In other news ...
... drivers of more expensive cars tend to be in a higher income bracket than those who drive similarly functional vehicles with a less premium brand. Puzzling.
1595 posts • joined 14 Nov 2007
... drivers of more expensive cars tend to be in a higher income bracket than those who drive similarly functional vehicles with a less premium brand. Puzzling.
... if you want less acidity, maybe stay away from the acid coffees (good Kenya AA is so acid it usually curdles any milk added). My personal pref is espresso, I have a bodge-repaired, 14 year old Gaggia that has made >=4 cups a day.
One little hint I found useful for Cona and filter coffee that is standing around - shove a cardamom pod in the filter basket. Gives a nice fragrance and seems to counteract the staling effect. Particularly good for a big after dinner (especially curry!) pot that will be drunk during hours of pointless postprandial persiflage.
So you need to
go contracting put infrequently used / low user count windows-only software on a few VMs or specific servers, and let the users who use it connect via RDP. You don't need a whole new ecosystem for a small number of use cases.
... whether this is serious or not
Why not just have this list as part of your complexity rules. In addition to your complexity rules, why not just have a list of (hashes of) forbidden passwords? I reckon the best possible strategy is to allow users to choose anything but to regularly run password crackers on your own user database. Anyone whose password is cracked has to change it.
Well, I upvoted. And I've also added DrXym to my "NEVER DOWNVOTE" list.
d3rrial: "why not use "considerdollarbaseready fARSEbook" as password directly instead of hashing it first? It's not like you're adding anything to the password, that would make it safer, by hashing it"
Theoretically, of course, you are right. Practically, however:
AC: "I thought TrueCrypt was recently busted wide open?"
It's not quite as simple as that; version 7.1a might be fine :-)
I wouldn't trust a third party with my passwords, but I hadn't even considered availability!
I'm sure there's more elegant ways of doing it, but you could reuse a reasonably secure but memorable password with a memorable nickname for the site you need it for, e.g.:
echo -n 'considerdollarbaseready fARSEbook' | sha256sum - | base64 | cut -c -24 | head -1
As long as you have a shell and some standard utils, you can reconstruct the password.
... until these type of IoT devices start shipping with their own SIM cards :-(
"addresses need to be assigned to physical locations, and even mobile phones need to talk to towers, metadata can be gathered, stored, and analysed, if deemed necessary. This is surveillance, and encryption will not help against it." --- TFM Reader.
Encryption can help against it, for instance, I can post the following AES256 encrypted text here:
Quite a few people are going to see that, but only the people who know the password are going to be able to read it. So the mechanics of using encryption to obscure metadata can be relatively simple: you can broadcast encrypted messages to a wide group of people including your receiver, but in a form that only they will understand (numbers stations seem to have been doing this for decades).
Of course, the legality of it is something else. In the UK, as I understand it, having this message in your browser cache, and being unable to produce the key when asked, could result in you receiving an effectively infinite prison sentence, served out in 2 year chunks. In the short term, I can spare you this ("password") but in the longer term that legislation needs to be removed. That gets us back to the real problem - how to get people engaged.
+ space elevator so we can get all that stuff up out of the gravity well ...
John 110>> I also have to confess an sneaky liking for MacDonald's coffee
It's certainly hard to beat for the price. I set up all day in a local MacD once - they arranged a power socket for me and provided waiter service. When I gave them a tip they put it in the charity box!
... a high-tech job blow.
I agree. I think the privacy people would be happier if they had a better understanding of the process - unlike with the NSA dragnet, this is not about permanent records being kept forever, or your email / cloud storage being scanned for anything and everything. It's a simple pattern search for known illegal content, followed by the appropriate actions being taken for a positive match
We really do need pro-privacy organisations, but - or rather therefore - they must be very careful not to put themselves in a position where they look like they are protecting criminals.
Article explains that she said yes straight away, and tracked her response later as a formality...
At dinner that evening, he confessed that he had taken the afternoon off work and gone for a bike ride without her. He then shared the link to the Endomondo workout and asked her to look at it on her phone. She looked at her screen, immediately saw the message and after getting over the surprise, gave him her answer…”of course!”
For the record, she tracked her response later on too: [map deleted]
"This behaviour is tolerated because most technical managers aren't sufficiently technical that I'd let them program my TiVo."
