230 posts • joined 3 Nov 2007
Just one of many, really
Voice control as one of the many user interfaces. What will liberate (not kill) the app market is the complete freedom to interface with any app with voice control being just one voice in the crowd. Maybe I want specific gestures, automation, external sensors, mind control, a mouse, normal touch, secure locks, childproofing etc. Same reasoning on output, flexibility in how and where to display things will have to grow as well.
Standards will set us free. Single interface designs are pipe dreams. The world of form is legion and will always demand more ways to access it, not less.
cult in need of advertising
From The Mirror: The whole town came together recently to help buy a huge widescreen TV for our community centre so we can all watch soap operas together. "And there's always time to stop and gossip, try on each other's clothes and do each other's hair and nails."
They do not really advertise, ehmmm, the romancing part, do they now? Their first catch should be an advertisement guru to create more illusions about wild romances and complex triangles. I mean the article does say they "share everything". Until the snake in paradise enters I suppose: the village will become soaked in blood when jealousy rears its ugly head.
"NIST points to the vulnerabilities in old versions of SSH"
Wasn't Heartbleed, being related to a new feature, present in what was at the time the latest major version but not present in many older ones? The exception confirming the rule then? While applying patches remains crucial, proper monitoring of (unusual) activity remains key in my opinion.
Re: Logic fail
Killing Time: "A delusional egotist whose relevance faded several years ago."
Still way better than being a delusional egotist who never had any relevance at all, mostly because of lack of sufficient skill, understanding and balls. In my opinion that sums up 82.4% of Assange's critics and 24.5% of his supporters.
Ross wrote: "downvoting... doesn't bother me."
A whole post to explain yourself because you noticed some down votes? Do you have any self-reflection at all? Anyway, your posts were just bad on many levels: humour, comprehension and information wise. That's all that there's to it. But keep looking for that "other" reason if that makes you happy...
Yeah, just like..
"There is no justification as to why the content of a document can only be displayed properly if the execution of macros is enabled."
"The timing of the outage came just days after the BBC's Internet Blog ... celebrated the fact that it had been nearly a year since the Corporation .... moved live processing into the cloud".
Perhaps somebody got the wrong idea and the timing this week with the internation media contest "how to pizz off 75% of the Russian population" might also have provided fuel. As mentioned above, the caching service might have been targetted and then it's just a question of stressing the load.
Re: Maybe we could get a consensus
Extreme weather? There are more extremes in terms of recent record setting perhaps. But no sign of increase of hurricanes, cyclones at the like worldwide since the start of the most recent global warming. Flooding, perhaps, but many of those are extreme in terms of impact because of human stupidity in failing to prepare for the inevitable.
What the actual conversation sounds more like: the energy went to the oceans where we can't exactly measure it yet because we don't have the equipment and a complete model to compensate for all factors at work at such depths.
The Register = quite wrong here
As are all other pedants who think mediocre Google skills makes them feel a bit like god almighty. For two reasons, mainly:
1. Birth certificates in the 19th century certainly did not contain exactness for a couple of reasons, for example to keep within maximum registration periods. One needs to find out the date of registration and see it was perhaps around a six week window (or whatever was used at the time). Check with any historian and archivist, you know, real people with actual knowledge based on experience.
2. It's certainly not strange, or wrong, for biographies to select birth certificates over other claims or sources. Even if the person involved herself would make the claim. One might not agree personally but that's how it's done and Wikipedia is not different here from many formal biography projects. Same goes for spelling of names, if one has to be picked it's the one officially registered, if known, and not how someone might have decided to spell it over time. Ideally one would find the entry in both instances but that's not always a good idea.
it's really Dabbs's fault, not sweet Bill's
Better to start troubleshooting with asking the exact error or description of whatever is visible on the screen during any attempts to open or close things. This will make sure there is actually something on the screen to work with. Dabby went into the whole thin a bit too impatient, solving without actually seeing what might be happening. It would also help using Teamview or similar products. That is to prevent exactly conversations like these! I guess I had too many of them in my helpdesk years and soon you start to understand and accept the reality of them, you stop judging the customer and start criticizing ones own line of questioning. And oh yeah, don't support people when not feeling comfortable when other customers are staring at you, wondering what you're doing. It doesn't help. That's also not Bill's fault by the way. The silliness is yet again Dabbs's....
