assisting developing nations to live by the rule of international law
1429 posts • joined 27 Apr 2007
assisting developing nations to live by the rule of international law
To protect ourselves against these extremists.
Not only cover, but a rare opportunity to get a glimpse of what the two governments can actually do, what they can't, and what they think is important. This could be an intelligence bonanza for the crims.
I wonder if DPR is related to AC. There seems to be an awful lot of them.
"We must also remind ourselves that companies can be victims, and that those who take responsible steps to safeguard customer data deserve recognition and protection."
To avoid liability it will be better to report a horse thief rather than saying you left the barn door open.
I would actually call it double speak at it commonest. Deny, deny, deny, is standard criminal behaviour, so regardless if these guys are criminals or not, they're at least aligning themselves with the methodology.
That's not going to happen when there's a buck to be made by exaggeration. The press has a lot to answer for as well.
I thought part of the problem wasn't regulations but contracts imposed by ISPs simply for getting the service to these rural communities.
Perhaps you're from Seoul or Tokyo, but where I come from we wouldn't call San Francisco a "rural community". That project was probably doomed to failure anyway, but in its wake we saw (as the Economist writes) "Together with their wired divisions they vociferously denounced any public money assigned to private city-wide networks, even lobbying for laws banning it." However, in some cases, as in the little Canadian town of Olds, a municipality can form an ISP as a private company. I don't know US law, but it is possible that even to do that, there will need to be some changes.
The problem is that the incumbents have positioned themselves as them vs. us. The only way to fight that is to compete with them. If they want to come over to the customer's (or society's) side, then fine. But I don't see that happening, so municipal funding to help "our" side is actually in order here.
No tin foil hat needed. To me it's simply a matter of principle. And yes, Google Analytics is already over the top for my comfort. I don't put all my eggs (or in this case identity information) in one basket. Google knows too much about people. If you give them your credit card, street address and phone number as well, then that's just simply too much for them to have. I say NO!
I didn't get the billing address notice because I was using a US VPN. Presumably they're talking about a mailing address and not just a US Paypal account. Anyway, I took the time to look at their TOS.
“Account” means Registrant’s Google account.
So I guess Google will be incorporating all that lovely whois data into their general user records. I for one, am not going to buy into that. I'll get my domains elsewhere.
Of course they do, and that's why these newfangled tlds seem useless on web sites. Where domain names matter is in print.
I would have liked to know a little more about the students themselves, but I guess for an IT presentation, and with time constraints, this wasn't gong to happen here. Still, what a great presentation.
BTW, the video here was unwatchable, but I got a good stream of Will Scott's presentation from the North Korea Tech web site.
Who knows if Wheeler's 25/3 broadband proposal would do any good. Greedy rural ISPs can just drop the word broadband from their advertising. "Git yer 1 MEGAbit MEGA Internet Access!"
Canadian govt defines "broadband" as 5Mbps now. Rural ISPs, who of course don't come close to that, advertise "high speed". Problem fixed.
it might be quite hard to fidget deliberately at exactly the same level as you do when you’re not feeling guilty," Anderson writes.
People often believe what they themselves say and don't feel guilty. They don't think they're lying. For example:
Computer scientists at Cambridge University are confident that results can be improved
So, are these guys fidgeting at exactly the same level as they normally do?
the documents often suggest that the NSA doesn't really have good internal communications.
What could go wrong?
. . . people say 'wow' they can do this! I don't know why we have the expectation that we have these superhero organisations.”
I'm probably not the only one who hasn't been fooled into thinking that the NSA can do everything they wish they could. However, because they have so much power, the fact that they're not as organized and skilled as they pretend to be makes them even more dangerous.
Cyberspace is not a space.
Yes there are tragedies, but that doesn't make the legal system the correct tool for dealing with the issues.
Agreed. The legal system is indeed the wrong place to deal with a lot of things. Unfortunately, it's far too easy to make laws. What we need is a law against making laws .... oh wait ...
Is there a "house arrest ankle bracelet" app? I smell an opportunity here.
Send a message indeed. And like any other schoolyard bully, they have no idea what message they are actually sending. In this case it's particularly embarrassing.
It'll likely be the start of WWIII.
One shudders to think that could be part of the US agenda.
They used bing I expect.
More likely it was the bong.
You don't know that there are new bugs/undiscovered old bugs at the time of the upgrade.
I'm not convinced that what you don't see won't hurt you is a practical philosophy when it comes to software. History shows that there is likely to be bugs in a new version. One way or the other, you take your chances. I think that a big part of the problem regarding unknowns is that updates often don't just fix know problems, but include additions and features - thus adding to the chances of failure.
Indeed, this just goes to show that blindly updating to the "latest version", as is religiously pushed by many, is not guaranteed to lead to better security.
"both have Android and iOS smartphone apps that connect via Bluetooth."
Presumably it automatically posts your score to Facebook and sends out a tweet.
Politicians have refused to rule out that North Korea was behind the attacks
Or any of the agencies involved, was that they wanted it to be North Korea, which cripples the investigation to start with.
That seems to be the norm in those circles. In this case we don't really know, but I suspect that unrevoked access credentials is indeed the root cause. Many other people here probably do too. If it turns out to be true, then I wonder how the FBI (et al) will manage to spin the story. Yes, they'll look pretty silly, but they don't seem to mind that as long as they can fool themselves.
So, I read an excellent review on ElReg. It looks like this:
It's absolute pants. I watched 20mins and meh. Smacks of marketing campaign to me when Sony realised they had a turkey.
