@AC Re: Typical monolinguistic anglophone
I wasn't aware of that but did suspect it was so. Please give us a few examples for our education and amusement.
4938 posts • joined 10 Jun 2009
I wasn't aware of that but did suspect it was so. Please give us a few examples for our education and amusement.
"I speak with German people daily and come in Germany a lot ..."
The Germans must be very exciting people. I'm guessing you're not a native English speaker. Oh, those euphemisms and prepositions!
For a small outlay, you can set up a little solid-state FTP server in your own home. For about ten years, I've had an NSLU2 device that just keeps on running. You can still get them on ebay and there are other devices that will do the same thing. All you'd need then is an FTP client on your devices. You'd have to use email for 'collaboration'.
I used to use Evernote on Android when it first came out. It recognised phone numbers and you could tap them and have it dial the number for you. So, I used it mainly as a contacts directory. After a while, it stopped being able to do that.
The Colornote application (Android only) was still able to dial a number from a stored note and also has active links between notes, so I switched to using that as a contacts directory. Its disadvantage is that it doesn't have a PC client or a web client but you can e-mail its notes to yourself as backup for later copy/paste back into Colornote if needed.
You could wear a jacket with lots of big pockets in it for your essential personal needs. Also, a couple of bandoliers with lots of small screw-top storage cannisters. That would work.
Fail the third: Would a properly set-up firewall block that? What data does it send back to the mothership?
Fail the last: I'd give it the Edimax e-mail address.
Fail the continuous: Why do they think that any of this is ever a good idea? What do they want the data for anyway?
The tropical island with a secret base is just one of the six components needed. The space station is another one.
I'd like to see a video of a kitchen robot with a Gordon Ramsay personality/vocabulary assisting a human.
"... it was a metal clip on the sausage that caused the actual damage, "
I find that a smooth, close fitting metal ring around my sausage is very effective and doesn't cause any damage or discomfort to anyone involved.
When the various security protocols were formulated and issued, didn't they have a group of experienced white/black hat hackers to go over them with a fine-toothed comb to try to break them?
This attack seems like simple trickery and not particularly clever or complicated.
"The word 'pantheon' ... means 'to honour all deities'."
No, it doesn't. As usual, they can't even get the simple and long established stuff right.
The key exchange would be using a particular property of a quantangled photon link which ensures that any attempt to monitor the exchange would be detected; hence this is suitable for secure exchange of keys, if a bit slow compared to other communication methods and quite expensive.
From what I've read, the instant and 'spooky' communication at a distance can't be used for the instant transmission of data at a distance, for various practical and physical reasons.
I'm just a dog-basket physicist; a proper armchair physicist will be along in a minute.
"... if it focuses resources on the platforms Skype users prefer. "
What are their figures for platform usage and how did they determine user preferences?
You can use that as a headline every day.
In other news: The government said that ISP speed test websites show that broadband speeds are close to their claimed maximum.
The last time (only time) I tried Vivaldi, I couldn't get it to import my bookmarks.html file. I've installed, setup, configured and used many applications over the years but Vivaldi had me baffled. Is it now possible to easily import an external bookmarks .html file, like you can in Chromium, Firefox and Palemoon? Is it worth bothering?
What would really have brought Laura wide awake would be if after a few minutes of following her instructions, the caller had screamed and shouted, "They've all launched! The missiles have all launched!!"
"...accurately identify completely obscured faces using recognition systems trained on only a handful of well lit photos."
So, if I wear a thick black bag on my head, it can still recognise my face?
Shouldn't they be suing those two rogue engineers who did all the fiddling and sneakily hid their nefarious deeds from management for many years?
"The person responsible for handling the request advised the child's GP about it when it was initially sent, but in the absence of a sufficient written procedure, they "went ahead and released everything" according to the ICO."
A totally different dimension.
/etc/sysctl.conf is quite a short config file. I notice the following in my Linux Mint installation:
# Uncomment the next two lines to enable Spoof protection (reverse-path filter)
# Turn on Source Address Verification in all interfaces to
# prevent some spoofing attacks
I wonder why these haven't been enabled by default for a distribution that is obviously intended as a domestic computer. (Also, it shouldn't say "the next two lines", it should say "the final two lines".)
There is this one too:
# Do not accept ICMP redirects (prevent MITM attacks)
#net.ipv4.conf.all.accept_redirects = 0
#net.ipv6.conf.all.accept_redirects = 0
However, there is a comment that "Some network environments, however, require that these settings are disabled so review and enable them as needed."
"... these projects run up against state laws that prohibit governments from competing with private businesses."
Does the law actually say "government" or does it say "any form of legislative power" or similar expression? Is the law written in such a way that a remote town council counts as 'government'?
"... complaints by BMG that Cox ... and had blacklisted some of the services BMG used to track and report music piracy ..."
Would those be the torrent sites that BMG had seeded with their own torrents/seeders (for their own detection and tracking purposes) which had been blacklisted by Cox because they were under court order to do so as a result of other legal action?
Welcome ! :)
(Remember to regularly boot from a Gparted Live CD to copy your root and /home partitions onto another drive, as a backup, in case you get too inquisitive and experimental in the early stages.)
