Probably the most expensive post-weekend-hackaton "git push" ever
But what will "Chinese hackers" do with 4.5 million patient records?
13046 posts • joined 3 Jun 2008
But what will "Chinese hackers" do with 4.5 million patient records?
in a bid to terrorise Americans
Who are now too dumb to distinguish Hollywood made-up horror from the real thing.
"If genuine, we are appalled by the brutal murder of an innocent American journalist and we express our deepest condolences to his family and friends."
Totally different from the brutal murder of an innocent American citizen by the Obama administration via drone strike for which we decline to express any of our deepest condolences to his family and friends.
What's that? Yeah, it's the sound of a high moral horse. It has rachitis.
This analysis is correct.
I don't see how you get from here to Cato?
> Outlook IS an amazing piece of work.
It's mainly embarassing. It's just a beast of "user friendliness with a Tony Blair grin" and frankly grossly overengineered features.
Unfortunately that combo still needs a bit of a good polish.
yum update via https when?
Are you stupid?
It's never going to catch on. People would have to retain skilled personnel to manage these things and who wants to pay for that? Additionally, quite a few vendors deliberately make this impossible. I can't imagine who would want to administrate servers using the Windows client interface for example. And imagine a Microsoft Patch Tuesday on your own installation? The horror!
they are scoping an upgrade to Windows!
Government fail ain't news.
And that's why they're using Windows in the first place - a throat to choke
That choking can't come early enough and should be accompanied by liberal knifing.
Yet amid the horror there was humour:
"I thought that only Windows 98 systems got blue-screen errors?," wrote Joe Blough. "(I am laughing at you all, because I haven't seen a blue-screen error on my win-98se system for years. I'm typing this reply on one such win-98 system right now - it has 2 gb of installed ram and win-98 can see and use all of it thanks to a few patches. And no, I'm not running 98 in a VM.)"
I would says AMID THE HORROR THERE WAS EVEN DEEPER HORROR.
Only now these kind of hoaxes start real wars.
First case of actual NSA file being used?
I think discussion like he's trying to start here should be left to grown ups.
Just a bit of cognitive dissonance. This IS 2014, you should be used to it by now, it's practically a civilizational scourge. Or are you never watching the news?
"The sky above the port was the color of a Windows screen, after patch Tuesday".
It's easy to detect crims: It's the ones who worry!
The rest are taking their described daily dose of SOMA. 0.4g every morning. And take care boys and girls: Only read websites approved by the psychopathic mavens of interior and foreign policy!
The cat actually controls you.
yum update via https when?
So run your own CA.
> If only it didn't cost so much for hosts.
Oh, I thought CPU-wise. You mean the certificate.
Well, you can implement certificate-less SSL.
> so much crap was suid root for no good reason.
When was that? Sounds like a tall tale of Middle Earth.
Indeed, sounds like something coming out of a ...difficult... shareholder meeting
Maybe M. Lieberman is a shareholder?
Segue into a randomly tacked-on and entirely believable Hollywood slasher scenario aka. "OMG STALKERS! Will nobody think of the CHILDREN"...?
Credibility lowered by serious amount.
There are no roman camps on mars though.
La vie siliceuse!
When the only thing you can sell is footage of goals, everything looks like Intellectual Property.
illegal videos of balls hitting the back of nets
HOLY SHIT! We must DO SOMETHING!!
That sounds suspiciously like "antitrust should be used in ways I approve of".
The publishers seems to be unable to get their act together? Let them fester.
What I don't understand is that amazon seems to roll out Good Blair (in opposition to Bad Blair) to explain the stance of its opponents in this legal opera buffa. Or am I completely confused?
deleted the titles
Did you mean "undownloaded"?
Since malware relies on having access to the whole computer in order to do harm when the code is executed, malware on such a machine will be defeated, because even if it manages to get into the machine as a bona fide piece of code, as soon as it runs, it will find it has no direct access to anything except an area of RAM. It can’t mess with the operating system because it will run in user mode. It can’t mess with the mass storage because only kernel processes can reach the physical addresses of peripherals.
It seem the author has totally bypassed any knowledge about how modern computer systems or even malware actually works and is making things up as he writes? It's like listening to a neocon explaining the political situation in the Middle East and how we need to smash in some doors lest people get uppity etc.
