Re: Communicating with the rocket via Kermit?
Damn, I forgot I was that old
1696 posts • joined 15 Mar 2007
Damn, I forgot I was that old
Try your local Tesco for burgers.
Do you have a bigger one for me?
Ah, the joys of Windows' autorun? First thing (well, almost) you should do is this:
And just go for the 0xFF hack to disable EVERYTHING that could autorun.
Still, if the cable identifies itself as something known (e.g. a mouse) then Windows will still install a driver for it without asking for your consent, and it is conceivable that a USB keyboard-like device could be used to inject commands to a system at some point. That sort of attack would also work on Linux, etc, but the attacker would have to know what system it was to successively inject badness.
Really, if they want to survive outside of the USA, and are competing with MS & Google, they need something special.
Having an open-sourced encryption layer that ensures that only those with the private password can (easily) decrypt the server-side data would be something worth having.
Yes, I know there are lots of ways to compromise that, obviously if you are using a compromised OS, but privacy by design would be a decent selling point.
AFIK the default installation will dual-boot with XP.
Only fly in that ointment is occasional rogue Windows DRM-style program that would write to the boot sector area assuming only the MBR is used and trash the grub loader. That may be fixed now (saw that 3-4 years ago).
They are also telling they are on their own if they don't switch...
It helps simply by giving those folk the idea that (A) the current XP support will end soon, and (B) they can do *something* about it for free (as in money, not in time).
The alternative is to either let them be and watch as all of those machines become infested and cause all sorts of problems to the users and local business, or to force them to pay up for new machines that will probably not run a decent portion of old stuff / old hardware, and will have the radically new TIFKAM interface in any case.
There is no simple answer to what to do if you don't have a big budget to refresh and retrain users. Trying Ubuntu (or getting the local tech person to help you try it) is way better than doing nothing.
There is an irony that Android's success comes from being cheap and "good enough" for a generation brought up with the low expectations of a (non-technical users) Windows PC's reliability and longevity. After all, that is largely how MS succeeded over other, and technically better, platforms to achieve Windows' current desktop dominance.
It will be interesting to see if MS can move away from the "Windows + Office" cash cow and deliver products that users want to have, and not to use said products to push only MS' legacy profit centres.
No one is, or should be, surprised that GCHQ/NSA/etc break codes and spy on people. That is, after all their job, and the other side (e.g. China) will do the same.
What people are, and rightly should be, upset about is the presumption that everyone is a criminal and should have all of their activity recorded, decrypted and analysed "because they can".
It goes far beyond what most folk consider is acceptable under the usual police requirement of justifiable suspicion. Add in to that the secretive and rather despotic use of orders that you can do jail time for simply revealing that you have been ordered to do something, and the apparent lack of meaningful judicial oversight or even political knowledge outside of a select few, and it is a very wrong situation for society to find itself in.
We don't need unbreakable encryption or other silver bullets, all we need is widely used non-compromised encryption that means it is not trivial to gather everything about everyone you unless you are already under suspicion, rather like the old days when an agent had to be posted to watch you and resources limited that to the "most interesting" of all.
Yes...and this business of a 'safe' limit of 10mW/cm^2 sounds a bit forgotten as I doubt an iPhone is 100cm^2 of perfect antenna and conversion electronics to get 1W.
Beat me to it. I was going to suggest a jockstrap
AFIK when the CD-ROM came out the ~650MB capacity (not writable, at that point) was way bigger than the ~20MB consumer-cost HDD of the day, but after a few years was overtaken by HDD progress.
DVDs were useful for archive for a while. At launch they were comparable to HDD size, but now 4.7GB hardly seems much at all!
And let us not forget the laser disk, not digital as such, but fantastically better then VHS at the time, and they did attempt boldly to use it as an archive store:
Or the recent cases of Visa/Mastercard refusing to deal with certain VPN suppliers. Like the ones who maybe don't play ball with the USA and/or implement more secure options than the piss-poor PPPT?
No, it is not making Huawei, etc, look much better as they are almost certainly doing the same as Cisco but for the Chinese.
What it should be doing is drawing the attention of nations to the fact that closed/secret designs are likely to have issues of trust. Or incompetence. In fact, the latter is just as big a threat to most folk.