Re: The internet of fridges
Bulleyes and some follow-up comments. The weight based shelves would only work if every item in the fridge is RFID enabled and not thrown at the shelves and containers in a chaotic way but preferable in a neat sequence. Just like programmers would fill their virtual fridge in a fricking demo! In real messy life the fridge will forever remain in a partially confused state.
"Sensitivity stripes" would be a problem on items where the packaging is already too much part of the cost and recycling woes. And as you already wrote, fridges of people not working on these projects - with less predictable and organized live - are often filled with many fresh, self-made, rather undefined and other unpackaged items. So then we need to have two administrations where there was only one before.
But with large scale applications, like storage rooms for massive food preparations, high volumes, predictable items, this could be actually useful. And as someone else already wrote here, it's already being done. But at consumer level it's in the "hoover car" and "jet pack" category for sure!
Mr Snowden's colleagues??
"According to Mr Snowden's colleagues,..."
Ahum. And who are those exactly? Former colleagues? Colleague whistle-blowers? Fellow planespotters? No reason for this added mystique here, I'd think.
Between a "Brave New World" rock and an "Orwellian" hard place
The article displays a rather convoluted and paradoxical approach on the subject. On the one hand the "abuse" factor in the Snowden files is downplayed in favour of praising some degree of self-restraint these same files appear to suggest. On the other hand it ends by admitting there's now the start visible of NSA reform and as well the potential of much needed GCHQ reforms. But all of this is hard to imagine without Snowden's decision to do exactly what he did, where he did and how he did it. Alternative but sane options open to him at the time I'd love to hear!
Or is perhaps the case being made these reforms could have happened without Snowden since "its theoretical extent has been obvious for many years". This is a giant leap, asserting with now almost (and assumed) perfect hindsight that large complex organizations could change somehow by spontaneous inner pressure or political oversight. This line of thinking has zero historical credibility.
And then a defence like: "in an Orwellian world, Edward Snowden would never have made it to Hong Kong" sounds pretty desperate, considering all the rather well documented hoops Snowden had to jump through to make sure he was not taken out even before he got his information out properly and particularly his flight out of Hong Kong, getting involuntary stuck on a Russian Airport, between a "Brave New World" rock and an "Orwellian" hard place.
Any implication that Snowden's own success somehow would prove that all those warnings about the largest security agencies might be overblown is an argument collapsing under its own weight. As are perhaps these overweight security agencies themselves are already doing under all the increasing pressure and scrutiny.
"Some of the original engineering team got together"
But those are not the blokes on the photo I presume unless they cryopreserved themselves in their secret lab for the last decades and only recently woke up because of some old signal.
Re: Definition of "local"
There's no real fixed definition, Jim59. Someone can also speak about "local" in terms of "local access" to the hardware under the OS itself which is fairly common with (shared) workstations since decades and since last decade even more so with all the Unix derivatives and improvements around. Local access which by the way would change the whole security context right there and then. Perhaps a better term in this article would be "users able to start-up a local shell process". This is not that much different from starting some sshd or httpd subprocess or thread by accessing some port. Although shells are more powerful processes with more possibilities than most other user services. By design of course. Perhaps on a large shared hosting provider, one might have some different security concerns and expectations than on private platforms. For that reason the impact factor of this bug doesn't seem that high but still important enough to think about though. Briefly.
Re: Show me....
Slow changes spanning geological time-spans are not of the same order of impact as the same change within centuries. In the same way an overall rise of sea levels will not manifest everywhere evenly as something to be measured with a ruler. Even so, it's hard to imagine what a flood coming from such an enormous surface with slightly raised water-level would look like when you stand there with the ruler. It's a lot more water coming your way.
I do agree though we'll just have to deal with this like with all the other major disasters, many probably larger and even more serious, and most of them little to do with CO2. Let starts not to build cities on flood planes or earthquake faults. Oops.
numbers don't mean much
Or perhaps 2,500 admins or developers wordlwide decided to have a test machine online for a while to play with key extraction themselves? And some honeypots too perhaps. Numbers don't mean much.
In space nobody sees you scream
Article: "...would also not allow light to reach the pilot".
Note: in space it's pretty dark unless one is close enough to a light source like a star. Pilots won't steer by visible light unless they are flying in a carton cabin hung inside a well lid studio. But I guess radar beams won't go through the plasma either. Enemy ships need to be detected at least with "sub-space particles scanners" one would presume. At least in Startrek.
