1396 posts • joined 11 Apr 2007
"...security with a 10-year lifespan"
Is this a thought experiment?
Feed the homeless.....
to the hungry.
Two birds, one stone.
A registry is a flock of Register staff.
.."have matched middle-aged folks' tech ability by the age of six"
If I knew then what I know now...
I would have been subject to a great deal of psychoanalysis and considered a freak!
Sites are blocked....
Because they contravene some UK based law, making them illegal.
Viewing or reading certain images or words has been deemed illegal by a group of people who think they know best. To protect the
children UK populous from itself and from unwittingly happening upon illegal content and thus breaking the law, it was deemed that it would be pro-active to block access to illegal words and images.
Thus accessing sites on the block list means that you will be breaking the law by viewing illegal content. These sites are blocked *because* they contain illegal content, not because the content might be truthful, exposing, honest, alternative or sincere. All blocked sites are blocked because viewing them would result in illegal activity.
So was the person offering the proxy was encouraging a crime to be committed?
Is this not illegal?
I'd buy him a pint
No "real" crime...
Unless looking at things and reading things is wrong. Ah I remember now there are laws that determine what you can look at, see and read legally.
So mother (uk gov) decides what is good for us and bad for us and hence what we can see or not see.
I guess that mother doesn't like one of the children picking the lock on the larder to allow all the other children to see what mother is eating.
Such a fat mother, keeping the juicy truth to herself whist feeding her children on what she thinks is best for them. Mother always knows best :-) It's for your own good.
I agree with D3rrial. This is wrong.
If the half a dozen or so spam emails that find their way into my in box had illegal images attached instead of failed delivery notices from UPS or tax refund forms. It would be enough to convict me of possessing said images and possibly get my name on the sex offenders list?
This is so wrong it is scary. By this judgement all it takes is a bot herding mail spammer to attach a picture of a naked under age child to a spam mail and everyone who gets the email is guilty of possessing indecent images of children.
Megacorp: "I want
IP, employees are a liability"...Unless the employees are the IP.
You have but one soul. If you can sell it, then it ain't so unique. Or you don't understand what a soul is, if indeed there is such a thing. For the purpose of this exercise let's dispense with the word soul and instead use the word integrity.
Dr Dre would sell is ass if the price was right.
Re: Like, WOW, man!
"it's clear Apple owes customers some answers."
It's normal for a master to never answer to their slaves.
people find all sorts of
interesting mundane items on Facebook that they don’t have time want to explore right away at all.
have hacked the six digit code of the remote control app, which means the software flaw is in an insecure software application and not the vehicle itself. And thus the Tesla Model S itself was not hacked. I guess the headline "Chinese Uni students hack smart phone app" isn't really click bait.
Re: Why do the words...
"Although a positive identification is not enough evidence to result in a conviction"
Although it is enough to disrupt ones day completely leading to several hours in a police cell, missed appointments, the possibility of a loss of income or missing last orders at the local.
It also gives the police time to do some fishing. And they can always get the people that respond angrily on section 5 of the public order act to boost some league table statistic.
Nothing wrong with Macs
at less than half the current retail price.
As the previous poster mentioned, can't be upgraded, so they are obsolete in a few years. Even though they are well engineered and well built kit, nothing would entice me to buy one. (I do graphic design amongst other things)
I am typing this on a machine that was once a 386SX (nothing of the original remains)
It seems to be that
anyone who doesn't consume, conform and obey is an extremist.
Little shit seems more appropriate.
Re: In the year...
Ty both, I am just an old school cantankerous old bastard that will never ever give up my privacy and freedom to choose.
In the year...
In the year
thirtyfive thirtyfive twenty - one nine
Ain't gonna need to tell the truth tell no lies
Ev'rything you think do and say is in the
pill app you took ran today.
In the year
fiftyfive fiftyfive twenty twentyfive your arms are hangin' brain is limp at you you're dead inside side
legs mind's got nothin' to do
some machines doin' that for you.