I recommend taking up a good old Tanenbaum explaining principles of Operating Systems. Then to start studying practical examples of how security is being bypassed by various means in case the system is not kept at minimal levels of complexity with a strictly enforced and mathematically describable security policy with no bugs in the code underlying it. These systems are very rare, very restricted in functionality and the hoi polloi doesn't want them.
The combination of kernel and user register sets in the CPU with hardware memory management and a small amount of hard-wired logic that no software of any kind could circumvent, meant that with a competent operating system, these machines were essentially bomb proof.
I'm TIRED of this MUTHAFUCKIN' SH*T on this MUTHAFUCKIN' CLOUD!!
It's not about "privacy".
"Privacy" refers to contracting between you and the provider handling your data.
"Safe harbour" refers to contracting between the provider handling your data and the provider handling the platform that holds your data.
Or in other words: in how many salesforce accounts does personal information about your actually reside, all with the requisite privacy guarantees promised in good faith. Do you know?
The reverse of that position is: if you cannot sell the goods at the price needed to pay your high-salaried employees (and pay your high taxes to boot and throw off a profit for, you know, "justification of existence"), then you are rolling towards the "cessation of activities" terminal activity node.
Cheap stuff from India? Yes we can.
"IS AMANFROMMARS1 ACTUALLY THE INCARNATION OF GENUX-B?"
However, based on blueprints of the facility obtained by FORBES – and published here for the first time — experts estimate that the storage capacity of the data center is lower than has previously been reported given the technology currently available and the square footage that the center has allocated for its servers.
Even that reduced number struck Internet infrastructure expert Paul Vixie as high given the space allocated for data in the facility. He came up with a lower estimation. Assuming larger 13 square feet racks would be used, factoring in space between the racks, and assuming a lower amount of data storage per rack, he came up with an estimate of less than 3 exabytes of data capacity for the facility. That would only allow for 24-hour recordings of what every one of Philadelphia’s 1.5 million residents was up to for a year. (But who would want to watch that?) Still, he says that’s a lot of data pointing to a 2009 article about Google planning multiple data centers for a single exabyte of info.
Thumbs up for remembering that gem of utter psychosis and paranoia.
Sweat made Stafford’s forehead slick with moisture. “Do you know what would cause a Genux-B to conclude that we’re under attack? A million separate factors, all possible known data weighed, compared, analyzed—and then the absolute gestalt. In this case, the gestalt of an imminent attacking enemy. No one thing would have raised the threshold; it was quantitative. A shelter-building program in Asiatic Russia, unusual movements of cargo ships around Cuba, concentrations of rocket freight unloadings in Red Canada…”
“No one,” the man at the controls of the flapple said placidly, “no nation or group of persons either on Terra or Luna or Domed Mars is attacking anybody. You can see why we’ve got to get you over there fast. You have to make it absolutely certain that no orders emanate from Genux-B to SAC. We want Genux-B sealed off so it can’t talk to anybody in a position of authority and it can’t hear anybody besides us. What we do after that we’ll worry about then. ‘But the evil of the day—’ ”
“You assert that in spite of everything available to it, Genux-B can’t distinguish an attack on us?” Stafford demanded. “With its manifold data-collecting sweepers?” He thought of something then, that terrified him in a kind of hopeless, retrospective way. “What about our attack on France in ‘82 and then on little Israel in ‘89?”
“No one was attacking us then either,” the man nearest Stafford said, as he retrieved the tape and again placed it within his briefcase. His voice, somber and morose, was the only sound; no one else stirred or spoke. “Same then as now. Only this time a group of us stopped Genux-B before it could commit us. We pray we’ve aborted a pointless, needless war.”
It can only be on tape.
That's still half a trillion LTO6 tapes. How large is that cube?
I can only imaginge NSA has some very special compression algorithms or this is the target number for end of the decade.
Could that much data have even been pumped into Utah over fibre up to now?
> makes it one lovely hunk o'space shit.
SUPER SPACE DINOSAURS!
Mandatory on the ingress route at the USPTO, too.
On the Internet, nobody knows whether you are the guy with painful BGP problems.
I would have guessed a spelling error of PHP
Dynamical systems = Can be described by Lagrangians
Dynamic systems = Lots of crap happens