Indeed - the problem is that, however much we like to think it, IT isn't generally a profession - it's a job. You can't practice law, medicine, accountancy or electrical contracting without appropriate qualification / certification. Surely it's about time that people developing (and I include their managers) internet-facing systems which contain personal data are properly regulated.
The other problem is that if you believe you are within your rights to refuse to pay, they won't take you to court where you can make a case and perhaps defeat them, but hand it direct to debt collectors, who will harass you and record bogus info on your credit record, making your life hell.
It seems to me just like extortion, "if you don't pay this money now [...]it could make it impossible for you to ever get a mortgage".
disappointing (adj). utterly negligent, but within the remit of the Data Protection Commissioner, and as a result considered harmless, despite any indications to the contrary.
These disasters, and I am not over-exaggerating, are *always* the result of poor management choices - not enough spent on devs, pen testers, QA etc. because they can simply totally disrespect their customers and get off scot free.
It is not "disappointing" it is fscking well bordering on criminal levels of misfeasance.
>> I always move the Taskbar to the side on widescreens
Me too - you can also make it fairly wide without losing usable space, meaning that you can actually see enough of the window titles to know what each taskbar button is. Useful if you have more than 1 window of the same type (RDP, MS-Word, etc) open.
We use cheques moderately often. You can give them to kids for birthdays and xmas, especially if you're posting. You can give them to the farrier, the (equine) dentist, the (equine) back expert and the yard manager. I'm guessing it's about amounts - a tradesman who's going to bill between a few hundred and a grand a day probably doesn't want that knocking around in his van/home all week.
In fact, I don't even like having 100 on me in cash, and none of the aforementioned people are set up to take card payments, so it's often the best option. Not to mention the fact you can always say "I don't suppose you could hold that and cash it next week?"
I still have that situation: my work phone, on the No-2 Notwork, will ring whilst I am at my SOHO desk, but to get satisfactory call quality I have to run upstairs to the bedroom to answer it.
Result: being rather to the left on the fat--fit spectrum, when I'm working at home, I'm always out of breath when I answer my phone. Then they ask me to look at a mail they've sent me and I say "oh, my laptop's downstairs, let me run down and get it ..."
I wonder what my clients / colleagues / boss must think.
. . . John
thank you very much, this is certainly food for thought.
I keep reading that it is unlikely a rebel group could have used this system to brink down MH17 without 'expert help' - presumably the Russians,
Now, I have no idea, but is this true? My military expertise is limited to taking out a few tanks with a Javelin on CoD4, so I have no idea. Are Javelins really that easy to use? Although I would think not, I am tempted to assume that many of these weapons are as easy to use as possible - no time to RTFM in a war. And I generally think that the complexity of a system does not always make it harder to use, often the reverse, because the whole purpose of the complexity in some cases is to assist the human operator.
Can anyone enlighten me? Or amusingly ridicule my naivety in the comments? Thanks in advance.
... I suffered with some back pain - clearly not anything like as bad as some of the unfortunate commentards above - and found only one thing that helped me (which may, of course, be a placebo):
an inversion table. Got it in ASDA for 50 smackers. Looks like a bit of bondage equipment (in fact my wife humiliated me and amused the entire aisle by loudly announcing "Honey, we aren't going to be using that for what you think we're going to be using it for").
Adjust to fit your height, step on (you might need an attractive assistant to start with), fasten your ankles in and rotate. You can start off just very slightly past horizontal and build up to hanging fully from your ankles if you want to go all the way (only a minute or so). I used to get off feeling an inch taller and suddenly pain free, as if it had just been switched off. And I say used to, because now I don't use it at all, as I no longer feel the need.
Ridiculous argument. When you spot a pickpocket, you know you've witnessed a crime. When you spot someone reading El Reg on a tablet, you don't know that you have. Although I'm almost sure there will be some legislation along shortly to correct that ...
I don't buy your defence. Surely if the police are to be allowed the authority to send out letters about WiFi hotspots they should have someone who is either
a) aware of the FON service
b) aware of the Google service.
I see so many instances of failure of (b) - people stuck at the unconscious incompetence state of knowledge - they know so little that they little know how little they know. Recent example: an MP's claim that the "writing is too small" in Office 365.
As it is, without a clarification about the FON service, the letter is misleading and a waste of public money - now THAT should be an offence.
"I went outside once. The graphics were awesome but the gameplay was terrible"
Signs like "M1 closed after A456"
I know the junction I'm getting off at; I know roughly how far away that is; I do not have an encyclopedic knowledge of all British Roads. The only way I'd know anything about the A456 is possibly if it was the road I was taking at the junction I was coming off at.