I know my desktop
I know my laptop, I know my servers, I know my mobile, I know my tablet. Why do they need to look and behave the same?
That was a rhetorical question. I can understand the need for unified interfaeces ( no speelin error here) for those too lazy or too thick to hold more than one vision in their head.
I accept I could make my "IT" experience easier and more streamlined but life sucks without a challenge. Besides the right tool for the right job works for me... Windows for games, Mint for desktop, touch for tablet and mobile and command line for servers. Of course I am completely wrong and outta my fsckin head as the downvotes will show. roflmfao.
I don't know why u were down voted
Have an up vote for two reasons.
1) Its is a good move having most of Googles services in ones hosts file.
I don't just stop at analytics ;-)
2) To counteract the down votes.
Anyone one with a care for their privacy should have up voted you.
I have never visited Buzzfeed, never will.
The Registers target demographic is intelligent IT types.
So perhaps Buzzfeed gets a few people out of its demographic too?
Re: Firewalling cell phone data connections
I really don't know enough about Android. Perhaps some tinkering with rild the radio interface layer daemon and its user space library would provide some sort of "x is trying to establish a connection to y. Press ok to allow" dialogue. Perhaps it is possible to code protection into the kernel. I never compiled a kernel for Android though. If I wasn't so lazy or I cared more I might research this. My mitigation is I don't install just any app on my phone. And I never install apps that are nothing more than a gateway to a website.
it becomes a criminal offence NOT to use such devices, until choice is removed, I really don't give a shit. No matter how useful my shit is to some marketeer would want to throw food advertising in my direction.
Re: Money For Nothing
"...sell something that is already owned by the public"
Common practice for gov.uk
I have only
ever bought 2 PC's, a 386SX with 4Mb RAM was the 2nd one which I bought to replace an Epson PCe.
Needless to say none of the original 386SX remains. Although I do have the original 256Mb Seagate hard disk somewhere. Nothing wrong with a viable upgrade path. And I still have the Epson.
Re: Sieze the opportunity
I was moved to Sky from Be There. I thought I would give them a chance as I am inherently lazy. I can't complain so far. My connection is the same speed +/- 1meg (approx) 12-14Mb/s depending on the weather... Something between me and the exchange doesn't like the rain. It hasn't gone down yet, I got a static IP, I use a BiPAC 7800DXL router, I don't use Sky DNS and my bills are the same. Nothing to hate yet despite looking for a reason.. I like small independents that make a nice living not multinational corps that take the piss. Unfortunately there are none left.
Re: Why is this any surprise?
I was gonna say public is public. If ya don't want anyone to know what you are saying.... put it in a sealed envelope and use snail mail or encrypt with 2048bit PGP and sten it into a picture of a kitten.
Anything that is posted on line is accessible to the sys admin or law enforcement with or perhaps without a warrant.
An article or a product of superior size, quality, or grade.
foolish or inane, especially in an unconscious, complacent manner; silly.
What kind of model is she really?
Don't feed it any data... except perhaps your IP address and that can be hidden via proxy.
Coookie Monster, RefControl, Adblock, NoScript, User agent control.
I really don't care if those not informed enough don't employ such measures. There are enough of them to make it uneconomical for websites to counter people like me. So I thank the clueless, long may they continue to take the flak.
I do try to educate but all to often I am met with blank stares. I never see an advert on a website more than once. I do visit Facebook, I use it to promote my business. I have put nothing on there that I do not wish to be made public. Facebook is the only place where Facebook scripts are allowed to run. As for doubleclick and googleadservices they are blocked at the router.
So I am a leech, like I give a fuck, my life, my eyes, my mind, my computer. That said I will pay subs to a site with something more than advertising to offer. Cue the down votes yay, like I give a fuck about that either. if you down vote me you must be one of the leeches that uses advertising and privacy invasion to make a living... Shame on you... The Golgafrincham B Ark is waiting for ya.
