In other words all the small startups and split-offs from larger university-type organisations research groups. I'm seeing a bit of a trend in these past few weeks data theft articles.
18 posts • joined 12 Nov 2007
"As someone a bit dumb but interested, would this be possible if HTTP2 was being used?"
Yes it would still be possible. HTTP/2 only changes the wire format of the HTTP layer messages and makes TLSv1.2 the minimal version. The SSL/TLS encryption protocol is where the attack is happening. They can use all the trusted CA trickery to intercept connections of any type (email, ssh, even VPN, ... whatever uses SSL/TLS). The downgrade to SSLv2/v3 on the server connection would not be possible in HTTP/2, but that is not a necessary part of the hijack anyway.
Re: Don't do it, Torvalds.
"Care to explain how 3.0 was a major shift from later 2.6?"
Rumour has it 3.0 was in part a celebration of getting rid of The Big Kernel Lock. That make true multi-core support a reality.
Re: Whose modems were they anyway
The NZ consumer market suffered for many years from a bit of a monopoly ("absence of competition"?) on low-cost device types being sold which would also connect to the certain major ISP without something approximating sysadmin skills. ISP provided ones were from the same range of vendors.
Those of us clueful enough to buy quality rather than cheap hardware tend to prefer other ISP services as well. So most of the populace served by said ISP has a range of crap hardware even today.
You had clay? stones the way to go my friend. Solid dependable long term record storage. Costs a lot in balloons to get it to the clouds though.
Re: Google generic term...
Despite common mis-perception "Spam" and "spam" is not a Hormel trademark.
"SPAM" all upper case is the trademark.
Unlike some other big corporates Hormel are kind enough to understand their own chosen trademark and extend leeway to persons in the anti-spam area who are careful to use the non-trademark variants correctly and without profiting from the term.
They *do* actively enforce the trademark however. Try to label everything in CAPS and you are violating their trademark. Do so while operating a money-making operation and can expect to receive a legal complaint.
So several browsers completely ignore privacy protection when strange input is received.... and somehow google is to blame? how many sites have been doing this maliciously already?
Come on, put the blame where its deserved. Security is useless when the default behaviour is to bypass that security at the slightest sign of trouble.
Yes exactly so. Its pure and simple outsourcing of analytics tasks to Google.
"Duct blockages" causing delays?
would that be another name for "we found a tree growing through the cables", or as the calldesk knows it "I cant connect" ??
FAIL. Because blockages, floods, and various state of animal matter in ducts are no excuse for being surprised.
Don't you just hate it...
when the trolls and fanbois put up the difficulty of learning Windows as a selling point for keeping it?
"people still struggle with Windows after using it for 15 years." ... so use an OS where the GUI is tunable to match the users way of thinking instead of twisting the users thoughts to fit a pre-set designers view of the world.
Once they get over the "Excel is not the only spreadsheet in existence" problem users find almost all other OS easier to understand than Windows.
You could try and get WIA to send that "expert" to TechEd this year. They have already announced that it will be a IPv6-only network at the conference *because they could not get any IPv4 allocation*.
IPv4 connectivity? please hand over $XXX to the local residential ISP for a cellphone and do it yourself.
"giving poor advice that can lead to their customers having their bank accounts hijacked."
"giving poor advice that WILL lead to their customers having their bank accounts hijacked."
The chatter problem (as described by a cellular engineer to me) is that the networks moving to LTE use IPv6 on top of legacy protocols. From the IP-layer point of view (HTTP and others) the network is always connected. The signal layers under IP have far too many wrapper layers each doing their own setup and teardowns. Sometimes on a per-packet basis. Sometimes on timeouts regardless of what usage is still going through. This results in a HUGE amount of sub-chatter even halfway through a regular TCP link for any network which has not transitioned properly or completely.
Websites seem to also have this fascination with hundreds of requests per page (forced to not cache and forced to close immediately) and you start to see why people are starting to really hate them.
Dust bunnies are not all bad....
I upgraded from hand-vacuum to a full hoover in 2004 after opening an old third-hand IBM box that had been through two house fires and five years of garage duty. The machine (barely) worked before the cleanup and not afterwards. I think the desert spoon required to dig ash out around the RAM boards did some damage. In retrospect I think the prior buildup of dustbunnies died as unsung heroes in the fires, protecting the PC from meltdown.
@reg: no I don't quite believe the last two.
* Fitting packets through small gaps is a student pasttime, but fitting a dell mouse in there as well is a bit beyond them.
* Have seen real mice-kebabs coming out of power supplies and those two were suspiciously missing a whole lot of exterior charcoal.
Of course it is.
... and xmail is short for ex-mail ...
Not surprising to see...
... that in all countries where IE is not forced on people, windows has a lesser rate of infection :)
Mind you, removal tool will not let itself be run on pirated versions of windows. So there are a whole lot of installs stuffed to the brim with evil in the Asia-pacific area.
Grenade. because there is no ticking bomb icon.
.. reminded of the ancient movie Rocket Pants?
The one that shall not be named? because she was also made of hollywood-grade bio-plastics.
hey Morely, long time no see.
And quite a coincidence. We both got the same user rating.
I wonder why ;-)