Re: hansel sprockets
Where exactly is the Flux Capacitor ?
2824 posts • joined 4 May 2008
Where exactly is the Flux Capacitor ?
No idea who that woman is and to be honest she is not an important figure so I don't knwo why should would be known.
>It told stakeholders: "The more time people spend with our product, the more likely they are to become paying subscribers."
That's not the kind of phrase that would encourage me to invest in Spotify, confidence does not appear to reign here...
After reading through the article and the amount of risk mentioned, it is extremely difficult to imagine anything bright about the future for Spotify.
>The opportunities and possibilities are huge and many will be looking to Google to help draw out the future.
Well someone will have to explain them to me because for the life of me I can't imagine how any can possibly "increase" upon the existing marketing vectors.
We are already permamnantly bombarded with publicty and marketing, without drilling directly into the brain I dont see how it can be further increased just by using some domain names.
In Grenoble the Mayor is removing all of the publicity panels from the town, I hope that the idea spreads all over France.
Magnesium casing with a red button
Apparently Jasper allows for lude/rude/suggestive remarks in the article but not in the comments..
Agreed, the culture in France is about on even par with the Muricans and Guns.
Touche pas mon cul(ture).
The plethora of sub-routines, sub-processes, ie : the means by which the banks can filter money of into hidden unspecified accounts, was so complex that the temp outsourced code monkey unintentionally made a minor filtering mistake and they were unable to recover the lost yachting funds for the month.
>While the world gets excited about Internet-of-stuff
Is that the whole world or just the world of white appliances......
Whichever packet size or netwokl layer they manage to change it would be nice to think that "security" is being carefully considered at the same time..
It's enough that the NSA know that you watch YouPorn but that they will also know that you will soon be running out of cheese, milk and beer is frankly discouraging.
Let me see your big knob, [sends picture of round door handle]
Let me see your tits, [sends pic of garden winged variety]
Let's do it bareback, [sends pic of horse without saddle]
I'm into bondage, [sends pic Mr James Bonds DB9]
I'm into fisting [sends pic of veterinaire artificially inseminating cow]
I predict that there will be a lull in unwanted christmas presents for a period of 4 weeks just prior to the 25 dec. After this time Fleabay will be awash with aformentioned goods for a period of approxiamately 11 months.
>The double touch on the home button feature
I just gained kudos from a colleague for showing them that double-tap method....
Cheers I owe you one of these --------------------------->>>>>>>>>
[ Subtle because it's a double tap rather than a double push ]
>NB My hardware is not old. Quad core i7
Lol, I have XFCE running on a pair of Dell OptiPlex 755 Pentium Dual-Core E2200 2.2GHzs...and it runs great considering the specs... Ok the machines are used for dev testing and admin which are not very labour intensive...
On a Quad Core I7 we are talking whole other levels of vroom.
Much better at what ?
There is a backdoor in every OS, it is called the "User". If you can master the "User" you can master the security.
1 : Is there a major reason for wanting to upgrading so often ? By desiring to remain on the bleeding edge then the small amount of time required to "customize" is a small price to pay. If you used windows it would be the same process of re-customisation when moving between major versions.. ( Can't speak for macOS).
2 : Having to recustomize what exactly ?
I relinquished on both Mate and Cinnamon and preferred the more basic XFCE which works flawlessly for my needs.
I applied to a large International company recently ( 4 weeks ago). I received a 1st call asking only three questions
1 : How quickly I was available.
2 : What salary was I expecting.
3 : Reason for leaving existing company.
Time in call 5 minutes.
That was all that was asked by the person whose task it was to "filter" out from the hundreds of CVs that they had recieved.
2nd call : Sorry but you did not pass the intial process. There was no explanation about which of the three questions filtered me out, just that there was so many canditatures that they had to filter quickly....
I was avaiable within 4 weeks, the reason for leaving was valid and the salary was the going rate for the region.
No discussion about the CV or experience whatsover and this leads me to believe that some people must be is job hunting with very low salarial expectations......
>Of course, if you're really interested you could always read the Symantec PDF linked to in the article...
Isn't that the point of El Reg, to do a little bit of the footwork for us.
Which platforms are targeted ? And what was the method of distribution. ?
It would have been kinda funky to ioclude the Daleks even though they are from a TV series.
I would argue that the poliltical value relates to the financial value of all those Google dollars being moved to Europe rather than in GooglesVille USA.
As a second thought, if the Euro politicians have some indirect "nudge nudge wink wink" relations with the search providers they then gain an extremely powerfull propoganda tool. As the moment Euro politicians have got no leverage over what Google displays as results and it probably drives them crazy.
