I used to use pidgin and it worked well. But my (few) mates all deserted MSN and Yahoo to FB, so I just ignore it now.
2674 posts • joined 15 Mar 2007
I used to use pidgin and it worked well. But my (few) mates all deserted MSN and Yahoo to FB, so I just ignore it now.
The real question is why 4k BD has been delayed so much.
Is it a case of continued arguments about intrusive DRM schemes? Ones that demand an internet link to spy on you reporting every disk you play, etc?
I shudder to think of what the results of playing some "speciality" video will be with the Ambilux image-related back lighting.
Then a jump to your right,
Its the pelvic frust
That really drive you insa-a-a--nne!
Where as allowing it to remain legal makes it stop quicker?
Will professor Quatermass be keeping an eye on the whisky specialists who tried this just to see if they mutate in to hideous blobs of alien material?
I also like Tim's articles, even though I often disagree with some of his positions on free markets, etc.
Same with several other who write for El Reg, mostly they write sense, sometimes they fit my socio-economic views, other times they don't. But I'm not here to have my views confirmed, I want to see other arguments as I might be wrong or ill-informed and only by listening and thinking will anyone advance.
The only place where 1024 makes sense for defining 'kilo' is when the attribute is addressed by a binary array. So really only RAM/EPROM/etc with an integer number of address lines are used and no sane designer would leave part of a decoder to unassigned storage.
For everything else k = 1000 is the sane choice for us creatures with 10 digits that originally assisted our counting and became the basis of our number representation. It is used for kilometres, kilograms, kilobits, kilowrists, etc.
The weasel-worded aspect is when talking about storage and some assume that k/M/G/T are all 1024 and forget that for both SI and marketing reasons they will be 1000. Oh, and not to forget the overheads in a file system...
Yes, but in which orifice?
You never know if a UPS/backup generator/etc system will work until the mains goes off. But no one will take the risk of pulling the big red leaver at the master distribution panel just to find out...
 We really did have one of those, with a telescoping handle for a 400A 3-phase switch for our lab. There were also a few big switches for long-gone stuff with simple but intriguing labels such as "magnet" that always made me want to power the circuit up just to see what would happen. Alas, common sense meant I resisted the temptation to "do an Igor".
How does restrictive licensing make more money?
I am perfectly serious in this question. If you can't *buy* access to Estonian films in the UK even though a number of folk in the UK (Estonian or otherwise) who want to see it, how do they earn more than if they do offer it for sale?
"The US has publicly accused Beijing of funding hacking teams to steal intellectual property from American companies"
Of course that is a bad thing, the proper way is for US companies to give it all over to Chinese joint ventures in return for cheaper labour than keeping stuff in the USA. All about who profits...
Always assume the enemy is already inside your network, as that sound of someone knocking at your door could be from either side...
By the way, when did you last patch or audit to code for that network printer of yours?
Chances are a fresh install of Win7 would fix things. Though I have no interest in Win10 for various reasons (e.g. I like my privacy and for the machine to do what I tell it), I know at least one person who did the "upgrade" on her Win7 laptop and is very happy with its performance.
But why not try one of the Linux distros on a USB stick? You might find you like it enough to change. Even if you do depend on Windows for some programs, making a clean Win7 VM without AV crap, etc, and only installing the stuff you really need is a way to get the best of both worlds.
My hovercraft is full of eels.
No, I will not buy this tobacconist, it is scratched!
"Why is Homeland Security investigating male prostitution? Isn't counter-terrorism enough for them?"
Probably they found there are virtually no terrorists to arrest, but plenty of folk whoring themselves shamelessly to America's serious disadvantage.
But they were told they could not arrest congress, so had to make do with stitching up a rent-boy site instead.
Wait! How can a politician or church leader possibly allow consenting adults to indulge in perfectly legal activities for money?
Most people will not get the torrent and try to load it in to a database themselves. They will go to one of many scam sites set up to offer such a service and you can bet your bottom dollar that most of them are in it for the money (yours) by any means possible.
The article is really aimed at the unwashed masses using partially patched Windows boxes with Flash installed on auto-play, not El Reg readers who are likely to have somewhat hardened machines.
"Pregnancy" covers the whole process through childbirth and possible complications, and a few women find they don't like/want sex afterwards.
