It would be plain rude to call him Mister Spock unless ...
... he was a surgeon?
1556 posts • joined 14 Nov 2007
... he was a surgeon?
In order to get anything done at all (I work from home and have a landline telephone number ending 00xx, so it's early on in the robodial lists for this area) I have an answering machine silently answer all my calls. Messages are off but the announcement informs callers of the VIP code, which will actually cause the phone to ring; not before it tells them it is for the exclusive use of colleagues, friends and family -- and threatens other users with prosecution under the Computer Misuse Act if they proceed (one great thing about the CMA, you can give prosecute unauthorized users even if they know the password).
The machine has paid for itself many times over, fielding around 20-30 calls per working day.
Oh I'm such an idiot; Muphry's Law again --- 1TB is exactly 1012 bytes
"Anyone who does the former [1TB = 1,000,000,000 bytes] should be fired..."
So, that'll be all the official standards bodies? RAM, being addressed in binary, traditionally got expressed using binary k, and disk, not being, traditionally got expressed in decimal k.
Now the official definition is 1TB = 1,000,000,000 bytes and 1TiB = 1,099,511,627,776 bytes. Of course, if someone uses MB, TB etc. to refer to RAM it's safe to assume they're talking MiB and TiB. But otherwise, I'm afraid 1TB really is exactly 109 bytes.
Human genome is about 3 Giga bases - four possible values for a base (A,C,G,T) so that's about 6 Gigabits without compression. Amusingly, that's about the same capacity as a CD! I'd expect an 8TB disk to hold the genome of at least 10,000 people - maybe 100,000 or a million with clever compression.
... a reset switch. Eventually I put a push-to-break in the USB power cable, ugly but functional.
The Vagenda isn't man-hating - it's one of the reasons I love it. It's acerbic sometimes, funny and generally inclusive. Even this quote isn't from one of the authors - it's a quote from her (male) friend, whilst the article in which it appears "Running with Wolf Whistles" is actually very positive about the men the author has encountered whilst pounding the pavement.
... my favourite feminist blog, contained this pearl recently:
"if IT engineers had to do their work in the middle of the pavement, where we could all see their screens and hear their conversations, we’d quickly stop thinking of builders as the worst misogynists in the village"
Whenever I have visited, I have been amazed how weak most USians drink their coffee - mainly because they are always going on about how they like it strong and black. Back when I was an academic, we had a visiting US professor who, arriving and complaining of jet lag, asked for "a really strong black coffee". My fellow post-doc, a coffee aficionado even amongst his own Portuguese compatriots, took him at his word and cooked up a 1oz espresso in a mini-bialetti on the lab hotplate.
I will never forget that prof's face as he took a sip! He asked if it could be put in a mug of boiling water and, once it was, he expressed enormous satisfaction with it, and said he had learned a valuable lesson about European coffee!
... if you want less acidity, maybe stay away from the acid coffees (good Kenya AA is so acid it usually curdles any milk added). My personal pref is espresso, I have a bodge-repaired, 14 year old Gaggia that has made >=4 cups a day.
One little hint I found useful for Cona and filter coffee that is standing around - shove a cardamom pod in the filter basket. Gives a nice fragrance and seems to counteract the staling effect. Particularly good for a big after dinner (especially curry!) pot that will be drunk during hours of pointless postprandial persiflage.
They've quietly changed it.
It's called the Goondas Act to reflect its authorship, rather than its intent.
... drivers of more expensive cars tend to be in a higher income bracket than those who drive similarly functional vehicles with a less premium brand. Puzzling.
So you need to
go contracting put infrequently used / low user count windows-only software on a few VMs or specific servers, and let the users who use it connect via RDP. You don't need a whole new ecosystem for a small number of use cases.
... whether this is serious or not
Why not just have this list as part of your complexity rules. In addition to your complexity rules, why not just have a list of (hashes of) forbidden passwords? I reckon the best possible strategy is to allow users to choose anything but to regularly run password crackers on your own user database. Anyone whose password is cracked has to change it.
Well, I upvoted. And I've also added DrXym to my "NEVER DOWNVOTE" list.
d3rrial: "why not use "considerdollarbaseready fARSEbook" as password directly instead of hashing it first? It's not like you're adding anything to the password, that would make it safer, by hashing it"
Theoretically, of course, you are right. Practically, however:
AC: "I thought TrueCrypt was recently busted wide open?"
