Re: Facebook? whatsapp?
Bubble-embiggened elephants mating?
11544 posts • joined 3 Jun 2008
Bubble-embiggened elephants mating?
The global dotcom is .com.
Not really. This is a Verisign-administered TLD local to the US.
Companies should either obey the law, or get out of the region.
Cut French IP addresses off from Google search?
I support this.
Otherwise how does it communicate back to the Black Hat? Is he (for its always a he) sat outside in a car or at the starbucks across the road?
I suggest you look into ... a trained bucket brigade of WarKitteh, strategically positioned all over the town because your crazy prepared skills are crazy.
No. Go back to your cage!
That was a pretty populist app.
You must have also missed that C# is by far the fastest growing programming language over the past few years
It's about fucking time the rest of semi-opposable-thumb keyboard hacking brigade move off their C/C++ addiction. Can we now move on LISP?
A new kind of Y2K, then.
Did I have to do a Chicago dive?
I wonder how lawyers manage to generate these long strings of adjective-laden diarrhea of utterly faked outrage. Is it crack? Is there a special school??
...the biggest of which is that proponents are not sure what it is about in the first place.
There is no need to stoop to "think of the children" bullshit.
"We must kill them. We must incinerate them. Pig after pig. Cow after cow. Village after village. Troll after troll. And they call me a pirate. What do you call it when the pirates accuse the pirate? They lie ... they lie and we have to be merciful to those who lie. Those nabobs. I hate them."
Speaking of TLA, we have recommended reading in Leslie Lamport's "Specifying Systems - The TLA+ Language and Tools for Hardware and Software Engineers". Downloadable legally, too.
Do it now.
From Hoover the body remover to COINTELPRO to Oklahoma to Clipper Chip to Waco to creation of "imminent terrorist menaces" from whole cloth since the late 90s while missing the one that were actually being fomented. Then we have the "War on Drugs". And now this. Did I mention utter incompetence at getting their IT in order?
Large bureaucracies are and always will be undistinguishable from the mob.
Now, if they only had a secret deal with aliens to show for this. But no...
install an ELF backdoor
Clearly these are TROLLs.
But this is not a "mobile OS", it's made for things that today would be lower than washing machine controllers. Yeah, there is no standard for hardware on mobiles (nor on immobiles, for that matter), but so what?
Note, however, that this source code release does not mean CP/M is open source. The code is being offered for educational purposes only and no commercial use is allowed.
Yeah, well no, successors of Gary, you ain't gonna conquer the world with that anymore and bring in BILLIONS; give it up.
The public is being scammed
Well, there really is no such thing as "the public" (a concept born of a smokescreen of confusion hiding the very special interest of having others pay for one's swimming pool). After taxation, bailouts, public debt ramp-ups, absent pension payouts and the "social security" Ponzi, this is decidedly one of the minor scams where vested interestes not of "the public" are being irreparably damaged. Care-o-meter at 0.
as the data can be enormously valuable
Many things can be enormously valuable. But so what?
Secondly, there’s really no such thing as anonymity.
A statement that is meaningless with no context. The quality of "anonymity" always exists in some context.
We just had a Battery Stable Horse Bolt event, so interest in security was suddenly rekindled.
Which is nice, I suppose.
Once the mechanical nanocomputer comes up, you can have everything in one cm³. If you can afford the cooling and the electrical energy input. Unless reversible computing takes off big (but then you will STILL have to dump infocrap at some point), or the current political situtation continues for ANY LENGTH OF TIME.
"Naked selfies of SCIENCE found on an Internet! MILF Nature Uncovered!! Film at 11."
> an Internet service gateway using BASH as the gateway.
What do I see?
1) CGI does not mean there is an "Internet service gateway", whatever that is.
2) bash is not written BASH
The danger for Microsoft is that if everybody standardises on an operating system that's three versions old, it will have lost its raison d’être as a tech firm.
When the x-th malware outbreak, info exfil and other uncontrolled wild crap and cancer occurs on Windows machinery in the tower of disorganization that you inhabit, the realization that "Windows in the Enterprise" will forever be a fool's errand and a clusterfuck of epic proportions shall enlighten you like a magma blast from a 10'000 year old Icelandic volcano. I don't know what the solution is but it sure cannot be found in the House of
The whole abortion of "Microsoft shall provide you with a reliable, manageable, understandable, and usable-for-all-kind-of-users system ... for a small fee" has to be flushed, killed, strangled, crushed, enterred, disenterred and incinterated. Then deposited into Chernobyl sarcophagus.
> a server is not supposed to be using Bash for its system accounts
Care to explain why?
"I'm so secure I shit bricks, my CPU only runs NOPs"
Lord Keynes, please!
So, for example, the US Federal Drug Administration's 2012 sting on Google over advertising by illegal pharmacies induced the public to pay for black market drugs.
Woah inducing people to pay for their wares? Whatever next? Copyrights and stuff like that??
