159 posts • joined 20 Oct 2007
Anybody remembers SFCave
or its knockoffs? They've been here, like, forever. I remember playing on Palm Tungsten. Admittedly, the ribbon that you had to direct through the tunnel did not flap its wings, though. Sunflat is still alive, though I am not sure that there weren't any earlier versions.
(I want an icon of a man with long grey beard)
I will tele-toast from 2500 km away
Re: It's all about balance of payments
That's right, paying per Gb (or having capped tiers, like I have from my provider) is the way. The consumer should pay fair price for the service. That is capitalism.
By the way, the top tier, 100Mbit symmetric without caps costs under $30/mo where I live. Admittedly, we have multi-story buildings, so providing the last mile is cheaper per user than in the US.
Do they call it free market?
Suppose I am a customer of Comcast's rival, let's call it "YMission". And I pay subscription to Netflix. It means that part of my money goes to help the rival of my provider, who does nothing for me. Why is it legal?
That is not to say, the content providers create the market for the ISPs, making the customers want to have Internet access. If anything, its the ISPs who owe to the Netflixes.
This does not look like capitalism at all.
Not only that
There are not many people in the world who can pull this off
and most of them know each other, I think. Their effort just might be sponsored by an organisation for which some of them work, but I think it's more likely that they decided to do it for fun, to amuse themselves and to recruit like-minded people into their circle.
do you mean that on Windows, you allow some third party application to delete your files without asking your permission?!
An that application is closed source, developed by a Russian company owned by a guy alleged to have ties with Russian secret service? And famous for advocating for compulsory real identity on the Internet?
Please, please, Please let us see the match!
goes to fetch popcorn
Re: I expect to get a zillion downvotes but...
"the NSA probably are after something is flagged it will inevitably end up at the hands of another person who has not been given explicit permission to read your email"
Just as a thought experiment, imagine that NSA establishes an automated system that scans emails, searches for specific signals, and notifies human operators that the people involved are suspect. Without presenting actual emails to the human operators. According to your line of thought, that would be acceptable, no? Human-free system at Google learns something from users' email and make decisions about advertising tactics. Human-free system at NSA learns something from users' email and makes decisions about investigatory tactics. I don't see much difference.
On a second thought,
Bring Ariadne to Spain for a quick holiday, and let her do the job herself!
+1 David Stockman's
because it is:
- reminiscent of a bikini
- is red+white+blue as Union Jack
- has the Vulture logo (and in the right place too!)
If Angela Merkel or any other European leaders are so outraged by the NSA practices, they surely ought to show some gratitude to the person who made evidence of such practices public, and give him political asylum. No?
Because they where not the spooks
In Russia, spooks basically get everything that they want without asking anybody, under the "СОРМ" (SORM) legislation. In this case, the company stood up to a request for data that came from somebody other then spooks, i.e. financial authorities. Nothing to see here, move along!
Re: Reply @Rascak
Accessing yahoo mail via IMAP (and presumably POP) is free, this is how I reach it from Android.
For that matter, you can perfectly access gmail with an IMAP client too.
Tape never died, it was just rewinding
Re: TCP/IP has been multi-path from the git-go.
@jake, err, no it hadn't
Sure enough, IP has always been, and is now, multipath. TCP session, however, is defined by the quadruple of source and destination layer3 addresses, and source and destination (layer4) ports. For a host with multiple interfaces that means one TCP session can use only one interface (at least, the incoming packets can only arrive on one interface). What they are talking about here is having different packets with different pairs of source and desitnation addresses belong to a single TCP session. Standard published in January 2013: http://tools.ietf.org/html/rfc6824
Social network != "Social network"
Someone on reddit makes a good point:
A lot of people commenting are confused by how New York Times is using the term "social network." They're not talking about Facebook, Myspace, etc. They're talking about the NSA secretly building graphsyour real-life social network without warrants: everyone you talk to, do business with, etc.
Re: Two part PIN?
Or, you could just use chip and pin.
Compromised terminal can show on screen that it's charging $10, but in fact charge $100. The only way is to build a mini display and keypad into the card.
Re: satisfied customer
Depends on who you prefer to be watching you - NSA or FSB. For non-Russian citizens, it might be sensible to prefer FSB. But keep in mind that here you don't have even the token judicial oversight of the FISA court - they just take what they want without asking anybody.
Re: sudo echo $'The Register on Pi-Lite' > /dev/ttyAMA0
When you use shell redirection, the file is opened by the shell process, that runs under the original userid. Sudo launches the command under root userid, and if it opened the file it would be able to, but it does not, it just uses stdout that was already opened by the shell. If it could.
If the command worked, it means that the file was writeable for the original userid, and running without sudo would also work. So, sudo is either unnecessary, or does not help.
sudo echo $'The Register on Pi-Lite' > /dev/ttyAMA0
will not work.
Exactly why it won't is left as an exercise to the writer.
Having a secure OS is not enough. These days, many exploits are very high level: XSS and suchlike. They never leave the browser, so the OS has no chance do deploy its defences.
Qubes mentioned in this thread tries to address this problem by sanboxing multiple instances of the browser in separate VMs.
Double speak alert
Putin said "He must stop his work aimed at harming our American partners" ("Он должен прекратить свою работу, направленную на то, чтобы наносить ущерб нашим американским партнерам"). He did not say about it being "harmful to the US" as the author of this piece interpreted it. Putin't "American partners" are not necessary the "US, the Country".