If you read the article again you will notice the main moral point was for consenting couples who wish to stay together for any of various reasons, but are not having sex for whatever reason(s) and one of them still wants to.
Will be interesting to see what it turns out to be.
With a lot of "mathematically proven" systems you end up moving the problems/bugs from the implementation process to the initial specifications, which are often not 100% complete nor correct for anything of reasonable complexity.
When I arranged a company credit card the bank's guidance was to set the limit at 1.5 times the persons monthly salary, unless it was used for something specific (e.g. a card for purchasing equipment without setting up trade accounts, etc) or their job had the expectation of unusually high expenses from frequent travel/hotels/etc.
$1M? Pah chicken feed!
If you are a proper exec you buy some company for $11B and when it turns out to be as stupid as most folk though, you blame it on the seller (and not, strangely, on the auditors) and try and sue them.
That, my girl, is how you win a pissing contest!
Yup, and just look at all those folk returning their iPads and Android tablets because they don't run windows stuff...
I think most Linux users have no problem with making an Amazon search available, nor with the concept of a Linux distro making money. What pissed them off was having it slipped in to the desktop search which very likely would be used for private matters.
Again an example of arrogance (as one must assume Mark S is not stupid to have got so far), and it could have all been avoided by simply having two search buttons "local" for your own file system, and "everywhere" for Internet + local files.
A simple concept, you have things with recognisable names such as "start", "file", "edit" etc for menus and buttons and folk can guess what they do and see where to find them. Works well.
Now look at the efforts of today's GUI muppets who hide thing behind bizarre icons or simply remove them altogether and folk get pissed off. Where are settings, and why is a cog-thing where you would expect to see them? They are not gears after all. Or is it some sort of burger icon, or maybe some dots for no bloody good reason. Left hand or right? Looking at you Chrome, Android and Firefox.
Then we have Win8 where you have to somehow know to swipe from some obscure corner to find something, and by touching the touchpad by accident in some equally obscure way you get the metro stuff thrown in your face. Fine for kids and some geek folk who are happy just to slap things around until something happens, but have you tried to help or support an OAP with this shit?
Yes, I know about the Windows key and search, but again for a lot of computer users they don't know the names of stuff, but are able to recognise them in a familiar menu location.
Oh and the same dumb-ass approach is what made Gnome 3 a whole lot shittier than Gnome 2. The whole "we know better than our users and their 20 years of experience" ideology so lets bugger around for no good reason.
While everyone can see that Russia is hardly a bastion of freedom or protecting citizens from spying, it would be good if a few big enough countries kicked MS so hard in the privates that they were forced to make Win10 defaulting out of all spying.
Then users would have to bend over and lub themselves, rather then find the new trousers come with a convenient hole and pre-lubed for MS' convenience.
For a lot of folk they only have one or two Windows-only programs, and also a lot of them don't need internet access (and a few have it only for DRM reasons occasionally). In those cases you can often put them in a XP VM or a Win7 VM and it works just fine, with the bonus that you can disable external networking to enhance the security (e.g. if you accidentally open an infected Word document it can't phone home), and only give the VM access to a restricted area of your Linux host's file system.
Of course it is no excuse for not being careful, running some sort of AV on the host (to be honest, they all seem to suck and be ineffective), and having a proper off-line backup in case of cryptolocker style malware.
It is a bit tasteless to remind us of the many talents of Mr Almond.
Still, if win10 is a taste of things to come from MS I will sit among the penguins (where no man is an island, unless he is called Madagascar) and laugh. That is, unless me and my brother Kyle lose the rock-off, in which case I might be gargling mayonnaise till the end of time and the pros and cons of
hitch-hiking operating systems will be of little concern.
"Why the fuck should IT departments be running filters?"
To reduce the exposure to phising and drive-by attacks, to limit the possibility of data egress from Trojans, etc, going unnoticed, to limit the bandwidth socked up by advertisements, etc. There are a lot of good reasons to filter things for business use.
As pointed out by the A/C above this could be a largely self-policing activity where users can unblock a web site using an internal web page, were hopefully it shows the real source site and they then enter ID/2nd password to have it added to the white list.
Also the A/C addressed the personal use aspect by having either the odd PC outside of the company internal LAN, or maybe by offering a 'guest' WiFi without filters for phones, tablets, etc, so folk can do stuff outside of the business without putting the internal network at risk.