My apologies to Darren for overlooking him. I'm sure he's been installed and configured properly.
"MacGibbon said the vast bulk of DoS attacks are thwarted; ..."
"... Malcolm Turnbull has commented ... , labelling the incident a DDOS attack ..."
It wasn't an attack!
"(and Vulture South could not ask, because the press conference took place in a city where our operatives do not live)"
So, insufficient geographic redundancy, no failover agreements with other news providers, no emergency comms links. What happens if you or Simon are subject to a DDoS (Definite Display of Sickness) attack?
If the website operators (and the advertisers) are so concerned about ads being blocked, why don't they just buffer up the ads at the website server and deliver them as part of the main page? That way, nobody could block them. Some targeting software would need to be running at the webserver end but it doesn't sound too complicated in principle.
Not at all. Some of them are called Siobhan or Clodagh.
I'm still buying Gillette Mach3 blades for my very old Mach3 handle. The entire thing works just fine and gives excellent results with no problems. Can the same be said for Windows?
"... and is not subject to hash calculation."
Was there a 'good' reason for that, at the time the process was standardised?
The last time there was a cyber-heist on a crypto-currency outfit, they recovered the situation by doing a 'hard fork' of the blockchain. I'm sure I read that in The Register. Can't they do this here?
"Congress already has the power to regulate interstate commerce, ..."
Using old laws to deal with new situations is dangerous and lazy and gives bad results. That is why they are having this 'conversation'.
That one's going in the 'gold star' section.
No GiantKiwi, you must be new here. That's Camilla, a rare commentard but always an interesting one. She provides cynicism in a sarcastic box, wrapped in irony paper with a twisted humor ribbon as cute decoration. I copy her posts and keep them in a scrapbook.
"BBC staff were able to demonstrate this to my staff in controlled conditions sufficient for us to be confident that they could detect viewing on a range of non‐TV devices."
I bet that was easy. After all, the BBC controlled the conditions. He sounds like a yes man.
"... the BBC has ruled out combing its own records of computers that have logged into the iPlayer website ... this would be an inappropriate invasion of privacy."
What?? A website owner can't use their own logs to determine which IP address has been used by site visitors, even if legal infringements are suspected? What's the reasoning behind that?
I'm just glad that the detector crew don't ride around on white horses. Does a scythe blade make a good WiFi antenna?
"...as home users begin to potentially digest Anniversary Update."
Any more digestive system analogies?
"What the hell they did during those four weeks is anyone's guess."
If they didn't tweet it then it didn't happen.
"... the city can ... take pre-emptive action by warning people in their homes."
City announcment channel - 2am: "EVACUATE! EVACUATE!"
LulzCrew Twitter feed - 3am: "Gotcha!"
“We may also contact you regarding third-party inquiries we receive regarding use of the Online Services, as described in your agreement. You will not be able to unsubscribe from these non-promotional communications.”
Does this mean that I (as a third party) can ask Microsoft to spam anyone who meets certain criteria?
"We did not have the right safeguards in place, namely, to monitor external files. We clearly have not been vigilant enough. Over the next few weeks we will be working to become a safer, more secure organization."
Admit you made mistakes, recognise your shortcomings and work like heck to put them right. It's a refreshing change and I hope it starts a trend.
"Why it's almost as if ..."
I'd go further but wealthy organisations with expensive lawyers are dangerous. Did I say "dangerous"? I meant "formidable".
Perhaps it seemed useful/convenient/cool at the time of purchase. People often make decisions on that basis and don't consider what might happen in the future.
I don't even think you're being pedantic. (Don't get me started on the sheer ugliness of 'absent' being used as a preposition.)
I love the way that the commentardiat can start from just about anywhere and then hop, skip and jump its way to the truth. The journey is just as entertaining as the destination.
Your body has mechanisms with similar principles that prevent arms growing on your chest and teeth growing on your fingertips. For bees and other 'hive' insects, it's the entire hive that is the 'organism', not the individual insects.
The queen bee isn't 'in charge' of growing the hive's population, she is the reproductive function of the hive and she performs her function for the long term benefit of the hive organism.
"... and we always encourage our users to ... "
... lie about their DOB and any other personal identity related information.
"... when you consider all the other ways to launch applications, such as taskbar pinning, desktop shortcuts, and Search."
I prefer to put 'toolbars' labelled Programs, Utilities, Whatever, ... on the system panel for a quick and simple popup menu showing the list of shortcuts that I've put in the toolbar folders, as I did in Win 7.
These are pitiful compared to the pop-out panels that Win XP provided.
Luckily for me, the Linux MATE desktop has all singing, all dancing customisable pop-out panels that you can put just about anything on as customised icons. I'm sorry, I'm going off-topic.
If I was stuck in a remote place, I'd program the yeast to produce something 'relaxing'.
If quantum computing advances so much that it's a 'problem' in this way then quantum communication channels would also be quite easily available. I thought that one of the characteristics of a quantum entangled (quantangled?) channel was that you could tell if it had been intercepted,but it is relatively slow. So, they could send the secret symmetric key via a quantum-secure channel?
wgetis broken and should DIE, dev tells Microsoft