25 posts • joined 21 Oct 2008
Re: Very dumb idea
> Exactly. It's not a FTDI device, so why should any FTDI driver send any commands to it?
Because it pretends to be one. And as marcan points out, the driver doesn't discriminate between genuine and counterfeit devices - it sends the same commands to both, but they have no effect on the genuine part.
The driver doesn't need to have Microsoft's signature - it just needs to be signed with a certificate that supports with kernel-mode codesigning (which you can get from several CAs).
Re: All FTDI needed to do...
The driver update ensures that the official FTDI drivers (current and old) will ignore counterfeit devices. It's quire easy to modify the drivers to keep working with those devices (they're not bricked, they just don't pretend anymore that they're something they aren't), but such drivers aren't official anymore, and anybody using them should know that they do it at their own risk.
Re: Very dumb idea
> This device does not belong to FTDI, thus FTDI have no permission to make any alterations to the device whatsoever.
Exactly. It's not a FTDI device, so why should it work with any FTDI driver?
> What will be next for firmware updates to prevent this? Firmware serial codes and numbers, phoning home?
I wouldn't be too surprised - recent ProLiants have built-in firmware downloader in BIOS (which failed to do anything every time I tried to use it - it just gives you a black screen with an X for mouse cursor, and you have to power down the server to get away from that).
Re: Not visible here
> All while trying to install free and opensource Filezilla.
> I'd say that's a big-time fail for Sourceforge.
It's at least as big fail for FileZilla, too - SourceForge didn't just decide and put that drive-by installer up, the owner of FileZilla project had to give explicit consent.
> As you've probably started realising... if someone then extracts the un-watermarked picture from the client's product, and removes the metadata (easily done by accident or deliberately), then the photographer's traceability is seriously compromised. The work is as good as orphan.
Use a reverse image search tool, such as Tineye or Google Images (click the camera icon there) - both are surprisingly good at matching images, even when they have been cropped and recoloured.
> The most difficult for message formatting are the Slavic languages, with their multiple number cases, which provide no end of punishment for people who still write stuff like printf("%d item%s",count, (count!=1)?"s":"");
Guess what? Windows still doesn't know how to do plural forms properly, resulting in Explorer telling me "Selected is this number of files: 1"
My previous bank let you use either the calculator thingy, or you could install their middleware and stuff the card to an USB reader (but you had to get the reader yourself).
> And why is Cobian a Fail because you can't get it to work? If your running an 80GB system image backup on a network at 100m and it runs over 2 hours then the problem isn't the software. Letting it run for 5 days - now that is a fail.
It's a gig network actually, and I let it work for 5 days because I had some other long-running process working at the same time. I tried Cobian a few more times later (with some different settings), but since it never looked like it was doing any better than in my initial attempt after a few hours, I killed it (just for comparision, Windows 7 built-in backup took around 45 minutes for a full backup over the network, and TrueImage needed 20-30 minutes).
> Until you are at some kind of corporate level Cobian provides everything you need - including ftp and network backup which actually makes it likely that you will use the thing.
I tried to use Cobian to back up my system drive (80 GB) to my network. It took 5 days, and after it was done, I didn't find any way to actually restore something from the backup.
> As for Acronis I wouldn't buy something from a backup company that says "cloning, unlike backup, always requires a second hard drive"
Cloning in this case means disk-to-disk copy. At least in TrueImage's case, creating an image of the current drive isn't called cloning (and the image destination can be anything).
> Windows 7 has built-in system image utility which works perfectly, unless I am missing something?
It works very well if you're backing up to a local (eg. USB-attached) drive. It fails pretty badly if you're backing up to network (only allows a single copy to be held, it's pretty slow at creating said backup, and while it's backing up to network, the whole machine is laggy).
(and according to somebody a few posts up, it's crippled in the home versions of Windows)
I've been using TrueImage Home to make a daily backup of my SSD for about 2 years now. It's very fast (both when doing full backup and when doing incrementals), but it has a few quirks:
- FTP backup is apparently impossible to set up in 2011 - when you try to set it up, it changes forward slashes to backslashes, then complains that ftp:\\server-address doesn't exist
- backup to a network share works, but you really should run TrueImage as a different user if you want to do that, because otherwise it'll forcefully disconnect all your network drives, and close any files you have open over the network
Also, while backup is quick, restoring of a full image and cloning are both awfully slow (restoring individual files is fast). For some reason, when writing to disk, TrueImage likes to do about 20 seconds of writing, then takes a few minutes break, rendering what would be a few minutes of work to several hours.
Re: Ok, now I'm officially confuzzled
> So does that mean if I don't subscribe to PETA's masturbation site then some animals will die because PETA couldn't save them, but if I do subscribe then kittens will die on a regular basis?
Don't feel too bad - since the majority of the animals PETA "saves" are eithanized anyway, kittens will die one way or another.
I don't see much of a problem with this...
...since anybody sharing sensitive data over these services would certainly keep it encrypted, right?
Re: UAC violations
> The NT family were deisgned from the get-go so that in everyday use you run as a limited user but there are still too many lazy coders out there who take shortcuts that compromise the whole systems security, forcing you to run as root.
Problem with NT's design is that until Vista you were encouraged to run as admin.
Re: How about ...
From the blog:
"Yeh, one idea if we get enough callers so there are always a few concurrently is drop them all in to one big conference call and stream it live on a web page."
The article mentions Atom Z530 and then x64 - Z530 doesn't support x64 - only x86.
Re: number of malware threats
> Aw, really. And who is going to approve them?
What kind of stupid question is this - of course it's going to be Apple.
"Losers, by open sourcing they would give Opera at last a chance for a decent SunSpider score."
SRWare Iron 4.0.280: 472.8ms +/- 4.0%
Opera 10.50 Beta Build 3261: 394.0ms +/- 3.5%
I thought lower was better?
You still can't buy HP desktop machines with Windows 7 pre-installed here (in Slovenia) - instead, they offer you free upgrade, which actually costs 39,90€ for "administrative and manipulative expenses". Where are they shipping Windows 7 from - Afghanistan? And when you actually try to use the upgrade offer, you need to retry entering your product and serial numbers several times (closing the browser in between tries) before it actually acknowledges that you're entitled to the upgrade.
HP and multiple computers
I forgot to mention that after checking with a HP rep, I was told that you only need to order a single upgrade kit per computer type, and that you can use the same upgrade kit on all entitled computers of that type. We'll see if that's true once the kit arrives.
That's a DIMM package?
The inside box is much smaller than the DIMM packages we get here (which are about 20x10x5cm, with a plastic insert that's apparently made to hold 5 DIMMs). The outside boxes are usually somewhat smaller (though not by much).
I'm really interested in how exactly the trojan hides itself in the MBR - after all, there's only 446 usable bytes there, and the MBR is executed in real mode (and has to start the bootloader), while the OS runs in protected mode.
Re: To James Butler and Hud Dunlap
> Here, just have a few lines of code in the script that says "if IP matches Kentucky, display 'sorry mate' text, else give access to site"
Few lines for Kentucky, few lines for Texas, few lines for Germany, few lines for Iran, few lines for China, few lines for ... where does it stop?
- Geek's Guide to Britain Kingston's aviation empire: From industry firsts to Airfix heroes
- Analysis Happy 2nd birthday, Windows 8 and Surface: Anatomy of a disaster
- Review Vulture trails claw across Lenovo's touchy N20p Chromebook
- Adobe spies on readers: EVERY DRM page turn leaked to base over SSL
- Analysis The future health of the internet comes down to ONE simple question…