Block lists seem a pointless arms race. If you have a work situation that needs protection, why not a white list?
OK it is some work for a junior admin, but folk can put in requests for sites they NEED to use for work, and then they get added after a cursory check. You could start with the obvious ones related to type of work, wikipedia, few moderately trustworthy news sites, etc, and just see what folk are using and why. While it sounds restrictive, it would kill dead most phising sites and malware C&C servers.
We, collectively, are the reason for this because we are happy to accept shitty software because it is shiny and new (e.g. Android) or the established model (e.g. Windows) and we want everything Internet-connected for convenience and to save a little money on not having to make trips to physically visit important sites.
While some nation state attacks have shown the ability to jump air-gaps using infected USB sticks, etc, the vast majority rely on the simple fact that we put critical stuff on the same machines and networks as we use for external access (web, email) and then get surprised when we find our OS, software and firmware in routers, etc, is full of holes that let the two leak.
Convenience trumps security, and so far we have not had anything big enough go wrong for the law to come down and enforce stricter practice.
...even delete the kernel accidentally...
I once tried to deleted everything on a running machine just to see what would happen. It was about to be re-installed, I'm not quite that insane! Yet.
All gone, only a couple of in-use directors left on the HDD when I booted the live CD to install the new distro. I was impressed, it did just what it said it would, including rm rm'ing itself.
I set up Ubuntu for my pensioner-age father. He is not quite a technophobe as he will try stuff, but his knowledge of computers is practically non-existent. So far its been over 5 years of minimal trouble, no viruses, and the previous XP set-up was cleaned and put in a VM so he can run some flaky genealogy package.
So Linux can be viable for a lot of the population with minimal training, but how likely we are to see it come pre-installed and sanely configured on PCs is another matter.
That was my question, just WTF is an "unauthorised peripheral" here?
Could a chipped ink cartridge be counted so you can re-fill/recycle it against the printer company's policy? Maybe some audio card that won't play ball with the DRM-of-the day?
For the few things I do that need Windows, it looks as if XP and 7 VMs are going to be my final solution.
All of this kind of misses the point - in the event of a pedestrian/child/etc stepping in front of the car it will almost certainly out-break a human and probably not swerve if that endangers other on-coming traffic. So far so good, and +1 for the driverless car.
The bigger problem for automated cars is anticipating what a child/pedestrian might do. Now a lot of drivers don't really pay enough attention, and I'm as guilty as others, but often you see something like a drunk, or a child chasing a ball down the pavement, that rings alarm bells in your head and you slow down just in case and are primed for an emergency. Getting that automated will be far trickier than the Newtonian motion of driving.
Also going back to Tim's article, I really wonder if mapping the roads in minute detail and assuming connections to this vast database is a viable (or very valuable) option. How will it deal with downed trees, flash floods, other drivers, communication problems in rural areas, etc? A proper driverless car has to be fully autonomous and to react sensibly to what it finds, when it finds it. Sure knowing there is a crash or delay up ahead will make things a bit better, but whatever the unexpected situation turns out to be, the car MUST react at least as well as as the average human to be acceptable.
Most likely on the pylons that feed it. Typically they are the highest thing around even on plains and if you have a big storm you can get several bolts all in a few km region. Even though it is more common to hit the pylon than cable, you are still talking about serious levels of induced surges and possible disconnected by circuit breakers as a result.
While I think IE6, etc, were abominations at least MS is trying to do the right thing and get rid of some of the legacy crap. OK, that causes problems for some who drank the MS kool-aid all those years ago, but time move on and hopefully MS do.
But no, I don't think the W10 grab of your privates is OK...
Makes sense really. If you strip away any specific aspect of USAF, etc, it comes down to the basic "don't be an arse on-line" advice:
Think before you post.
Post only what is really needed.
Avoid sharing stuff with world+dog where it could come back to bite you and/or loved ones.
Do as I do, run your Windows-only software in a VM and the rest on the Linux host. I also have CAD software that is Windows-only but with the appropriate configuration you can use dongles on the parallel port, etc, from a VM.
"People may be a bit too squishy for the acceleration of a railgun"
It depends on what acceleration you are looking for.
I hope some commentards will check, but I figure that if you had a 2km rail gun on some suitable mountain and were running at 3g sustained acceleration your meat-sacks would survive fine and you would be doing about Mach 1 at the exit point where (hopefully!) the chemical rockets take over 11 seconds or so in to the whole process.
