Re: Obscure knowledge got me a job ....
Edlin was in MS-DOS 3.1
539 posts • joined 19 Apr 2007
Edlin was in MS-DOS 3.1
Isn't it 198 kHz?
… are best eaten when they are young; they only get stringy as they get larger. They add a bit of nuttiness to salads.
Is Cowell any worse than SAW were?
[Costa are going to] implement a "new format" for users' passwords.
Am I cynical enough to read that as "storing it hashed and salted, rather than plain-text"?
Obviously, his homoeopathy stress-relef pills aren't worth the sugar they're made from.
Hold a tick,
does this need the server admin to open what s/he thinks is foo.jpeg, but is really foo.jpeg.apx ? I'd suspect that most admins turn of extension hiding in File Explorer as soon as Windows is installed. Does it still work in that case?
It was The Scorpions Virgin Killer that triggered the block on Wikipedia. However, both Nirvana's Nevermind, and Led Zepplin's Houses of the Holy were discussed in the subsequent fallout.
You get tags that sound an alert if they are separated by too great a distance from their receiver. Keep the receiver attached to your person (not in your jacket, etc!), and the tag on your lanyard. As long as the first secure door isn't too close (might be a problem in a server room), then you will be alerted before you lock yourself out. These ones are to be paired to your phone, but there are also stand alone ones.
There's an Arduino project that does it. You just wire it to the floppies' head and spindle motors, tell how many it has, and then give it a MIDI fie; it does the rest for you.
Each was ordered to pay court costs of $212, while Walker-Gaines is required to repay Schaefer $9,000 in $175-a-month instalments.
That's over 51⅖ months, or about 4¼ years.
I'd agree with James. There should be automatic systems at the 911 call centre (the bit that asks which emergency it is), that monitors the geographic rate of calls. If an area hass far lower than would be expected for the time-of-day and day-of-week, then an alert is sent, so that someone can look at it.
Likewise, at the subscriber-most exchanges, test calls should be made every, say 15 mins, to make sure that the call connects to an operator. If the call fails to connect, an alert is raised.
If the alerts aren't acknowledged, then it should be sent to another response centre, so they can prod the correct centre to fix it.
Final Integration of Systems Test
Don't most tablets support USB-on-the-go, allowing it's usb port to work as a master as well as a device?
They seem to have installed a new certificate, which was issued on 8th January 2015, and will expire on 1 April 2016. They are also using mixed https/http, which causes a warning flag (but not a direct message) in firefox.
Would the digital prepayment or dumb meters survive this type of overvoltage?
I'm a total dummy when it comes to this stuff. Can someone succinctly state how 4 and 6 can get along?
The underlying transport protocol (normally Ethernet) has a byte to indicate that it's carrying an ARP, rARP, IPv4, IPv6 packet, etc.
There are already programs that will simulate slow or unreliable connections. See http://stackoverflow.com/questions/1094760/network-tools-that-simulate-slow-network-connection for a discussion.
Netem on a linux bridge can add latency, re-order, duplicate and drop packets. It can do this either at a constant rate or in burst mode, which may be useful to simulate dodgy WiFi or GPRS connections. It can also do it to a different extent depending on which way the traffic is going.
Scary fact - Clippy porn, sorry, "erotica", actually exists
Rule 34: If it exists, there is porn of it — no exceptions.
Rule 36: If you've thought of it, then there's somebody out there with a fetish for it.
It uses the deceleration sensors that trigger the air-bag. If the airbag(s) are triggered, it phones 112 for you. If you are just driving with gusto, it doesn't. Simples.
Can you turn off those LEDs? I can see them getting very annoying, very quickly. I normally put stickers over the power-on LED if they are too bright.
Even better for enterprises with dozens or hundreds of computers all trying to update at the same time every Patch Tuesday.
Enterprises are likely to be running WSUS which caches the patches.
The Long Utopia, co-authored with Stephen Baxter, is due for release in the middle of June.
Over what timescale will the £17 billion level of saving be realised?
There are 26 million households in the UK, according to the 2011 census. If the saving is per household, per year, then that's £654 per household, which is clearly bollocks.
The UK's total annual electricity consumption is 330 billion kWh (in 2010). Electricity generators get paid £0.09 per kWh on average, households pay around £0.13 per kWh. At £0.09 per kWh, the UK's total electricity bill is £29.7 billion. The £17 billion saving is 57% of that. Again the stated amount of money saved is bollocks.
I have ignored gas costs, because (1) I don't have the price or consumption values, and (2) a good chunk of the the gas consumed in the UK is used to generate electricity, which leads to double-counting.
Can Windows Server Update Services run on Win7 Home Premium?