It's not quite as simple as that; version 7.1a might be fine :-)
I wouldn't trust a third party with my passwords, but I hadn't even considered availability!
I'm sure there's more elegant ways of doing it, but you could reuse a reasonably secure but memorable password with a memorable nickname for the site you need it for, e.g.:
echo -n 'considerdollarbaseready fARSEbook' | sha256sum - | base64 | cut -c -24 | head -1
As long as you have a shell and some standard utils, you can reconstruct the password.
... until these type of IoT devices start shipping with their own SIM cards :-(
"addresses need to be assigned to physical locations, and even mobile phones need to talk to towers, metadata can be gathered, stored, and analysed, if deemed necessary. This is surveillance, and encryption will not help against it." --- TFM Reader.
Encryption can help against it, for instance, I can post the following AES256 encrypted text here:
Quite a few people are going to see that, but only the people who know the password are going to be able to read it. So the mechanics of using encryption to obscure metadata can be relatively simple: you can broadcast encrypted messages to a wide group of people including your receiver, but in a form that only they will understand (numbers stations seem to have been doing this for decades).
Of course, the legality of it is something else. In the UK, as I understand it, having this message in your browser cache, and being unable to produce the key when asked, could result in you receiving an effectively infinite prison sentence, served out in 2 year chunks. In the short term, I can spare you this ("password") but in the longer term that legislation needs to be removed. That gets us back to the real problem - how to get people engaged.
+ space elevator so we can get all that stuff up out of the gravity well ...
John 110>> I also have to confess an sneaky liking for MacDonald's coffee
It's certainly hard to beat for the price. I set up all day in a local MacD once - they arranged a power socket for me and provided waiter service. When I gave them a tip they put it in the charity box!
... a high-tech job blow.
I agree. I think the privacy people would be happier if they had a better understanding of the process - unlike with the NSA dragnet, this is not about permanent records being kept forever, or your email / cloud storage being scanned for anything and everything. It's a simple pattern search for known illegal content, followed by the appropriate actions being taken for a positive match
We really do need pro-privacy organisations, but - or rather therefore - they must be very careful not to put themselves in a position where they look like they are protecting criminals.
Article explains that she said yes straight away, and tracked her response later as a formality...
At dinner that evening, he confessed that he had taken the afternoon off work and gone for a bike ride without her. He then shared the link to the Endomondo workout and asked her to look at it on her phone. She looked at her screen, immediately saw the message and after getting over the surprise, gave him her answer…”of course!”
For the record, she tracked her response later on too: [map deleted]
"This behaviour is tolerated because most technical managers aren't sufficiently technical that I'd let them program my TiVo."
Indeed - the problem is that, however much we like to think it, IT isn't generally a profession - it's a job. You can't practice law, medicine, accountancy or electrical contracting without appropriate qualification / certification. Surely it's about time that people developing (and I include their managers) internet-facing systems which contain personal data are properly regulated.
The other problem is that if you believe you are within your rights to refuse to pay, they won't take you to court where you can make a case and perhaps defeat them, but hand it direct to debt collectors, who will harass you and record bogus info on your credit record, making your life hell.
It seems to me just like extortion, "if you don't pay this money now [...]it could make it impossible for you to ever get a mortgage".
disappointing (adj). utterly negligent, but within the remit of the Data Protection Commissioner, and as a result considered harmless, despite any indications to the contrary.
These disasters, and I am not over-exaggerating, are *always* the result of poor management choices - not enough spent on devs, pen testers, QA etc. because they can simply totally disrespect their customers and get off scot free.
It is not "disappointing" it is fscking well bordering on criminal levels of misfeasance.
>> I always move the Taskbar to the side on widescreens
Me too - you can also make it fairly wide without losing usable space, meaning that you can actually see enough of the window titles to know what each taskbar button is. Useful if you have more than 1 window of the same type (RDP, MS-Word, etc) open.
We use cheques moderately often. You can give them to kids for birthdays and xmas, especially if you're posting. You can give them to the farrier, the (equine) dentist, the (equine) back expert and the yard manager. I'm guessing it's about amounts - a tradesman who's going to bill between a few hundred and a grand a day probably doesn't want that knocking around in his van/home all week.
In fact, I don't even like having 100 on me in cash, and none of the aforementioned people are set up to take card payments, so it's often the best option. Not to mention the fact you can always say "I don't suppose you could hold that and cash it next week?"
I still have that situation: my work phone, on the No-2 Notwork, will ring whilst I am at my SOHO desk, but to get satisfactory call quality I have to run upstairs to the bedroom to answer it.