Something has happened in the OS space, everything has become "minor" regardless of the OS version.... W8 tried "major" changes and failed... W10 is going back to minor changes and yet I still don't see it as a runaway success. I don't have a Mac so I can't compare but if I have understood correctly there are no major changes there either.
If we have reached peak OS, or thereabouts, can't we simply stop all the version numbers and just have kernels where things will be garaunteed to run fro the next 20 years.... I can't imagine why we would need 128bit applications,, the 64 bit address space is "huge".....So that shouldn't be a problem. We don't really need Yet Another File System, so that should be OK.. The majority of people don't even use more than 5% of what is already available to them anyway....
Let's concentrate on security ( bye bye NSA), go back to keeoing things simpe, compatibility between platforms, anything other than the endless race to have the highest version and the maximum incompatibility.
[Please tell me that that screenshot is not using the default color scheme. I have not yet had the opportunity to actually see 10].
I would imagine then that the protocol is therefore only active during hotspot/usb modem functionning or does it have to be on all of the time.
Obviously if it is only on during hotspot/usb modem the attack vector is very much reduced.
>on devices running either iOS or Android. Mac OSX users are also potentially vulnerable but Windows and Linux users would appear to be immune because their operating systems don't accept ICMP redirection packets that carry malicious traffic
Genuine question. : What is the requirement for this subset of OSes iOS, Android and OSx, to use ICPM Redirection but where Windows and Linux don't ? Is this based on various Ping timeouts being used to determine the shortest paths ?
Also does this mean that all Windows platforms are safe from this attack or only the desktop variety..
Interesting attack vector though.
Kind of personifies what is wrong in contemporary society, "I'm all right Jack".
>The big things we need for comfort
The crux of the problem lies within the above phrase. Who is willing to give up their comforts today in order that tommorrows generation can also have a minumum chance?
The consumer society pushes us towards the consommation of products, many of which we don't "need" but that are very comfortable to possess/use.. This is turn gives us a very comfortable lifestyle but has the negative adverse effect of requiring massive a mounts of energy....
We need to cut down on consommation, reduce the population, basically to stop dipping our hands in the cookie jar. BUT as long as the rich can continue to grow richer this will never stop. Be carefull about the evalutation of "rich", it is not necassarilly the top 1%. If you have a roof over your head, own a car and eat two meals a day, have a few pounds/dollars in the bank, you are already on the list of the rich.
Strangely enough, from the list of all of these so-called high-market value domain names, I have never visited any of them.
The names are so generic that they become bland.
Which of the following sounds boring
See how generic just seems fruitless and unappealing... And yet they have deemed them to be worth a small fortune.
Is this why we never saw the 757 striking the Pentagon ? Maybe someone had hacked all of the CCTVs except the one whose footage was shown.
No more plausible than the simpletons story that they came up with....
The crux lies in the fact that at the end of the day the responsibility is always human.
Wikipedia - Asimov's Rules.
1.A robot may not injure a human being or, through inaction, allow a human being to come to harm.
2.A robot must obey the orders given to it by human beings, except where such orders would conflict with the First Law.
3.A robot must protect its own existence as long as such protection does not conflict with the First or Second Law
Rule 1 : The robots(cars) should never be in such a position in the first place. They should have previsional awareness such that the scenario can always be avoided, exemple : very little forward oncoming awareness = slow down in order to be in a position to avoid anything that might arrive.
Rule 2 : The human being in the car would be screaming orders to save their own skin, rather than that of the on-comer, which the robot(car) would have to follow.
Rule 3 : In our driverless car scenario, rule 3 has no real bearing, so we can rule out this ethic.
In the event of a crash the blame would probably resolve down to the last command screamed out by a human.
As much as we would like to believe that everything can be coded within a well written algorithm, the final decision that one makes in order to "survive" will always remain instinctive. I do not believe that "instinct" can be written as a series of rules due to the fact that we, as mere humans, do not fully understand what it is.
>Why? You are in the mood to be prodded by one?
If my PHB was a Barbie I would probably consider the idea.
Friday . Time its time for one of these ->
@And why do you assume it's an aficionado and not aficionada?
Statistics + El Reg
I had to read your comment twice before the penny dropped, then chuckled at the thought of how the OP could possibly have made that observation.
Obviously someone didn't understand the subtlety of Dr Mouse's comment.
>Take a walk down the girls' aisle of any toy store and you'll see that the only change is the prevalence of pink LEDs.
Now why would an El Ref aficionado walk down the little girls aisle of toy-r-us... Is there something else you are not telling is......
A pointy haired Barbie, now there's a thought that makes me shudder, where's my pink cattle prod.
>The issue is, they just want to sign you up,and roll you along. Loyalty isn't rewarded anymore
Loyalty is just a buzzword synonym for "you will get shafted in the long term".