So "M1 closed in xx miles" or "M1 closed after Jxx" please.
>> So with encrypted traffic either party can decrypt it, or its no good.
Not sure you meant to put that ... only the receiver has to be able to decrypt it. If they find a mail from me to you in my "SENT" folder and the content is encrypted with your public key (and I wasn't dumb enough to keep the plaintext), the only record of the content retrievable without the private key is what I (claim to) remember sending you.
>>Bear in mind this is a US study. US cars are mostly automatic and therefore easier to drive.
... and a lot of their lanes are two cars wide! Should have seen the face of a US colleague when I was driving him down a country lane and a car came the other way. "What?" he shouted, "this is a one way road!" I assured him it wasn't but he really couldn't understand how a road only wide enough for one vehicle could have two-way traffic.
>>Targeting it so it goes right down the pipe is likely to be pretty tricky however.
Probably have to turn off the targeting computer on final approach.
... what he actually* said was "Good luck, Mr Gorsky".
* FSVO actually
Actually, it is sheer stupidity to use nickel in an item that is going to be in prolonged skin contact; jewelers have known this for years. Remember, we're talking premium product here, so there's no excuse.
As for the negativity, there was barely a mention of what happened at WWDC because it was extremely boring - if you think there was 'genuinely interesting tech news' at this conference, please - just tell me what it was, because I must have slipped into a coma during all the self-congratulatory emptiness.
... sounds more like sexual assault to me.
I've heard of a businesses in a local industrial park using a microwave link to the home of a conveniently located employee to get round BT's apparent habit of holding SMBs to ransom regarding connectivity. Not sure how that plays with the Ts&Cs but it does look like there's a bit of mickey taking going on, so I can't blame them.
Not knowing how to zoom -- a little bit shameful.
Not even suspecting that zooming is possible -- a little bit more shameful.
Speaking authoritatively as if zooming isn't possible -- breathtaking!
>>map data was built in and didn't need a data connection.
Check out OSMAnd, it's surprisingly good.
"Volumetric Displays" where a screen rotates (often illuminated by laser) already exist: I've seen one used for molecular model display. And I'm pretty sure I read about the concept last century.
I would just stop paying if I had a 10kbps connection, contract or not. If they wanted to prove that <256kb/s is 'Broadband' they'd have to get a judge to agree with them before I paid up.
... RIPA vs the claim that "it's actually a big block of random numbers that I use for statistical / mathematical / cryptographic purposes".
What if someone had downloaded the Wikileaks 'insurance' file? You don't know what's in it, and you don't have the keys - can you just prove it has the same hash as the published file? Or is it an offence just to possess it?
Yep, I had the same, rm *>o. Your file wasn't empty, it contained a newline!
>>F*ing wall to wall Big Brother, TOWIE and HoneyBollockBoo. FFS.
I appreciate the sentiment, but would advise you to look harder and record, and to use on-demand. Really I never watch live TV - it's just 700 channels of rubbish. But 10s of hours of good quality television is broadcast per week, plenty to keep you occupied: you just have to find it, and you wont find it by channel surfing the dross that is being broadcast at any particular time.
... a cheap smartphone will do the rest. My almost disposably cheap LG Optimus 3 can just about run a map app (Google or OSM offline), a radio app (Jango or TuneIn+) - or music off the SD card, a dashcam app (Autoguard BlackBox) and a wifi hotspot simultaneously. It does need a high current USB cable tho :-)
That's less than £50 for the phone, less than £20 on apps and less than £30 on mount and cable -- the dedicated hardware is increasingly unable to cut it against the vast economies of scale applicable to landfill Android.
The only thing I need to add when driving older vehicles is a cigarette lighter bluetooth receiver with a 3.5mm output which, in extremis, can be plugged into one of those fake cassette things when the car doesn't even have an audio input.
"It's actually a very good idea and something I've been looking forward to for a while."
No need to look forward to it - I've been using Tasker on Android to ensure that my screen lock is disabled whenever my phone can see my local wifi. I have no problem with the 'idea' at all, but patenting it is a problem, it isn't nearly novel or non-obvious enough.
... the research was also crap: for instance they were using automated emotion scoring of posts using tools (LIWC, I think) that are only considered reliable for longer texts.
It seems a shame to make such a massive ethical cock-up for such a weak result. Or maybe it's just karma.