GOOD GOD THAT'S A GREAT PHOTO!
53 posts • joined 25 Mar 2008
GOOD GOD THAT'S A GREAT PHOTO!
I've had two break ins, my wife has had three (one before we met)
We live in what's described as an "okay" neighborhood - obviously not okay enough!
I have to re-do my surveillance system thanks to a server crash, but before that I had a little Debian Linux server running the "motion" daemon that handled the three wireless, infrared, IP cameras ($25 each) that I have in my house. Each new frame from the cameras is passed on to my web server (on the same box) which is protected by SSL, so I can logon remotely for live views. The web server also has buttons in the WebGUI to take snapshots.
I also have motion detection turned on so that on motion events (set to ignore the house-cats), video and stills are archived on my 2TB external drive. The server also sends an email to my (and my wife's) cellphone on motion - but sends it as a text. This is so that we can use our texting apps to assign a unique ringtone - that way we'll know that even if we're in a meeting, not to ignore the texts with the "Red Alart" ringtone because it's not some obnoxious tweet or friend or something, it's some one breaking in.
This is all behind my router running DD-WRT - admittedly, I need to upgrade my firewall to something more robust.
You know, I had just about given in, and was planning to make a Linked In profile after all of the constant invitations. Nope. Not happening now.
I knew I should have paid more attention when I saw a an astronaut tweeting (or was he being tweeted at?) about not wearing a red shirt in space.
I found that a little humorous.
Steve Knox, Tomislav, et al.,
I'm deeply disturbed to learn that there is some one intentionally jamming emergency communications channels, and what's worse, only when there is an emergency occurring. I had originally read these comments about four hours ago, and only just now had the chance to reply. Your second post, Mr. Knox, makes me fear that one of my suspicions is correct; the perpetrator is somehow receiving information about the investigation. I must surmise that he or she is either currently involved in the agency or agencies using those emergency channels, or has a person or persons working in or with this agency or agencies, feeding information to the person doing the transmitting.
It seems to me that the most simple way to get around this problem would be to switch to a different type of transmission. The most effective solution would be going to fully encrypted digital voice communications, but budgets, and most probably legislation, would prevent that. A less expensive alternative would be switching from analog to digital (if you haven't already), or switching to a trunked system. Although, I should point out that even fully encrypted digital transmissions can fall victim to something as simple as a third party pressing their transmit key at just the right time, even if all they're using is an analog transceiver.
It seems to me that the best bet in finding this bozo would be if the agency or agencies could set up, at separate locations, DF receivers (receivers that also show direction) capable of logging the direction a transmission comes from, and the date and time. Then, after a case of illegal transmission during an emergency, those records can be checked against dispatch log tapes and interviews with the personnel involved to rule out the locations of legitimate transmitters. At that time, only the illegitimate transmitter's location will remain.
If some how the agency or agencies involved have the budget to do this - and I hope that they do - either a), the perpetrator will catch wind of this plan, and stop transmitting, thus solving the problem, or b) will continue to transmit either because he/she was not aware of the plan to locate him/her, or he/she wants to be caught.
I'm guessing that the agencies are police and fire/EMT, and that it's either at the local or county level, and that a local or county sized budget is why a solution like this has not been tried yet.
I sincerely hope that the perpetrator is caught.
How, exactly, does one extract data - via the internet (and not an extracted disk) - from a server that was "shutdown"?
I'm assuming the word "shutdown" means "powered off".
If I wasn't posting from my mobile phone, I'd throw in the Paris image for obvious reasons.
It's Linus, not Linux. :-)
Have they already delivered pizzas to
Putin? GhostShell hasn't impressed me yet.
It needs to be repeated.
WARP 10 IS NOT TEN TIMES THE SPEED OF LIGHT!
FIX IT! FIX IT! FIX IT! FIX IT! FIX IT! FIX IT!
FIX IT! FIX IT! FIX IT!
MOVE ALONG PEOPLE
Took the words right out of my mouth.
What we need to focus on is how to make the computers LIE and report no faults and emissions within tolerance. Where's Kevin Mitnick when you need him?
Lets say this is legit - that some one bought a fully working 720 SDK box - would that give the homebrew / modding community any real advantage if this box (or its secrets) fell into their hands? I'd like to think this is some sort of finding the Holy Grail eureka moment, but I bet there are enough tricks up Micro$oft's sleeves to negate whatever they may learn.
Speaking of next Gen consoles, the rumor is the PS3 has two unused GPUs in it, and that they can be "activated" with a software update push, should $ony decide to implement it. What's the deal with that? will we see that happen before the PS4 arrives?
I think I've seen some of those. They're a sort of "educational" genre. ;-)
The picture of Jen on the index page reminded me that there was an El Reg sticker on the shelf behind Moss in season three.