I kind of want 4k to succeed, not because it will make much difference to me TV viewing, but maybe it will put an end to the sh*t laptop monitor resolutions we have these days.
The whole point about SElinux (or apparmor, for that matter) is to deal with the problem of internal trust between processes that run with root privileges, or (like web browser or PDF reader) are likely attack routes. That is a big problem in ANY computer system. It is open sourced, so you or anyone else can check it!
Like the fools who say AES is back-doored because the US use it, it completely misses the point. They want good security for themselves and US gov, as much as they want to break others, as they know Russia, China, etc will be doing the same in return.
"Not the *whole* concept."
No, not the certificate system at a basic level, but the fact there are so many signing authorities that are installed and trusted by default by most web browsers and their users.
There is a need to, somehow, verify that certificates for a given domain are not duplicated or otherwise certified by another issuer and that any changes are flagged and investigated.
However, this last part (which, for example, is the bit where SSH can reveal an attempted MITM attack or, more often, a re-installed server) is fundamentally broken with all non-paranoid geeks who just see a warning pop up and click "yes, whatever" to see more cat videos.
For those with a good range of metallic headgear, this should come as no big surprise. After all, few bank robberies actually break the safe door, they either get the keys (by bribery or coercion) or they go in via the walls that are weaker.
It has long been known that the whole concept of SSL is fundamentally broken: compromise any one of the ~600 issuers and you can fake a certificate for man-in-the-middle attacks, and yet no one has serious tried to fix this in spite of the occasional publicised attack.
Similarly a lot of VPNs use only PPPT as it is MS's favoured option, though known to be also fundamentally broken w.r.t MITM attacks, etc.
And with MS being on such good terms with the US gov it is hard to avoid the conclusion that they would work with three-lettered agencies to either allow direct access, or not to close useful holes unless the "bad guys" start using them. Why are the likes of skydrive (and Google's offerings) not client-side encrypted by default? Maybe laziness, maybe to help? Who knows, so adjust your hats accordingly...
None if this means that encryption is not a good way of protecting your privacy, it is. But what it means is you cannot trust most of the current players that should be delivering it to be acting in the interest of you, the customer.
On the plus side, we have a device that has a decent screen resolution at last!
On the minus side way to expensive.
I can't see CAD folk using this without a mouse and keyboard, in which case it is not really that attractive compared to a powerful desktop with 2 * 30" monitors, which is about the same price.
Remember MS are as much a part of PRISM as Google.
And the issue there is not that they were complying with court-ordered access (as in the "Nuremberg defence") , but that they went out of their way to assist in the gather of such data as part of a paid program...
Oh yes baby!
Maybe, just maybe, they could hire and empower some smart folk to properly secure their systems and BOFH-enforce good practice on their employees' use of passwords, etc, so they don't get hacked so often?
Deal with the problem (badly secured system), not the symptoms (Anonymous, etc, posting goatsee images for fun, etc).
>Did anyone really think that anonymity Tor could be guaranteed?
I suspect even for gov-level snooping (maybe less so for pan-gov like USA/UK/CAN/NZ sort of thing) and for its intended job of the occasional spy/oppressed activist message it is good enough. But not for users who route a lot of traffic through it, which is the key to this discovery.
And WTF routing bittorrent through it? Not only is that going to give your game away much more, it is a serious abuse of the network and going to be real slow. Really, such folk should be using a VPN for that sort of thing.
"downloading info on the new Sense 6.0 UI"
Strewth, as our antipodean cousins are alleged to say, why pilfer something that is hardly worth the time of day? Maybe these jokers at the top of HTC and that sense of priority partly explains why the phones have sucked for so long.
I suspect a break-up and profit maximise route will be taken.
I am not sure how to react to that as I have no love lost for MS. On the one hand, MS employees should be worried, on the other, breaking up MS in to 4 or so separate businesses could be the best thing for MS, its users, and the competition as each would have the incentive to do the best for its customers, and not to leverage sales/lock-in for any other business unit. For example:
Windows (both home & server)
IE and Office (eventually to make them properly multi-platform and totally independent of Windows)
Bing and Azure
Xbox and consumer trivia
Development & management tools for Windows.
Quite. From a national security point of view, and an audit point of view it is mind-bogglingly dumb, and something that almost defies sense. At least for el Reg readers who understand a bit about Gmail, Office365, etc, policies.