Or a SF movie like Tremors: innocent geeks being swallowed by a million angry unloved cartridges. They're unstoppable! Now heading for Hollywood and Sunnyvale, to wreak utter revenge on their unsuspecting heartless makers.
Puzzling how anyone at this stage could determine that these attacks are "state sponsored". Obviously there'd be a lively global trade in information which hackers and intelligence agents from all over the world might be involved in. But to scream "state sponsored" without some Snowden-scale leaking -- would likely be a tad primature.
What about a general FOSS project health check? For all core projects insist perhaps on a certain minimum amount of developers and reviewers, with some properly documented reviewing processes? Perhaps this is just about having some standards even when it's free and volunteer work. This is not about creating more overhead but about learning from mistakes and underlying causes in all the practises and work-flows. It hardly seems an incident, how many important libraries are maintained and minimally reviewed because of similar reasons?
Perhaps I missed something
Perhaps I missed something but isn't it way easier to install XP directly into the virtual machine instead of downloading the MS image and make it somehow work with Virtualbox or VMware? I know it was faster for me at the time to manually install XP than to use lets say the Windows 7 evaluation image.
It's hard to imagine serious businesses with only OEM licensing for XP but even so, there are still original and legal XP media and licenses for sale, no big effort to track one down.
I wonder now, would Windows PE 2004 or BartPE be a solution for some cases? Based on XP2 and for just running that one program it might just work. Yes, the licensing might be limited but aren't you actually recovering a malfunctioning OEM XP that way?
Re: Once again...
Bob Camp, so much wrong in one post! Where to begin.
1. No, the host will generally not detect most viruses as they enter a NAT-ed XP client. Better to rely on solutions on the client to cover a broader scope.
2, No, the VM is not just as vulnerable since you must mentioned the NAT mode but also the ability to create snapshot and do restores faster, to strip functionality to bare bone and use the more secure host for more sensitive matters would differ quite lot.
3. You don't trust the average user with a VM but you trust them with a complete PC? Where's the logic? It still needs some level of support or management, obviously
4. The host does not need "functioning drivers" for everything at all and to know "which PC's" to keep a closer eye on" sounds not like a professional consideration. You will have to keep an eye on a lot of services, logs, rules and configuration, no matter in which box, virtual or not, they are stuffed.
"Tuesday doesn't only mean increased risk from hackers exploiting vulnerabilities that will never be patched. It also creates a heightened data protection risk to businesses".
Maybe it's me but any supposed difference between vulnerabilities increasingly exploited by hackers and "heightened data protection risk" seems largely academic. It should have read perhaps: ..." this would include a heightened data protection risk to businesses and consumers".
Pott: "There are lots of reasons why this isn't always possible – hardware dongles, the need to power proprietary hardware cards and so forth.."
Well, yeah, but lets take a step back here. If core business equipment is aged and there's no money and/or willingness to invest in serious replacements or upgrades of any kind, we're talking about a bigger, non-technical issue which will affect the production and security of such places in many ways.
So lets look at the situation where there's at least some will and financing available. There are enough PCI centronics or serial port cards for dongles which can be made available to the virtual machine. Having some ISA card to support? USB to ISA card adaptors do exist (eg Arstech) and drivers will be able to detect the redirected IRQ, DMA etc. The hardware costs are not the problem here but time for testing and troubleshooting might be. Especially for timing-sensitive equipment this solution might run into trouble though or as some report, for any non-plug&play cards. So what is being invested in is a supported solution and the work of an engineer to sort it out. But for mission critical equipment that cannot be replaced (yet), it seems worth a try.
Sounds like emulation is the way to go here
Badly needing to run old software with out-dated requirements is a recurrent problem and often ends up with the same solution on a newer PC's. Just use the new machine's power to start-up some emulator which can emulate the whole stack, from OS, network to application. Strip the image from any other use and distribute or reload daily. This is how it's done in all the cases I encountered since the introduction of Windows 95 and NT as replacement of the old DOS (note: those machines would be safer controlled with non-scheduling DOS anyway). Configure the emulator as bridged interface and remove TCP/IP from the guest and the setup is safer than any "supported" XP config including some form of quick restore added as bonus.
But yeah, I wouldn't worry about XP "security" if firewall, LAN, malware scanning and user interactions can be controlled to a sufficient degree.