It might be worthwhile using WSUS to cache the updates for your users.
I assume that's studio-edit quality, before being compressed to Blu-Ray quality, at 50 GB for a two layer disk, so around 20-30GB for the film itself.
Downloading 300GB at 10Mb/sec will take the best part of three days.
W2K03 = W2030. You meant W2K003 </pedantic>
EasyGroup (HK) files a counter-suite against EasyGroup (UK) in the WIPO, and is given the rights to all Easy™ marks and domains, as they [EasyGroup (HK)] have prior rights.
If the bosses are fined, then they'll charge it to their company as a business expense.
A few random musings.
* It slightly odd that the I²C buses and Analogue ports are numbered from 0, but the digital ports are numbered from 1.
* I hope the power pin-outs on each port are the same, across the port types, so that if you connect a device to the wrong type of port, it doesn't work, but isn't damaged.
* I²C is a bus system, each device has (from memory) a 8 bit address, which is 5 bit class and 3 bit device. Therefore there can be 4 digital ports, with 8 bit output each. Thus, if the LEDs had HEX dip selectors on them, there could be upto 32 LEDs.
* The I²C ports should allow daisy-chaining, or star-topology, subject to power constraints.
All-in-all an useful interesting module. As for it not teaching people how to access a device, why run before you can walk? Adding a UART directly to the data/address bus is the classic way to do it, but is easy to destroy both the CPU, the UART, and anything else on the buses if things go wrong. Anyway, don't modern peripherals for embedded systems come with a SDK, or at least sample code, rather than just a data sheet?
Surely the publishers are allowed to set what fee they want. If they want to, they can decide to set it a €0.01 per excerpt-view, or €1.00 per annum for unlimited excerpt-views.
And in the name of everything that is sensible, turn off root ssh login — always login via a normal user and use su / sudo to become root.
You can also use fail2ban.
This is a small script that monitors your logs, for N occurrences of regexp X in Y seconds, from the same IP number.. If this is reached, then it carries out an action, and a second action after Z seconds.
By default it monitors /var/log/auth.log, looking for ssh login failures (either wrong password, or non-existent/no-login user). If this occurs 5 times in 10 minutes, then it will invoke iptables to block all incoming traffic from that IP number to your ssh server, and then automatically unban it 10 minutes later. It can also be set to email you an alert.
It is possible to have it monitor itself, so if the same IP address gets banned 5 times in a day, they get a week's ban (tweak to your inner BOFH's content).
The Myrka were also stunned or killed when exposed to UV light…
Who broke the V-hold? One would assume that the mud it landed it cushioned the impact a bit.
Did none of the mobile phones survive enough to check their memory cards?
I assume the manufacture can remove the on-board flash chip from a wrecked phone, and then extract all the data from it.
And will Facebook, the electoral commission and .gov.uk be using terrorist-enabling SSL?
Is this only amongst the different versions of MS-Windows, rather than all possible desktop OSes?
I notice the stats are given as school-employee-pervs per general-population, rather than school-employee-pers per school-employee.
If a state has more school-employees per general population (wherever because it has more pupils, or more school-employees-per-pupil), this will bias the stats towards that state.
There's a reason why UV-blocking glass is used for fluorescent lamps, it is harmful to our retinas.
As for solar charging, the Sun gives, on Earth, approx 1kW/m2 of sunlight across all frequencies, when the surface is perpendicular to the Sun. This is largely independent of latitude. A 5.5" 16:9 display is 13cm by 7 cm or about 1/100 of a square metre. If the solar panel can use about 10% of the sunlight (inc non-visible), then it would collect about 1W, which is less than most smart phones phones use when idle.
Or even litho-breaking
Would our gallant reporter have noticed the heat if he was well-oiled from his local taberna?
Well, not until the next morning…
Aye, capsaicin is only slightly water soluble, but is fat soluble. High-fat milk is the best drink to calm chilli fire.
It's been given a slap on the cheek and a double espresso, and crawled back to action.
Does "After 13:45" mean shortly after, or anytime after, possibly upto close-of-business?
It looks like their CHAP server has gone for a wee lie-down in a quiet darkened corner.
They could use a dummy base-station, which in turn, impersonates each network. In the GSM and LTE standards, there is no mechanism for the network to securely identify itself to the phone. This will give them the phone's IMEI, and the SIM's IMSI. From there, they can ask the networks to nuke both.
If they are feeling vindictive, they could (ask the network to) check if the SIM has been topped-up via credit-card, or by calling a centre on another phone, and chase after whoever owns them.
The Received-From: SMTP header might show the public IP adddress of the NAT that the infected machine is connected to.