Putin probably still feels that he belongs to the "intelligence community", and perceives the US secret service establishment as his partners, so it makes sense.
Re: Brain bleach required
... or put a warning on it
"Not Safe For Any Environment"
Asymmetric crpyto is used for authentication (to verify the site you're going to isn't spoofed), but the session keys are negotiated by a Diffie-Hellman key exchange
When you do PK authentication you can establish the session key "for free" as a side effect. I guess this is usually done because it somewhat simplifies the handshake.
Re: Pulse dialling?
Where I live, last time I checked, you had to personally visit the office of the phone company and write a paper request to have DTMF enabled on your home line. So, I had to configure my SIP ATA to use pulse dialling.
Speaking of vintage tech, years before that, I was rather thrilled when I had an opportunity to connect a 386 PC running SCO UNIX to the telegraph network with a specialized adapter, and could login and enter commands from a real electromechanical telegraph terminal. At 50 baud!
Arguably, encrypting data on a NAS is pointless.
Encrypting an Android device is mostly useless too.
Encrypting all data on a device makes sense if that device spends most of the time turned off. Such as a thumb drive, for instance. When "they" get the device, it does not contain the decryption key, so your data is safe. Ditto a laptop with FDE if you turn it off while not in use.
Encrypting data on a NAS device only helps against burglary, while the most probable attack is to take over the running device. While it is running, the decryption key is in its memory, and all data is accessible. Ditto Android device in your pocket that has dark screen, but running CPU. Encrypting it may be useful to comply with some stupid corporate policy, but does very little to protect the data from leakage.
What makes sense is to keep select sensitive bits encrypted, such as to keep passwords in a "crypto wallet". In such applications, the decryption key and decrypted data only stays in memory for a few minutes after you've entered the password, and is safely encrypted for the most of the lifetime of the device that carries it.
Mechanism for emergency mission abort?
Could it be useful to be able to destruct the balloon when it flies outside of the desired area, on command from the ground (if you have an upstream radio channel), or automatically by analysing the GPS data? Would have saved the payload on the last test flight.
@trevor and all interested should take a look at yubico's products. They are primarily designed to work with LastPass-alikes, but can be used without relying on a third-party cloud service. They are rather open (implement standards, most of the accompanying software is open source), which, to some degree, can solve the trust issue. I use their token to log into my machines locally, using challenge-response mode and open source PAM module.
I am not affiliated with them, just an enthusiastic user.
Re: What's the big deal?
Admittedly, one might call it "going out of the way", especially since it is not yet implemented.
Some Internet cafes in Ohio where running a side business of gambling.
New state legislation would make such side business unrewarding (without affecting the main business).
Some Internet cafes will become unprofitable without said side business and have to close.
So what? Why are we discussing this, again?
Internet access permission?
Why would a launcher need it? I think I pass.
Re: Butane is pointess
In general, batteries have much lower energy density than fossil fuels (including butane). The power output of a camp stove is about 3 kW. However, given low efficiency of the converter, it indeed does not make much sense economically.
It's cool, though.
Cross the sea, and settle in Morocco (or something) for these five days. I think you can get more rice for £1 there than in Spain. Maybe even some lamb.
Then again, in some remote Indian village, with £1/day to spend, you'd be a rich man. Probably.
Could be a contender as a "stick it to the back of the monitor" type PC if it had more RAM...
Re: another advert for supermicro?
Indeed, Supremicro was late to the LOM party. And, at the time when I was in this business, much less reliable than the competition.
I admit my experience with light out management is dated, I am in development for the last seven years. Still - ipmi is rather problematic from the security standpoint. No audit (and usually no source available), no updates if/when problems are discovered, limited choice of connection/authentication methods. This boils down to the need for a well-maintained gatekeeper machine on premises, isolating your management network from the Internet. Which means extra cost in equipment and support, and partly defeats the purpose because you won't be able to remotely handle that machine if it fails. We could afford such arrangement for a datacenter of a few hundred servers, but if you only have a few machines on a remote location, it's uneconomical.
because Somalia is the home of pirates these days.
That, or apply for a gTLD, as other suggested.
I was waiting till I could act like this: http://www.youtube.com/watch?v=MW9vSgUaXZU#t=1m2s
(loudspeaker because it speaks!)
How much help does the heater provide? Is it worth at all?
If could be useful to make measurements with the heater disconnected from the battery, for comparison.
If all you can get is 5℃, it may be not worth the effort. -60℃ vs. -55℃ - not likely to make any difference.
And still, google.com zone itself is not signed
which is sad.
And, I concur with Lee D - tech media should show an example.
"Nokia is throwing its best engineering talent at Microsoft's mobile OS"
Nokia has thrown its best (well, allegedly..) engineering talent in the ditch...
People who want to "draw a raster display directly onto the retina" do not understand high-school-level optics.
"on-demand television - a business safe from the ARM-based competitors"
umm... I am not so sure.
is what the marketing types call it. In our tongue, that would be just "proper CSS" on the main web site. That is what we need, not another app.
- Updated Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
- Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
- Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
- FOUR DAYS: That's how long it took to crack Galaxy S5 fingerscanner
- Did a date calculation bug just cost hard-up Co-op Bank £110m?