Also I was thinking of a mag-lav rail and electrically powered linear motor, not a "supergun" and explosive charge.
I don't know of any supportive masterminds with volcanic lairs, but one idea that would also help a bit is a massive mountain-side rail-gun style to allow a proportion of the launch momentum to be delivered from ground-based power. Basically you get your main engine & propellent up to say Mach 1 before it even has to burn.
It all comes down to getting more thrust from your fuel. Unlikely, except for a reactor heating the propellent and getting THAT cleared for use is not going to be trivial, and we won't even touch on Project Orion.
Otherwise getting less launch weight and not having to carry the oxidiser (as in Skylon) or by having some ground based propulsion to get you started and a little of the way out of our gravity well.
Sorry to have to point it out but a bloody great firework is the only system we have that actually works. Most of the likely (and some amazingly unlikely and down right stupid) fuels have been trialled and the ones remaining (typically kerosene & LOX or LH2 & LOX) are the ones that combine enough specific impulse and scale to get off the ground, while not poisoning us or dissolving the engine.
If, and it is still a big 'if', we see EM drives working it will be a very low force, otherwise we would have seen it before in experiments as a non-trivial effect. So at best an EM drive will be good once you are leaving the Earth's atmosphere and can get low accelerations for months/years based on solar or nuclear generated electrical power.
Edited to add: Yes, the Skylon project is really interesting as you could save a lot of the LOX weight by burning atmospheric O2 up to a decent altitude.
You can get routers that will fall-back to 3G dongles, etc, for business redundancy (e.g. several of the DrayTek models) so if you are really worries you should consider that. And also having images backed up to an external NAS/cloud in case the thief has the sense to nick the recorder as well. And proper alarms will also check the line is not dead for just that reason.
What I don't understand is how it is possible to misidentify a proper Windows system file. Surely MS can provide something like SAH256 hash values of every legitimate build they have released in the last decade or so?
So what is going wrong, don't the AV firms check?
Here are some stats:
"6,050 cases filed since January 2009 ... only 137 cases went to court in the period, with 126 concluded via default judgment, 10 via consent judgment and just a single case settled via full trial"
I am not a lawyer, so if you are threatened then look around and get support as there are a few organisations that have sprung up to fight this sort of extortion racket.
In most cases that trolls have 'won' it was because the defendant did not turn up at court to defend their side and so a summary judgement was made in favour of the troll. That is very different from the court deciding that the trolls' arguments are strong enough, but trolls tend not to point that out for some funny reason...
The first point, and most important, is that an IP address is not a personal identifier.
At most (and assuming the IP address was correctly recorded and time-stamped and correlated with your ISP's DHCP server) it tells them that someone using "your" connection (assuming you are the bill payer, most likely to get the letter) was attached to the bit torrent swarm.
Most countries do not make the bill payer responsible for other using the connection unless they have actual knowledge of misuse. A bit like you can't be prosecuted for your car being stolen and used in a bank robbery, but you can if you offered it knowing it would be used in such a crime.
These days most folk share there wifi password with anyone visiting their home, neighbours that have faults and need to get on-line, etc, as they have no reason to suspect criminal intent. In addition numerous routers have piss-poor security anyway and I believe Windows 10 is also going to make wifi sharing more common among acquaintances as well.
So basically unless you confess to it they have little case, the only real risk is they try and get a seizure of your PC to get it forensically analysed to prove the alleged copyright material was on a PC directly controlled by you. Possible, but a major cost to them and most of these trolling firms want a cheap settlement hence the threatening letters.
Given the time scale between the threat letter and any possible action, it would be unfortunate for the prosecution if your machine was replaced due to age, or had a virus and was securely wiped and re-installed before it came to seizure and court proceedings, as they could have a lot of expenses to pay to you...
Ah yes, obviously posting comments using wi-fi. Much more secure.
What, you mean all that hardware does not "just work" with Windows? I thought that was what they said about Linux
"how would you feel if your son/daughter came back and reported the same thing happening to them in a public place?"
Why care if it is a public place? Maybe they should be outraged at the stupidity of Apple (or anyone else with similar tech) for not making it more secure?
Also we have the underlying point of giving kids a tool to access practically any information in the world, how about they give them a dumb phone and problem solved.