18 posts • joined 15 Jun 2010
how much ram?
if it was a GB of battery backed cache then it would have my vote - but unfortunately this seems not to be the case.
No one has hacked the gibson?
Seem to recall mainframes being the primary targets of the "wana b3 1337 h4x0r!"
Pls at least focus on the unique management and 100% uptime capabilities mr ibm rep.
Dilbert on the cloud
Extra UI idiocy
That is so not going to be thin client / remote session friendly. Who spends time gazing at their desktop anyway?
Most of the time ur in the web browser anyway - who spends time gazing at their desktop u just want to organisae and run applications.
On to xfce I go....
SL vs Centos 6
Lots of debate about Scientific Linux vs centos and release schedules however I find that Centos put a better effort in to maintaining existing releases (for example I don't see a SL 5.6 yet). Yes centos could do things better - I think the aformentioned release schedules and possible ability to donate £ to the project will help.
I think this is not about MS vs RH but rather MS just making sure they get a chunk of the virtual machine hosting business.
economies of scale
I think you will find that the total cost savings are not that great either - you would expect far more for the money at the Amazon, Microsoft scale for example - but you really don't - they just take it all as margin.
*Only* reason I can think of using the cloud if you have tiny requirements < 1 full time colo or 'managed' server or alternatively if you need excess capacity for a limited time.
has been made into a film, a reasonably decent japanese anime movie.
"If anyone seriously suggests increasing the usage of Letter/Number CAPTCHAs, I shall cite them for "cruel and unusual punishment"
Agreed. I can't stand CAPTCHA's, firstly because most of the time I can't see them (not sure why), maybe my browser settings. Secondly, when I can see them, I have to keep clicking through until there is something that vaguely looks recognisable. It sounds good making them unrecognisable to OCR technologies, but most of the time I can't even read the CAPTCHA's.
I agree that something needs to be done with passwords though, because a keylogger would make any password (no matter how complex) worthless. And before people jump on the bandwagon and say that they are safe just because they don't click on links they don't know, open emails they don't know, visit sites they don't know, etc. Don't be so sure. Over the last year, sophistication of attacks has just become ridiculous and is a big problem.
Crappy for Business Users
Not so good for business users. As Telstra is forcing you to use this new fibre network, existing ADSL plans etc, will no longer be available.
Business users on ADSL Annex M plans, will be forced to go the full hog and get 100 Mbps / 5 Mbps. This is because the upload rate of the medium plan is 30Mbps / 1 Mbps. The upload rate is simply not good enough.
So this is simply a forced rip off by Telstra (ie no other choice at all) to force everyone onto their most expensive plans.
No it isn't.
Once the infected bots reach the second stage, they receive the list of sites to attack. But they also receive commands to self-destruct by overwriting the master boot record of their primary hard drive.
“If you want to destroy all the data on a computer and potentially render it unusable, this is how you would do it,” Wicherski said.
The MBR is easy to restore with quite simple tools. You can even scan a disk to find file system boundaries and restore the partition table with that data, plug the drive in, see if the partitions mount read only, if not try again.
Chances are he's innocent. Seriously.
The one thing missing from this story really is the compliancy of the police and/or media in spreading what is probably a horrible misunderstanding as an act of theft.
I love how the lions share of the commentators assume his guilt before anything else. Like one of the people on the papers forums I wonder if the following explanation is perhaps more likely:
- found credit card. didn't immediately go to police to turn it in as most people wouldn't do as they have other stuff.
- went to buy pizza
- handed over wrong card, hence he signed HIS OWN NAME
- got busted
No doubt he will be released, bailed, pay the dude his cash back plus court fees, apologise profusely for the genuine mistake and be let off.
Olives on a pizza are frickin' essential.
I politely disagree, see title.
"Is to learn the difference between GCHQ and MI6..."
MI5, MI6, GCHQ and DI are all part of the same organisation, which is the Joint Intellegence Commitee.
This title is required.
As childish as some of the copy anonymous may use in their exploits (in both senses of the word) the target itself is usually deserved of the abuse. So may I ask anonymous coward, why this would be the work of anonymous?
If you need to remove your working card details from iTunes, or any similar website, do what I do:
- Change enough of the information to render the card invalid. You could put in known test card visa numbers which pass the validation process but are invalid card numbers or you could modify the start/end date, issue number or name.
Do be warned though as modifying just the issue/end date and leaving the roll number the same could lead to your bank locking your account due to suspected fraudulent transactions. That's normally a quick phone call to clear up though.
This is something I find myself doing a lot, especially for online games.
How did the breach of his account security occur though?
I do feel for him, but what steps are we proposing apple does take? Plenty of stores let you buy gift vouchers for people online and they do not require you to verify your friendship. I guess we could get facebook to do it for us, they are nice and trustworthy.
I would be turning a far more critical eye on how this breach of his account security occurred. Whether it was a breach of his email account and a malicious password reset request, a shoddy password, or poor security on the PC's he accessed iTunes with.
Having said all that, apples handling of this customer complaint sounds terrible. And typical mores the shame.
I'm reading sentences like this a lot recently:
"spoof their IP address"
If you spoof your IP address you will not receive the data. If you HIDE your IP address with the likes of Tor you certainly won't be playing Call of Duty. If you login to a server and change the log files such that your IP is hidden that is also not spoofing.
What is this game?
- Analysis iPhone 6: The final straw for Android makers eaten alive by the data parasite?
- First Crack Bloke buys iPHONE 6 and DROPS IT to SMASH on PURPOSE
- First Fondle Register journo battles Sydney iPHONE queue, FONDLES BIG 'UN
- Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
- TOR users become FBI's No.1 hacking target after legal power grab