does that mean?
- Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
- Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
- RIP net neutrality? FCC boss mulls 'two-speed internet'
- Sony Xperia Z2: 4K vid, great audio, waterproof ... Oh, and you can make a phone call