Result: being rather to the left on the fat--fit spectrum, when I'm working at home, I'm always out of breath when I answer my phone. Then they ask me to look at a mail they've sent me and I say "oh, my laptop's downstairs, let me run down and get it ..."
I wonder what my clients / colleagues / boss must think.
. . . John
thank you very much, this is certainly food for thought.
I keep reading that it is unlikely a rebel group could have used this system to brink down MH17 without 'expert help' - presumably the Russians,
Now, I have no idea, but is this true? My military expertise is limited to taking out a few tanks with a Javelin on CoD4, so I have no idea. Are Javelins really that easy to use? Although I would think not, I am tempted to assume that many of these weapons are as easy to use as possible - no time to RTFM in a war. And I generally think that the complexity of a system does not always make it harder to use, often the reverse, because the whole purpose of the complexity in some cases is to assist the human operator.
Can anyone enlighten me? Or amusingly ridicule my naivety in the comments? Thanks in advance.
... I suffered with some back pain - clearly not anything like as bad as some of the unfortunate commentards above - and found only one thing that helped me (which may, of course, be a placebo):
an inversion table. Got it in ASDA for 50 smackers. Looks like a bit of bondage equipment (in fact my wife humiliated me and amused the entire aisle by loudly announcing "Honey, we aren't going to be using that for what you think we're going to be using it for").
Adjust to fit your height, step on (you might need an attractive assistant to start with), fasten your ankles in and rotate. You can start off just very slightly past horizontal and build up to hanging fully from your ankles if you want to go all the way (only a minute or so). I used to get off feeling an inch taller and suddenly pain free, as if it had just been switched off. And I say used to, because now I don't use it at all, as I no longer feel the need.
Ridiculous argument. When you spot a pickpocket, you know you've witnessed a crime. When you spot someone reading El Reg on a tablet, you don't know that you have. Although I'm almost sure there will be some legislation along shortly to correct that ...
I don't buy your defence. Surely if the police are to be allowed the authority to send out letters about WiFi hotspots they should have someone who is either
a) aware of the FON service
b) aware of the Google service.
I see so many instances of failure of (b) - people stuck at the unconscious incompetence state of knowledge - they know so little that they little know how little they know. Recent example: an MP's claim that the "writing is too small" in Office 365.
As it is, without a clarification about the FON service, the letter is misleading and a waste of public money - now THAT should be an offence.
"I went outside once. The graphics were awesome but the gameplay was terrible"
Signs like "M1 closed after A456"
I know the junction I'm getting off at; I know roughly how far away that is; I do not have an encyclopedic knowledge of all British Roads. The only way I'd know anything about the A456 is possibly if it was the road I was taking at the junction I was coming off at.
So "M1 closed in xx miles" or "M1 closed after Jxx" please.
>> So with encrypted traffic either party can decrypt it, or its no good.
Not sure you meant to put that ... only the receiver has to be able to decrypt it. If they find a mail from me to you in my "SENT" folder and the content is encrypted with your public key (and I wasn't dumb enough to keep the plaintext), the only record of the content retrievable without the private key is what I (claim to) remember sending you.
>>Bear in mind this is a US study. US cars are mostly automatic and therefore easier to drive.
... and a lot of their lanes are two cars wide! Should have seen the face of a US colleague when I was driving him down a country lane and a car came the other way. "What?" he shouted, "this is a one way road!" I assured him it wasn't but he really couldn't understand how a road only wide enough for one vehicle could have two-way traffic.
>>Targeting it so it goes right down the pipe is likely to be pretty tricky however.
Probably have to turn off the targeting computer on final approach.
... what he actually* said was "Good luck, Mr Gorsky".
* FSVO actually
Actually, it is sheer stupidity to use nickel in an item that is going to be in prolonged skin contact; jewelers have known this for years. Remember, we're talking premium product here, so there's no excuse.
As for the negativity, there was barely a mention of what happened at WWDC because it was extremely boring - if you think there was 'genuinely interesting tech news' at this conference, please - just tell me what it was, because I must have slipped into a coma during all the self-congratulatory emptiness.
... sounds more like sexual assault to me.
I've heard of a businesses in a local industrial park using a microwave link to the home of a conveniently located employee to get round BT's apparent habit of holding SMBs to ransom regarding connectivity. Not sure how that plays with the Ts&Cs but it does look like there's a bit of mickey taking going on, so I can't blame them.