One of the Nice things in Ubuntu was that they included since 11.10 as default a backup tool (deja dup) to schedule and backup stuff into their cloud, which seemed like a neat feature to offer this way. Nice and easy, what else to use that "cloud" thingy for? Bit of strange to announce by mail today that the service is to discontinue while suggesting to "download the files". Actually I'd prefer them to suggest or point out as well an alternative cloud storage for their own supplied default backup program. Or at least supply a hint which additional packages enable other backup services. You know, think with your customers, not against them. Ah well, sorted it out by now. I know, it's all free and DIY but I thought Ubuntu wanted to make money and appeal to simple folks as well. Pulling plugs on important services without much of any "now what" suggestions is not going to help with the old perception.
" three machines all trying to do an anti-virus update at the same time the network slowed to a silly speed."
You need one machine to do the update and distribute it locally at a convenient or random time. This is how it was done in the times of lower bandwidth and still is done for sure when loads of PC's on a LAN are trying to update daily or even more while the files being nowadays rather chunky.
Not sure if non-enterprise clients or free versions have this option always. Otherwise it's scripting time!
Re: El Reg toeing the line?
That's right. And it was already a stretch to call the Crimea "Ukraine" anyway--, in recent times or in the past since that would ignore so much history that it's almost funny. The current Russian "Anschluss" might not be the best move all in all but certainly it's a logical one. If autonomous regions actually should have the freedom to secede or declare whatever they like, that's a whole other question. Better not ask it to American history buffs though. Is there a "right of revolution" applicable here?
Medium kills the radio act
Isn't a system like that a giant security hole in itself? Just imagine the amount of fake messages one could spread. The medium can be more dangerous than the "event" it claims to warn for! Brings me back to the 90's where it was too easy to freak out admins with a LAN or NCP message like: "WARNING: server is going down". Great fun to see the admin running by to the server room just because I was bored for one minute. Lesson learned: nobody takes a closer look at the originating address when in panic mode. Worked with email at times too. Dangerous games at the national level.
This exact issue happened to me while testing 8.1 enterprise. That was after having managed staying clear from Microsoft pipe dream products for many years now. And I'm cured again! Although I did actually wanted to use the Windows Phone 8 emulator and as well IE 11 for testing. After the "restore to hell" ended up installing it again with some backup snapshots as virtual machine on another machine (yes the free VMware player did play nice with Hyper-V after all). In the end my hatred has grown not weakened after playing around with it. All credit of Windows 7, which at least was not worse than XP, has been lost - again, in one fell swoop or is it bloop.
The story itself provides enough stereotyping: yes, a woman bitching about another woman (the founder's wife) and indirectly sneering at the hooping girls for putting up a show for all the males in the office. She doesn't appears to realize why she was irritated by the setting at all and directs her anger at the audience, of all people. Remarkable! Without knowing much more this story it already has all the hallmarks of same-sex competition, jealousy and frustration. Possibly that founder's wife contributed her share of it but Horvath goes one step further: blaming all the men and the bosses. Yes, another stereotype! And probably her code was indeed reviewed to be substandard by a coder who might have behaved rather "feminine" in his vengefulness after having being brushed off by a woman who appears to have no insight in why she feels the way she does. But all the hysterical signs are certainly there. Luckily many women are above these self-defeating games.
Re: @Psyx Wow
Ian Michael Gumby: "Assange didn't want to talk about his own personal life, yet wanted a world with no secrets".
"No secrets" - which you just made up or perhaps stretched your tiny fragment of knowledge on the subject out of proportion so immensely that it fits your twisted view on reality. Like most people who read the cliff notes and go online to talk about the book.
Anyway, checking for spies, assassins or abductors after pissing off a nation capable of tracking you down doesn't seem paranoid to me? Unless one just ignores what high ranking people were saying in the US media at the time. Not to mention that there was eventually disclosed that there was a (secret) Grand Jury Investigation running at the time with unknown authority and scope. People with an estimated lesser threat level had been picked up the street in Italy by the CIA only a few years earlier.
But the fact is that we have only a self-promoting ghost-writer’s word what Assange meant when he said "assassins". How serious was this? Was it including other possibilities? Would he really inform his ghost-writer what he was checking for there exactly? Of course these questions require some thought which the subject "Assange" rarely contains these days. All we have left is the rumor mill of disappointed friends and lovers...