I'll give a huge thumbs up to Trevor for this one, it was after reading one of his posts that I discovered who/what ninite.com is.
Just last night I was helping my parents with an issue and I guided them to ninite.com because it was the only site which I could be sure that they wouldn't by conned into clicking one of those damned false "download now" buttons.
With Ninite you get what you want not what you dont.
Hi Christian ,
Thanks for taking the time to reply. I can easilly understand the difficulty that an article such as this can create for a team of developers/business and the pain in the arse consequences of repairing the damage.
As I mentioned though, this article was a little bit "trolly" on behalf of El Reg, who are sharing a little bit of fear-mongering whislt riding on the back of "An unnamed research group operating under the popular Hackito conference"...
And as much as it is always required to read certain El Reg articles with a pinch of salt, articles such as this do make alarm bells ring. As a recent example, we have all seen what has happend to TruCrypt....
I truly hope that the finding are purely hypothetical but meanwhile it is becoming increasingly difficult to trust anything web facing even when encrypted. Snowden has lifted the lid on practices far beyond everyones initial thoughts, we are now absolutely convinced that the 3 letter agencies have the capacity and do actively exploit weaknesses wherever they can.
I am sure that BtSync is used for many private files, although personally I have nothing major to lose other than a few ideas, I am sure that there are others who have a lot more vested interests in not having their work "perused" by others.
I fully sympathise with your teams position and hope that you can quickly overcome this "bump"...
Shit I switched to BT Sync after DropBox bcome a bit dubious. Please don't tell me I am going to have to go back to USB keys...
What I don't like about the article, which feels a little be trolly, is the fact that it mentions that BTSync "might" be leaking hashed, that there is a "probable" situation and as of yet everything was "unconfirmed"...
"Might", "probable" and "unconfirmed" are on about the same level of security as every piece of software every written. This actual article just "might probably" be a little bit pre-nuptial due to it's "unconfirmed" statements. I can understand that the El Reg hack might retourque that it is a heads-up but I would be inclined to disagree until something a little more substantial is included...
Switzerland : Your privacy has been Pwned, it's expensive whilst no longer capable of garaunteeing it's own continuity....... They want the benefits of Europe without being part of Europe and have no longer anything to offer in return.
Unfortunately we have reached peak Switzerland : If I have understood things lately the new havens are either Singapore, Hong Kong or even the Isle of Man. ( I could imagine living in either of the first 2 but definately not the latter.)
>Uhm, emigrate to the LEAST fascist 1st or 2nd world country?
Greece, but the economy is shot to bits.
Ukrania , sorry but that will soon be shot to bits. ( thanks to Mr P..)
Spain, nope historically it wouldn't quite fit and nowadays you have to be Catalonian in order to get a vote.
Germany, nope have to work at two jobs just to pay your rent. They can pretend that all is Ok but we knwo better.
The UK, you must be joking right....the 53rd state....
France : apparently Serge Dassault has been handing out large sums of cash for votes, sounds promising, if you use your vote correctly.
You know what, remain where you are, it's just as bad everywhere else.
WTF is happening down under, since when did the Aussies become such a PC crowd ?
Come on Aussies , stand up to the man, let it be heard that you want your Porn, Drugs ( Silk Road), Dodgy videos like everyone else and historical episodes of Neighbours....
Unbelievable, this is the same damned country that invented Aussie Rules, ffs. Don't let Tony Abbott cow down to the Pommie way of life...
[Yes, there is a hint of sarcasm in the above rant]
Yup and what will happen to that 19 meeeeelion.. Will the Feds buy some new equipment, set up a new "Silk Road FV" (federal version) or will they re-invest in some of the finest Columbian Marching powder.. ( The usage of the word "re-invest" was intentional).
Sniff, sniff what's that, do I smell a small troll in the vacinity.......
Casually lighting up the dry leaves on the bushes as he nonchalantly whistles away down the road......
No, that can't be right as the usage of the word "labour" implies that work is actually being done.
Snipers often try to blend into their backgrounds. Would it therefore be an impovement to finds a means of "piggybacking" on someone elses packets... ie blending in to their network environment.
I have no idea if this is possible, nor any idea if it is even remotely feasible.
Theoretically : connecting via a FON connexion, spoofing an existing users MAC/IP address, creating some outgoing traffic, adding headers to the packet that would allow the returning packets to be filtered and returned to you. Idea being that it looks like someone else was TOR browsing.
[Edit : Just read further down the thread and it appears that the basic idea is already being covered, notably using TAILS as the client OS for even further anonymisation.]
That should read as follows :
The top 5% of Apple users actually have an IQ...