Now I'm off to type Google into Google.
About 15 years ago, I received an issue of Discover magazine that made me wonder "Why is Patrick Stewert's head on the cover?" (This was before his knighthood, so I purposefuly ommited the 'sir')
The article told of some science guys taking a super old skull (these are technical terms) that predated Clovis, and handed it over to one of those guys who does forensic reconstruction of faces with clay. The result was a very anglican face that even the author of the article likened to Sir Patrick Stewert.
I didn't follow up on it at all, but unless it has been refuted, it lends some cred to those poop poker's ideas.
It's old tech.
I had a (cheap) electric toothbrush that used induction to recharge the battery, and that was back in the 1990's.
It had no cords or metal contacts at all — just a plastic body that fit inside a plastic charging cradle.
Still, though, I'd love for my phone to have that feature.
It was a little surprise for me to see L0pht and BO2K mentioned (but now Cult of the Dead Cow). I haven't heard much about them in a while.
Put a marshmellow in it!
Does anyone remember when we used to borrow a friend's cassette tape for a day and copy it at home? Or maybe use it to make a mix-tape? It was a simpler time for pirates.
Look at 2:13... hipsters in China!
If this gets made into a movie, there's a very good chance I'd go and see it in theater.
I've been wondering what those blue squares were. I always thought they were from a book, like the other reCaptcha images.
It should be noted that those house number images, if that's what they are, have been showing up in reCapptchas since 2011. I guess it's news worthy if Google just made the announcement.
If you're not happy with identifying house numbers, you don't have to. Just correctly type the word used for identification (you'll be able to tell them apart after doing enough of them) and put gibberish of an appropriate length where the scanned image word (or house number) goes.
...Is that where the beverage name "Hi-C" came from?
You know those red thingies on the front of the starship Enterprise's engine nacelles? Bussard 'ram-scoops'.
Anyone remember when this thread was about the Kim Dotcom seizures being 'null and void'?
Hey guys, there's a place for this caliber of political discussion, and it's called 4chan.
@Bradly You imply that you have yet to have met a woman with implants for purely cosmetic reasons, yet you already decided that no woman who has ever done that is of so little worth that you would not be able to "take her seriously as a human being.".
Boy howdy ya sure do sound smart!
I've met two nurses and one doctor with boob jobs. They seemed pretty human to me.
I recall reading an article (I believe it was on The Register) about a PhotoShop plugin that analyses a photo of a smartphone's screen to reveal hidden patterns in the smudges left on the screen — and supposedly this is impervious to wiping or cleaning the screen.
But I'm sure the federallies have already thought of that, though.
Did somebody say... ancient aliens?
I agree with the Anon who's subject line was: Story: PBAS Lack of Security, but I see perhaps another scenario.
Say the script kiddie (or skiddie, as the kids are fond of saying) actually intended to get caught? Maybe he was just after the notoriety , and somehow came to the conclusion that his short lived infamy would be worth the jail time and black mark on his record.
That, or what Anon said.
I've not played the original. I don't have any intrest in playing an RTS. I'm not saying that there's anything wrong with an RTS, I simply don't enjoy them.
That being said, I *am* a fan of the first person shooter. And before you ask, yes, I'm a typical gun-toting 'Murikan.
More than a fan of the FPS, I am a fan of cyberpunk. To me, this is the closest thing to a Ghost in The Shell game that's been released in recent times (excluing the latest *Deus Ex* installment, of course)
So for people who like sci-fi cyberpunk shoot-em-ups, it's a great game. If you dislike playing an FPS or dislike cyberpunk for whatever reason (and I'm sure you think it's a good reason) then obviously this is not the game for you.
What I find funny is how many are complaining that this is not a rehash of the original, because when Halo3 came out, every one complained that it was hardly any different than Halo2.
So first the author comments that Troi and Riker were the most irritating. A matter of opinion, I guess, but one that displays a - no wait, what am I saying? It's a FACT that Wesley was the most irritating.
And then... @h4rm0ny's comment made me laugh so it's alright now. Unless that person was serious. Then I was just bewildered.
I want one. I would put an OS on it that can handle emulators, and some sort of easy-to-navigate-with-a-controller interface, and every emulator and ROM that I can imagine, so that I can finally play things like GoldenEye64 on the TV again. (not to mention all the Mario and Sonic I can get)
We'll just say that I'm living in a nation who's copyright laws allow this sort of thing.
First thing I did after reading this was insult the Thai royal family.
"Duqu is also the world's first known modular plugin rootkit,[...] "
No it's not. Anyone remember Back Orifice 2000? BO2K allowed - um, users - to add or remove plugins on the fly. Sneak a tiny server on to a "victim" machine, and then once it's in, you can add in plugins that support strong encryption, keylogging, live desktop, IRC command and control, etc.