Snakes and Ladders
After reading the piece in LRB, which is interesting, it also shows, especially towards the end that Andrew O' Hagan keeps inserting an awful lot of hindsight opinion and personal interpretation in there without much to back it up. Andrew might very well be another self-styled part-time suck-up friend Julian leans so much on for support and understanding.
Like when he was obscenely "betrayed" by two of his Swedish girlfriend-supporters, he keeps getting shafted by people running for their own glory or attention and rewriting and re-interpreting a lot of details of any dealing with him. One would think the message in the Swedish affair would be clear enough. And yes, Julian might be seeking and basking in the attention but he's rather brilliant in the big picture: while his suck-ups, not that much. Perhaps this is a wake-up call for Julian: pay more attention to your direct environment, the people you let organize your life and wash your clothes and dishes. It's not just the far away "system" you are combating but the systems of trust and secrets in your own sphere are another battle ground and your greatest weakness: you're losing out again and again in naïve neglectful behaviour. What a tragic!
Best way forward for him would be to, as even Andreas suggests, to sever the link between governmental persecution of Wikileaks and any betrayal or attacks from his friends and (former) supporters. It's perhaps wiser to understand the power of secrets when it comes to his own cohesion and sanctuary. Now instead all the trouble he's in are fundamentally personal troubles, results of not being able to control a private self in a private life. The rude wake-up call of the fact that one cannot trust government in the same way as one cannot trust supporters, friends or sometimes one's own self.
but there's no problem
Sounds like a text book case of trying to solve a problem which doesn't exist. Or in this case, to think of ways to structure and organize a medium which exists only because of its lack of usual hierarchical structure and artifices of quality selection. All these things take time and a lot of subjective context. And it's not like algorithms would be trusted by crowds to add fairness. Otherwise the same technology could way easier be used for blogs and newspapers (more context there usually). But the solution for all that is called "common sense" although crowds in the midst of revolutions are not known for it.
Re: There was nothing wrong with the Wii
Completely agreed, hammarbtyp! My interest died down because just having Kart, Sports, Fit, Super Mario and Kirby's adventure was not enough. As you said, Kart should have had some follow-up, the WiFit should have way more engaging content and the controllers were indeed not finished it seemed. It almost seemed they overextended themselves and lost valuable time to ride out the whole wave. The other consoles gained the momentum and with their power could also cater the more serious player, who drive the real market. The casual player (me) is not a very interesting target really, unless you can hook me.
Here it is (pdf). The article contains 25 photographs of various candidates of algae, fungi, and lichens on Mars. It's tricky though, attempting science from interpreting photographs and just on some personal title. The only defence I could think of is that at least these type of life forms would be expected, if any complex biology would be there. And they would battle for available water and perhaps pop up on the track of the rover. Sadly enough nobody predicted that ahead of time. Post-priori is all too easy...
Then again, if it's a type of fungus you'd expect it to pop up elsewhere in similar shape and chemical composition, especially at places you stirred up the surface and (perhaps) some fleeting captured moisture. Not only rocks roll down hill, you know?
It's not that I don't believe NASA but to really falsify any fungus speculation, just release the definite spectrometry so other scientists can determine it to be a dry rock mass of some kind using the numbers. But just to show another weird rock shape and suppose "origination" is not really scientific sounding.
Re: Interesting, but
AC: "Generally it is fairly unusual for girls to be into hardware hacking, but that's down to society and gender stereotyping more than anything."
Yes and the exact mechanics of society and stereotyping is down to... well, here your political correct statement leaves the realm of certainties and enters various social and biological theorizing and uncertain experimenting on the topic. In the mean while we can just retain as fairly common observational fact the first half of your statement that it's: "fairly unusual for girls to be into hardware hacking". Therefore the information on her being transsexual is mildly relevant.
obligated conspiracy model
The question comes to mind if it would be already out in the wild, like a range of custom miniature radio-controlled devices, tapping into engine controls to cause car accidents with complete deniability. The police would not recognize these bits as being foreign to the rest of the car electronics. Hmmm did the Mercedes W140 (1997) engine control unit had any access points?
Monastry doesn't help either in such cases
The article reads more like suggesting a monastery as solution to some worldly problem while learning some self-restrain and impulse control might be all one needs. Just admit first to the addictive element of "checking" or the lure of playing with the ever-ready toy in your pocket -- just get in control over the energy you spend on the thing. But it doesn't seem to be worth all the added frustration of trying to do online work on some pseudo-online half-assed device. It's like hiding cigarettes on a hard to reach place. In the end you're going to get them, it won't help the fixation one bit!