But here in the west a lot of organisations use either Gmail or Office365 as their provider, and the likes of BT outsourced to Yahoo. Us tech folk pointed out a whole host of issues, and upper management ignored them for reasons of cost and convenience (actually the "convenience" aspect is often about internal IT policy & cast as well).
And that is without having to deal with the crushing bureaucracy in India. That should not be dismissed as a racist or xenophobic comment by the way, as my Indian friends and business contacts would tell you the same :(
What, you mean that Ofcom and the telecoms industry has not organised phone numbers so the prefix can be parsed simply to tell you the cost?
I mean, what real use is an uber-secure link to a smartphone that is likely to get lost and/or otherwise compromised by being basically a consumer-grade machine with (in most cases) damn-all in the way of regular security patches?
Put it another way, how often is the maths of https broken (as opposed to some dumb certificate issue) compared to Trojans or other hacks being deployed to end user's computing devices to achieve the same thing?
So full marks for ingenuity, but I am still kind of wondering who and what this will be used for in practice.
Well played sir!
So I am guessing there is a version for fetlife that makes it more addictive?
Not just insurance, but also system support. What happens in 6 years when your Whizo Mk3 is not supported any more? Will it be a bit like aircraft (where it is illegal to use it for commercial use) and so force it to be scrapped?
Also will you have to get it serviced to aircraft-standards (and presumably cost) as so much of the system is safety-critical and you will find it illegal/uninsurable without that? Will the cars simply refuse to work if they are not up to schedule on this?
While I can see the safety benefits from eliminating morons, I can also see cars becoming a lot more expensive to maintain.
Why did I read that as "twerked by Microsoft to within an inch of her life"?
Mine is the dirty mac(OS) ->
Expensive over many years? Yes. But compare with the 1-year budgets of others for perspective:
Defence (including State, Homeland Security and Veterans Affairs) - $618 billion.
Health and Human Services - $78.3 billion.
Education - $71.2 billion.
Housing and Urban Development - $33.1 billion.
Energy - $28.4 billion.
Agriculture - $21.5 billion.
Also to add to the debate around the GPL, you do realise that you can still charge for software under the GPL?
Of course, the requirement to distribute to source code with any binary may still not work for your type of application (you have not said what that is, and posted as AC there is no obvious way to find out) but for big range of application areas where the customer is moderately trustworthy this can be an advantage in completing a sale.
"Free software cannot impose limitations on use"
I am sorry you seem to lack the ability to understand copyright laws and software licenses. Software that is "free" is released for use under the conditions expressed by the authors, which may be the GPL. They can, and do, insist that if you choose to use their code that you respect that intention.
What you do with your own code is up to you, but should you wish to use GPL code then you have to play according to the rules of those authors.
"it cannot be considered a free software license, an "ideological software license", perhaps"
Call it what you want, but it is still a license and a large number of people chose to use it. You don't have to use it, after all you could re-invent the same work on your own if you chose not to abide by the GPL.
The GPLv2 versus GPLv3 argument is a lot more complex than you seem to comprehend. One key point is v2 has allowed the likes of TiVo to use the software in hardware but to prevent the owners of the hardware from changing it due to boot loader signing, v3 was intended to address that restriction on the end user's freedom.
"Statistical anomaly. Most companies trying the "buy support, get a free application" model have gone to the wall. I addressed these outliers, do try comprehending the complete argument next time."
Can you give some examples of these failures?
Off hand I can think of some obvious success, like Redhat and IBM with support as a directly paid service, and others like Mozilla and Android that are indirectly paid via advertising revenue.
"when I write a separate library which merely makes use of a GPL library, I am forced to release my own code. *MY RIGHTS* to *MY CODE* have been removed from me due to [A]GPL infection."
No, you seem to be unable to grasp the idea that the GPL library exists only for use by those who will agree with the author's intentions.
Why complain? You are not being forced in to using other's work, you are complaining that you can't legally take short cuts to developing an application without rewarding the GPL author(s) in terms of freedom, rather than money.
Funny you should consider GPL to be "fine for hobbyists and tinkerers whose efforts will never enter mainstream professional use" when a large number of contributors to, for example the GPL'd Linux kernel, include such money-hating organisations as IBM, Intel, Oracle, Cisco, and even MS made it in to the top-20.