Is it so hard
for IT professionals to think like consumers?
I have deleted dozens of these emails from my inbox...emails along the lines of tax refunds, cant deliver a parcel, your invoice is attached, you have been billed for..., thank you for your payment etc.
All mails contain zipped attachments with an exe inside the zip. I know what they are immediately because I do IT, I read things about IT, I play with malware on a VM.
When the FBI took control of some C&C servers it was news worthy for a day. If a lay person did not see the news on that day where else would they get a warning from? I don't read national newspapers of any kind so cannot comment on the coverage in the tabloids and broadsheets.
Clued up IT people are in the minority. Ill informed consumers are the vast majority.
Email users unaware of such scams see the email and are either concerned or curious about the contents because of the subject line. So they open the zip and run the contents.
Re: Nice, but ...
"It would be even nicer if the random MAC was also used for making a connection. Any practical reason why that couldn't be so?"
Services that see your MAC address as a positive identification of an allowed device and tie that MAC address to a known user. Used in conjunction with a user name password combination this would add a further layer of security..... ACL on a service gateway for instance.
Most people are not like you
They are consumers and love new fangled toys.. "Look I got farcebook on my TV" and why should I get up off my ass and power up another device to buy product on line or access a bank account when this remote thingy is already in my hand? People will use TV's to access the Internet.
I am like you, I will never use a smart TV to access the Internet, not because I don't trust them, which I don't. It's because I don't need one, I don't have one and I don't want want one. I expect that I am in a minority.
I won't connect a device to my LAN if I cannot get to the underlying OS of the device and control ingress, egress to and from that device. I expect all devices to be set up for convenience first with security as an after thought. Am I paranoid? I was beginning to think so several years ago but the simple fact is if one doesn't control what the Internet connected devices one uses are doing or talking to, who does? And can they be trusted?
I consider smart Internet TV's as a beach head to ones home network. A point of entry whereby the local networks whole IP space can be accessed. They are computers not just TV's. Consumers see a simple and easy way to watch video streaming services, browse the Internet and buy stuff.
Re: slightly less bonkers cabinet minister
Thank you for bringing a smile to an otherwise shit day.
Re: Pro or con?
I agree with you. However, many computer hackers/script kiddies/metasploit users want to make money for themselves and don't pay tax.
Incompetent coders, careless sys admins and sloppily run IT companies usually (tax loop holes aside) pay tax.
The old maxim... "don't bite the hand that feeds you".
Re: As far as I am concerned
Thank you for allowing me to think what I like, I am fully aware of the law in this respect, as I mentioned my partner is a photographer. She will ask permission before taking a photograph of any person... Out of respect for their privacy.
There is a difference between opinion and a statement of fact, I presume those that down voted my post disagree with my opinion... And feel it is perfectly acceptable for someone to take a photograph of them wherever they are and whatever they are doing to be displayed where ever and when ever the photographer wishes.
Just because it is law don't make it right.
As far as I am concerned
If the image is of me and I am alone in that image I am the copyright owner. If the image is of me and other people... Why wasn't my permission for the photograph to be taken asked?
My partner is a photographer and I do respect copyright. I know she has visited certain places many times, waiting for hours for the light and cloud cover to be just right to take that awesome landscape photograph. That kind of dedication deserves reward.
are for mixing and music production, they should have a flat EQ, not colour the sound or alter the sound stage. When mixing one has to hear the music not the headphones. Beats headphones are designed to have a bass boost and top end lift hence they colour the sound. If they colour the sound they alter the sound stage. How can they be called studio headphones?
Sennheiser, AKG, Beyer Dynamic all make far superior and more neutral headphones. And all have models that start at a third of the price of Beats.
Form over function is becoming all to common for the "look at me I am cool" crowd.