I decide it's bang on, and reading that on the Register is better than watching the movie. Judging by the upvotes, other people also seem to think it was an excellent review. Then why am I getting downvotes for agreeing? Not that a few downvotes makes no nevermind, but I do have to wonder what is going on here.
Thanks for the excellent review. I'll just stick to reading ElReg.
Would a DDoS only affect PS4owners?
I don't own a PSx, but still can't help but think that a lot of recent problems are misdiagnosed by Sony.
The real Anonymous or just some anonymous anonymous.
I'm pretty sure it's one of the G.711 algorithms like A-law and ulaw.
. . . but there is no need for our media outlets to state it as fact that it was racist.
In fact it is somewhat offensive. Even if the author is fluent in NK language and culture and knows for a fact that this is intended to be racist, there is no need to fan the flames. Also, if perhaps the original statement was not intended that way, then the author would be expressing his own racism.
Most people I know will never knowingly go to a page hosted there.
You're thinking of Wordpress.com, that's different from using the software locally. The article says:
ISC.org used WordPress as its CMS
I disagree that colour is an irrational factor. As someone who likes computers and electronics I still chose my devices based on many factors. I am sitting here amidst a pile of open computer cases and exposed wires - a sculptural compilation which has taken much thought and innumerable decisions - some involving data processing performance, and others - colour. I personally think that to chose one's environment based on one particular type of performance factor would be bizarre. Not necessarily bad, but certainly worthy of further examination. I would however admit that choosing a computer based on processing power alone would be equally rational to basing ones choice solely on the colour of the shell. The bottom line is that there are different rationales.
Does anybody have a confirmed explanation of why Fadi Chehade is acting this way? I don't think he's well.
Well I Googled it and found nothing. Then I checked about:config in Firefox. Now I ran the EFF Panopticlick test. I'm getting nothing that uses the word clock. The only thing that I know which is browser related is an actual clock display on a desktop, and of course there are also plugins to display a clock right in some browsers. Both of those would require a screen shot as far as I know, so how would that tie into the article? A clock showing in the IP camera video would likely show the time in the store. If you actually know what the reference in the article is specifically talking about, I would appreciate you telling me what it is.
Attackers appeared to be located in India according to analysis of requests made to command and control servers which revealed a web browser clock set to GMT+0530, and a new unpacked BackOff malware sample confirmed to have been developed in the country.
I'm not sure what "web browser clock" refers to in this context, but if it's something which indicates the OS time zone or locale, then I'd think it would be prudent to spoof it. I do that as part of what I consider private browsing, but perhaps I'm not understanding the intended meaning here.
I'd use the Tips and corrections link instead. But then that's just 'e.
Can drones and roos coexist, or will we start to see the adverse effects of an invasive species? I guess it will come down to the balance of the roos resistance to invasion and the propagule pressure of the drones. So far it's looking good for the roos.
Linux isn't my main OS, but I thought the philosophy behind this sounded so hopeful that I sent them a couple of bucks. Also hoping they'll banish NetworkManager.
In response, ICANN's CTO David Conrad told The Register his organization had struck a balance between fostering innovation and competition and maintaining the stability and security of the network.
There's that word again: innovation. Since when does "innovation" rank as something that is needed to balance with stability and security?
Can anyone actually confirm that KDC, or his company, was actually sharing illegal files.
The way I understand it, in America (which seemingly includes NZ) it is not necessary for the government to prove guilt before giving somebody a hard time. In this case, the US govt. claims to have the evidence, but will not share the details. The system is based on a mythical trust, but in reality it is based on power. As far as I understand this case, the hierarchy goes something like this: Hollywood -> US govt. -> NZ govt.
Indeed. Durov was somewhat biased when he said " . . . Mark Zuckerberg's firm had "no guts and no principles." They're just different principles.
It's in their culture. When I read something like the following, I can't help but thinking that Sony does not, and is likely to never, take any responsibility for themselves.
The company's also tossed a sueball at Twitter, asking it to remove Tweets containing screenshots of purloined documents or face future action over any losses Sony incurs.
In other words, they don't get it. In the corporate world there's no cure for that.
According to the article, the report says "The result was that a blast furnace could be shut down," but I don't see where it says that one was, or that anything was damaged.
So, I'm advised to "avoid using" a list of TOR exits and services. Very well and good, but how do I do this?
I don't think you need to do anything. The servers are now blacklisted, so that should take care of that.
From what I can tell, the Tor exit cluster operator in question is doing the right thing, but seems a bit confused himself. He talks about it here. My feeling is that this could very well be an unrelated situation which is getting over-reported because of the earlier Tor announcements. When I read the following, I can't help but think that the ISP could be screwing around and it's all just a minor and local incident.
5. Support staff at the ISP have confirmed to me there has been unauthorised access to my account. This could be down to the fact I access the control panel often via Tor (yes, using TLS before anybody asks), however it does raise the prospect of a non-LE person(s) being behind this but does not explain why a chassis intrusion was detected for example or anything else to do with on-board sensors.
IDC's definition for public clouds is nice and tight. It says they are “... open to a largely unrestricted universe of potential users; and designed for a market, not a single enterprise.”
I parse that as "clouds" being replaced by "market". Perhaps I'm missing a definition of "tight".
Nice review. I imagine the movie does pull the right strings and I won't argue with the value of that. However, looking at the clips it looks like garbage otherwise. The Margaret Keane story is a very interesting one, but not one that Holywood can tell. Not without looking at itself - and that's not going to happen.