24 posts • joined 1 Dec 2008
Interviews are taking place in Rio de Janeiro...
...and the end of the queue is currently in Buenos Aires.
Re: Confused about IPv6 vs. NAT.
You're confusing NAT with a firewall. IPv6 doesn't need NAT but you can still run a firewall on a gateway/router that drops unsolicited inbound packets. The only thing you miss out on with IPv6 is the absolute joy of configuring port-forwarding.
The update fixed the broken NFC on my Nexus 7 2013, at last!
Re: RFC 4941
While your computer is using privacy extensions it should in addition still maintain a MAC-derived address (at least, it does on Windows - I don't know if the same is true on Linux or OSX). Can you force your SSH client to use this interface rather than the temporary ones?
Re: What IPV6 really needs
I have a 6in4 IPv6 tunnel running on my home network. My router (Asus RT-N66U with Merlin firmware) is running an IPv6 firewall which automatically drops any unsolicited incoming traffic. I can set rules in the firewall to permit traffic to individual hosts (e.g. I could have multiple hosts all with their own port 80 services). All my hosts retain end-to-end IPv6 routing without any of that NAT nonsense.
From the Daily Fail link...
'12-sided design will resemble coin last used before decrimalisation in 1971'
Typical Daily Mail, they have crime on their minds so much that they can't stop thinking about it!
You could make the password as incriminating as you like and it won't put you in jail any longer - you still need to crack it to get to the real evidence. The only dumb mistake he made (apart from molesting kids) was choosing a password vunerable to a simple dictionary attack.
Also, Gary Glitter was dumb enough to take his laptop in for repair at PC World...
Re: Beggars belief that TVs & remotes don't use bluetooth
Now there's an idea - a universal Bluetooth LE remote with an touch-sensitive e-ink display!
Children's TV character: "Hi kids!" *waves*
Child: *waves back*
*TV switches off*
Re: Falkland Islands
I bought a PAYG sim when I was out there in 2008 - the phone number was only 5 digits long, including area code!
Following a particular digital path?
"Welcome to Mozart's Ghost! The hottest band on the internet!"
...is not to be sniffed at!
I wonder what happens...
..when he waves to say hello to a passer-by?
No, the quickest way to solve it is to show it to an autistic child in the form of a puzzle book!
A Google search suggests that the Belmont transmitter is broadcasting Multiplexes ArqA & ArqB on low-power until 23 November 2011. At this point, in addition to the power increase, they will be switching frequencies so another retune will be required.
Android iterations are named after desserts in alphabetical order - 'FroYo' is short for Frozen Yoghurt. Do try to keep up!
I actually bought a new Radeon 6950 at the weekend that came with a code for Dirt 3 which I redeemed on Steam, so I'm hoping I don't get affected by this, even though I can reasonably prove my purchase.
'Manual Update' means that the app's system permissions have changed and that your consent is required prior to update.
...that this isn't going to be the best to use for touch-typing.
...they'd need to know the product type in order to be able to tell whether or not it is subject to sales tax.
Wuhhh? Oh. Zzzzzz.
Wake me up when it's a cheap colour e-ink device.
I can't be the only one...
...who initially read the headline as 'John Major tweets remorse over Playboy interview'. *Shudder*
'Comical to game-progress-halting changes'
Sounds a bit like the FADE anti-piracy technology Codemasters have used (notably in Operation Flashpoint), which causes the game code to degrade over time, affecting AI, physics, weapon accuracy etc to the point the game is no longer playable.
- 'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
- Pics Facebook's Oculus unveils 360-degree VR head tracking 'Crescent Bay' prototype
- Crawling from the Wreckage THE DEATH OF ECONOMICS: Aircraft design vs flat-lining financial models
- Bargain basement iPhone shoppers BEWARE! eBay exposes users to phishing vuln