Oh, and Redhat's current market cap of $9.76B clearly shows you can't possibly make money off a service business...
"The GPL remove MY RIGHT to MY CODE."
The GPL protect the original author's rights to their code. They offered it openly with the intention that others would benefit and DO THE SAME for others. As I said, if you don't want to reciprocate then you have no rights to make use of such open source code.
Keeping code secret is not the only way to make money, though in some cases necessary. If you work from scratch you can do what you like with your work, but as soon as you want to make use of other's work you need to respect their rights.
Also if you get code under LGPL then it is acceptable to link it is as a library, but any changes to that library code need to be released back. Use things according to the author's intentions.
"its infectious nature (you have to give everything away that derives from or links to GPL code, and thus can´t recoup investment costs) "
You write this as if it is bad, you know that you took someone else's work and expect to make money from it without giving anything back?
"If you are running a project, pick a license other than [A]GPL to ensure adoption."
If you are running a project, either respect the original author(s) rights, or do the whole damn thing yourself from scratch.
Fixed it for you...
Really, you can get *ALL* the code for windows and build it yourself? Including those modules considered "DRM" or "security", and promptly for all patches?
Why have the Germans not been aware of this openness?
This is much deeper than the auto-update feature, we already have that with most OS including Windows.
This is about stopping any way of monitoring code by means of a VM or debugger without the OS knowing. While that could be used for malware protection, that is not the primary reason why this was developed. It was developed for money - to toughen DRM and/or prevent users from things that go against the vendor's policy - like installing software that has not come from a walled garden pay-store, for example.
What I think the Germans are concerned with is this ability for the OS to hide its actions by not running (or running in a different mode) if there is any attempt to analyse it. Added to that you have the machine-ID aspect which a lot of organisations would love to have - a definite way of tying on-line activity to a specific machine.
I expect most readers think it is wrong to steal, but equally they think it is mind-numbingly stupid to advertise / taunt the masses with something that is there principally to show off the fact that the wearer has more money to spend on a single item of decoration than the average person can earn in a decade.
As for taste, well that of course is one's own matter. Personally I think the watch is tacky, as a fraction of the cost would buy a selection of watches that are either better examples of mechanical engineering and/or more accurate in time-keeping (possibly both). If you ask readers of a technical news site for an opinion, don't be surprised if they don't share some of this view point.
I think that would still be true with a plastic watch from the Poundshop...
The problem (for them certainly) is when you then get "you have to log in to Facebook" in order to see the page. At which point they have just lost a customer...
That is exactly what is wanted, but given there are no signs of any of the big OS vendors rolling this out in the next few years you will see punters option for hybrid as the "best" compromise between speed, capacity, and cost for those with either low budgets and/or big data files.
I sincerely hope you are not using scandisk as that would imply you are using a Win9x / FAT32 system!
I am guessing you mean chkdsk? And if so you should be running it with /r option to search for any bad sectors.
But if your data actually matters to you, then in addition to a backup copy you would be using a RAID system and making sure it was scrubbed regularly to (hopefully) find and fix bad sectors while the other disk(s) are still good at that location.
By default Debian Linux systems using the MD RAID system do a scrub on the 1st Sunday of each month, but if your machine is not on 24/7 then you may want to run it manually or more frequently.
I have no idea if Windows has a scrub option for its software RAID, anyone able to comment?
Better still, use ZFS for its checksums and, again, make sure you have it scrubbed periodically so badness is detected and possibly corrected (or at least the disk failed out) before you get in to a state of being unable to rebuild the RAID parity as multiple blocks have failed across all of the storage.
Look at it this way:
Apple - USA company, part of PRISM, closed source. Definitely compromised.
MS - USA company, part of PRISM, closed source. Definitely compromised.
Linux - no specific country, open to inspection. Probably compromised.
If you are *that* worried keep an air gap.
DES was created and recommended in the mid-70's, is it any wonder that after computer power increased by several million times that the trade off in effort using it versus effort breaking it is a bit weak now?
It is also worth noting that DES was surprisingly resistant to differential cryptanalysis, something only made public years after it was created:
So you really need to reconsider your tin-foil hat's settings. Most attacks do not go via the algorithm (if it is at all competent) but via the key, probably using Trojans or rubber-hose cryptanalysis.
An upvote for remembering an awesome film!