I have a 12 year old pair of Technics headphones(ear cups are very tatty now) I wouldn't swap them for a pair of Beats unless I was paid enough to upgrade my Technics.
Forge the headers, change the user agent and if tethered to a Windows system stop Windows update service. I don't see what the problem with tethering is. Seems to me the data is paid for why does it matter where the data goes after hitting the phone. Is it just that the telco's want to charge more for data going to a device other than the phone? Seems like a scam to me. Could someone explain?
If I buy a gallon of petrol it costs the same whether it is put into a Ford Focus or a Ferrari.
Nothing new here...
Where in any of the Microsoft EULA's does it say "We guarantee this software to be accurate, reliable and secure"?
All software EULA's and not just Microsoft EULA's are to protect the developer against legal action from providing software that is broken, fails to perform as can be reasonably expected or can easily be broken by normal usage.
Basically much of what an EULA states is that the developer is not responsible for the quality of the product and that if using the product causes any loss, it is then it is the fault of the end user.
stupid people are far more scary than intelligent machines.
Re: All is revealed . . .
My first encounter with privacy invasion was in the mid 90's when a website requested my name and home address either to access some content or download drivers. (around 20 years ago I can't remember the details). I was outraged, my immediate and ever since reaction has been... "None of your fucking business". I have been lying ever since.
I just dread the day when it is a criminal offence to provide false information in order to protect ones privacy. As far as I am aware it is only a criminal offence to provide false information for the purposes of fraud.
As I pass more integrity, honesty and decency with one of my stools than the data aggregators amass in a lifetime I won't be loosing sleep any time soon. My only sense of guilt came from entering a false but existing address into web forms that check for a valid postcode. Until I had the bright idea of using... Westminster, London SW1A 0AA.
I only use my Gmail accounts as spam traps... There are adverts on the Internet?
There was a time when one could register a domain name and simply use that for basic email. Nowadays I am not aware of a hosting provider that doesn't use Microsoft or Google services for email. Those who can will run their own mail servers, those that can't will make money for Google/Microsoft.
Hey it's "free" email where's the problem? Its a wonderful service for consumers all those adverts for the best, most trustworthy and value for money companies touting sought after and wanted products. Simply awesome! It's not like a human will ever read the content of your private emails, will they?
Where does the sincerity end and the sarcasm begin? answers on an email to one of my gmail accounts.
Re: Not interested..
Perhaps if you had 5.1 ears your opinion would change
Re: Translation: Coming soon, no side-loading. - corrected
Yes, the certification stuff is supposed to make people do what they want.
They missed a rule...
It shows advertisements.
Re: That screenshot, what happens...
Every single application installed on the system starts full screen with Internet Explorer top most opening in the Microsoft app store
Proof that God exists
To bring about Armageddon what could be better that instigating the creation of dozens of diametrically opposed religions with a fundamental tenant of each being that it be the only true religion and that all others must fall?
Satan therefore exists because God is good and would never do such a thing. Only the Devil would create such a situation where humankind murders each other in the name of a religion. Ipso facto God exists.
Now that that has been cleared up, Lego the tool of Satan destroying children's souls? The only thing Satanic about Lego is the price.
or a world of feedom
depends if they are IT professionals or consumers aka product.
Really need a shrug icon so I can indicate my indifference to your response. I suppose meh will do.
No I didn't down vote you, I am not so petty.
no one mentioned rooting or Cyanogen yet?
First thing I do with an Android device is root it, remove the crap and populate the hosts file.
- 'Windows 9' LEAK: Microsoft's playing catchup with Linux
- Game Theory Half a BILLION in the making: Bungie's Destiny reviewed
- Review A SCORCHIO fatboy SSD: Samsung SSD850 PRO 3D V-NAND
- Was Earth once covered in HELLFIRE? No – more like a wet Sunday night in Iceland
- Every billionaire needs a PANZER TANK, right? STOP THERE, Paul Allen