Seriously though, a clear-cut case this wasn't. When you need to embiggen the affair by having a convicted con-man relentlessly hotcalling Google reps, you will get the man eventually. S.O.P. for the FBI, sadly. Maybe they should go after actual criminals instead of creating them from whole cloth? Yeah, I know, so 1980s.
I don't where you got you brain from but did the lady, in fact, intend to deliver the goods?
Oh, the lady didn't even exist?
No they come in 50 different shades.
More fong shui, Cook, please!
stealing entire corporations all the way to engineering "domestic revolts" in neighbouring countries
Oh, you mean "color revolutions". No , wait... those countries are an ocean away. So it's probably justified. And if muslim, we bomb them to smithereens, inventing imminent threats as we go. So that can't be all bad, then?
Governments - looking out for you since the Assyrian empire.
The malware evaded anti-virus software and remained in Jimmy John's sandwich stores from June to 5 September this year.
Evading anti-virus software is like outwitting TSA officers, but staying in the sandwich store for 3 months like a slightly creepy diner guest in a David Lynch movie is pretty sly.
If they "blocked IPs", then a DDoS it wasn't.
Of course, I have a few CDs with tracks that have this kind of hipsterism going.
I am sure there is some mind-bending recursive truth of Gödel-Escher-Bach level in there, but I just can't find it now.
You need a player with a USB stick (insertable such that it doesn't stick out) accepting every (free, non-DRM) music format, not using FAT and no bigger than the palm of the hand.
opens up the idea that water may be found elsewhere in the universe
Yes. How has that been in doubt, ever?
Something must happen to the solar masses of hydrogen and oxygen blasted into space by supernovas. What could that be?
"Head buried" means invisible to security!
I'd vote for it.
Japan's Prime Minister Shinzo Abe told reporters:
"Nearly 200 people are in the process of descending the mountain, but we are still trying to figure out details. I instructed to do all we can to rescue the people affected and secure the safety of the trekkers."
I like it how politicians always issue diamond-hard instructions to rescue people, secure stuff and project the batsymbol onto low-hanging clouds. As if they actually were somehow in the chain of command. Or even in the chain of competence.
Abe is otherwise known for making a passable impression of a Basset and irreparably destroying the Japanese economy through his application of the "three arrows" voodoo policy. Pray to
God Amaterasu that he is kept away from this.
Unless this is somehow linked to Roswell, I don't see what Eisenhower has to do with this?
(He wasn't even listed on the "most salvageable persons list" in case the alien invasion would be going ahead before 1960, as everyone in the know expected, a plan nixed by the Council of Reticuleans uniformly in disgust once they discovered that humans had invented COBOL, a feat that indicated a new low for the Orion arm and earned this part of the galaxy a few additional demerit points.)
> Bash isn't useful for startup wrappers etc. That's what the bourne shell is for.
I wonder where people pull these retarded "rules" from. Do they have an Ouija Board connected to the deep platonic souls of K&R?
Oh, and by the way, I'm an AIX zealot, and am feeling a bit smug.
Ah, that was the system in which any process could read the environment variables of any other process, right? It's true it has been some time...
AIX was derived from AT&T code
And we all know that true enlightement only comes from code touched by the holy hand of Ma Bell.
As long as your machine is of beige colour, local sanitary conditions should make this shellshock virus of no consequence to you.
From that site: Someone is using masscan to deliver malware. They'll likely have compromised most of the system I've found by tomorrow morning. If they using different URLs and fix the Host field, they'll get tons more.
This is Blood Music in my ears!
It's best to lay it along Ley Lines for maximum unification.
So it was worth it to guarantee Belgium's neutrality after all.
I was wise to not use ISIS because, well, Murrica.
However expect moral panic about nazi terror being unleashed by Tea Partiers deploying Freya Desktops to plan bomings in the US in a minute or two. Because, Linux is anarchist, thus potential terrorist, right?
Maybe because this is actually "Bubble 3.0", the third one in about 15 years? Probably a record in the history of humanity.
M. "Snowden is a Traitor" Andreessen, is late to the party. I don't see why him saying something is making it more visible...
As I mentioned earlier:
In today’s post Wolf Richter offers some solid insights on the dynamics of financial bubbles which merit further comment. The starting point is to recognize that once they gain a head of steam, financial bubbles tend to envelope virtually every nook and cranny of the economy, creating terrible distortions and destructive excesses as they rumble forward. In this instance, Wolf Richter explains how Silicon Valley has once again (like 1999-2000) been transformed into a rollicking capital “burn rate” machine that has spawned a whole economy based on striving for bigger losses, not better profits.
This latter development—- currently exemplified by 44 VC start-up companies in the IPO pipeline with a valuation of more than $1 billion each, despite no earnings and scarce revenues—-is indicative of late stage bubble dynamics. Say January 2000!
Needless to say, our monetary central planners remain hopelessly bubble blind—- still professing to see no significant speculative excesses because they are looking in the wrong place. Janet Yellen, for instance, keeps insisting that stock valuation multiples are still well within “historic ranges”. So DO NOT BE TROUBLED....
Because it will come out with a blue tinge?