One thing I love about the people of The Register is that they don't go spewing hyperbole and buzz words like other "reputable" news outlets do (I'm looking at you, CNN, MSNBC, FOX, BBC, etc.) when it comes to things like stealth technology. This attention to detail, and the effort to NOT be sensationalistic, is the reason I trust this website more than any of the other tech news sites.
One aspect of emissions control not mentioned in the article, perhaps because it was likely not a part of the Abbottabad raid, is the stealth aircraft's use of an in-flight data link. Instead of having to use a "stealthy radar", aircraft such as the F-22 have the ability to fly with their nose cold (i.e. radar off or in standby) and rely on the radar data collected from an AWACS or JSTARS aircraft orbiting far inside friendly lines.
Mine's the coat with the wings on it.
@Blacklight RE: SandboxIE: Good idea!
@Destroy All Monsters RE: Virtual machine: Good idea!
I can attest to both of those methods working, albeit some what inconvenient, but worth it, none-the-less.
Can any one tell me, are Flash LSO's the method sites like Mega Upload use to keep track of how much video I've watched, even when I change IP's, clear cookies, etc.?
Was any encryption used? Was he naive enough to send it as plain-text?
I am an officer on a private police force. Recently, the local "public" police force called us to give us a tip on a missing person. A run away child was shown to be in our facility , as determined by examining the data pulled from her phone's GPS (although it's not a smartphone) and call tower data, all stored AT THE TELCO and not on the cellphone itself.
So, I think this is rather moot when it comes to the cops looking at this file because they have easier, more accurate methods, assuming they have a warrant or court order. Apple, on the other hand does not need a court order to see this data.
I believe Dr. Venture had one of those, but probably for different reasons.
I love that "host in the cell" caption. ["Ghost in the Shell" reference?]
I live in Akron. Our primary exports include floaty, helium filled things, Orwellian fear based on our paranoia fueled surveillance, and crippling depression... Oh, and also Le Bron James nicknacks.
At the risk of sounding perverted, this sounds like it might be great for filming a couple engaged in activities that they might be embarrassed to have a photographer around for.
SEX! It was sex that I was talking about. Great for photographing sex. Yeah.
Paris, because she could have used one of these a few years ago.
I agree with the Anonymous poster ahead of me... 4chan is not a hacker website. That's crazy! It's that type of haphazard lableing that causes so many misconceptions about hacking and comnputing in general.
Paris Hilton because...
I think we know why.
While it is true that automated safety protocols would not have saved the lives of this crew, as an American citizen and an aviator, I am embarrassed by the fact that my nation's National Aeronautics and Space Administration employs safety protocols that must be activated by crew members; crew members that, in an emergency situation, are very likely to be incapacitated before their intervention required to activate the safeties.
Mine is the one with the wings on it... and for now I think I'll stick to those tiny little Cessna planes.
This sounds to me like a few of the "higher-up" transit employees are trying to cover their own asses (not that they could have prevented an exploit). But would Massachusetts government employees really go through all this legal action to discredit others in order to save face?
Let's not forget the Boston area "Lite-Brite / Improvised Explosive Device" scare when the city flipped out over a few signs placed in areas with high foot traffic and on some bridges.
If you don't remember, an advertising company, contracted by Cartoon Network's daughter network [adult swim] to place several light up signs in Boston that had a "home made" appearance.
After the signs had been in place for a few WEEKS, Boston officials finally acted, by making arrests, and stating that the signs "...had all the components of an improvised explosive device, except the explosive..." (so does a clock radio).
So this major fowl up illustrated one of two things, Bostonian law enforcement are unable to identify I.E.D.s (if these signs did not resemble bombs), or that actual bombs could, in fact, be placed in Boston for weeks without detection (if the signs did resemble bombs).
So, yes, in Massachusetts, the city and other local governments will censor your Freedom of Speech if it makes them look ignorant.
But I think everything could be worked out if everyone would just get together and discuss it. Maybe over a cup of tea? It could be like a party. In Boston. They could call it The Boston Tea... Oh wait, that name is already taken.
Paris Hilton, because sometimes, Massachusetts is just as clueless.
I am so sick and tired of the networks and manufacturers deciding what programs I can and cannot run on my cell phone. Nokia even decides what java apps I can use.
I thought it was MY cell phone when I bought it, but I guess not.
I am really looking forward to the day when there are actual, truly open source mobiles.
Can't he just buy it from himself?
There was another design where there were two main rotor disks that intersected each other at a 90 degree angle. Each rotor hub was angled outboard, away from the fuselage, at a 45 degree angle.
It's name escapes me.
Mine's the one with the pilot wings drawn in with Crayola because it makes my passengers make funny faces.