Re: Promise the world
JohnnyGStrings, sadly most game developers still do not get any "revenue royalties". It depends on what kind of deal was signed but it's not some automatic right we're talking here. Although you could argue you do still own the source code if that wasn't specified in contract either. My guess is that would be what the court case would have to center on. You still might have tried to start one and settle as most cases do not reach the expensive court for good reason. You need a good arrangement with a lawyer though.
But Facebook is not a historic institution, more likely a disease
Facebook geeks are still making a fundamental mistake with their (tongue in cheek) attempt to discredit the Princeton prediction about Facebook. The methodology as used by Princeton works mainly for studying the spread of infectious diseases or ideas and therefore makes the assumption that Facebook acts more like an idea than an institution and a such it would end up having the same kind of demise.
The error of the Facebook rebuttal is to liken Facebook to an institution like a world class university (what modesty!) and dismiss the notion Facebook would be akin to a virus or as vapid as an "idea". Facebook believes, naturally, that they are about real connections and services being provided.
The idea under scrutiny is probably the one of "being connected on-line to my friends, families and lovers" but is Facebook justified to think they can keep the idea like "Facebook is the best way to maintain these connections" alive? Not before they can become a distinguished institution, I'm afraid, something that cannot be replaced by a new collection of cool upstarts that easily.
Re: Let me point the obvious:
It would be very annoying if text couldn't be copied to and from documents or other emails. Perhaps it's just me but that's what I tend to do especially with important exchanges. And lets just imagine hitting reply and saving as draft. Who controls now the content of your draft?
That said, if the security is just about sending certain attached documents (and as such having clear message boundaries, the mail body is then just a separate document but conceptually not "email" anymore!) the system could become way more simple: the attached document or its keys will be stored externally and needing online verification to open. In combination with watermarking some authentication of that document might be possible since copy/past and taking picture or screenshots won't get the watermark or other embedded keys out. Which is a more interesting and common concern than any authorization to read it, at least to the general user.
Of course there are already many systems like that. Generally sensitive documents are not transmitted "as is" over the public network anyway or with raising awareness people will eventually stop doing that at least. The risk of sending it to the wrong people by mistake is itself already way higher and happening way more often than any snooping and hacking.
Just making things difficult is not solving it
All I read is "we're going to make email way more difficult for ordinary users". As such, this will remain a niche product, by design! Not sure if the creators realize it though. A company really shouldn't be the one to supply these features which just seem bolted onto a limiting infrastructure. It should be added to mail protocols and gateways (like X400 implementations attempted). Managing and using those was already difficult for the relatively more computer savvy email users in the 90's. It's not going to be easier now.
And yes, it's waiting for the external plug-ins to backup these sensitive mails before they expire or get revoked by a compromised account. A product like this cannot control all the layers and applications and they should not even try as security becomes quickly obscurity that way.
Better communication next time, Linus! (again)
And all that because Mr Torvalds did not deny clearly enough having added NSA back-doors when asked about it. Now the Chinese want their own opportunity to say one thing and move their head not accordingly.
Mission and craft is ESA, not NASA...
It would have helped to mention in the article that the mission and the probe is really only ESA's: paid by, designed by, launched by and operated by.....However NASA does provide support to various degrees for a couple of instruments and covers a part of the deep space tracking network. Instrument scientists at both organization might be anxious but it pales by the stakes ESA has in the functioning of the spacecraft and probe itself.
Send a reporter to the live event this Monday!
The LRAC of ownership including electricity, maintenance and administration of the park might outweigh the harvest. Even if not, as another poster already wrote, supplying the gear is the more reliable and stable market. And a business has to think a few years ahead, usually, depending on how the initial costs were being paid for (eg investors).
Re: Technical/Numerical question
MAC is not used any more as correct term but EUI-48 would run out probably somewhere this century but the latest EUI-64 not likely (see also IPv6). And it's not just for Ethernet but for identification (not authentication) of equipment or as part of some protocol in general.
- JLaw, Kate Upton exposed in celeb nude pics hack
- Google flushes out users of old browsers by serving up CLUNKY, AGED version of search
- GCHQ protesters stick it to British spooks ... by drinking urine
- China: You, Microsoft. Office-Windows 'compatibility'. You have 20 days to explain
- Something for the Weekend, Sir? If you think 3D printing is just firing blanks, just you wait