@Fibbles Re: Fingerprinting/characterising?
You're quite right. 'ps -A' shows more like 135 processes though my point remains the same.
5170 posts • joined 10 Jun 2009
You're quite right. 'ps -A' shows more like 135 processes though my point remains the same.
Right now, I have 35 processes running on my laptop (or so mate-system-monitor tells me). They all have a particular memory size and have other named characteristics. Could this list be regarded as 'normal' (assuming it is normal and my laptop is not infected in any way) and then any future changes be flagged as "alert - strange new process"?
I realise that as a home user I'm likely to install all sorts of stuff to try it out but for a stable commercial or industrial system then the 'normal' process profile should be stable and their characteristics known.
" ... aliases used by Daniel Craig, Natalie Portman, Sarah Michelle Gellar when they are travelling..."
Can I use an alias when I'm travelling or do the 'authorities' insist that I use the same name as on my passport and other ID documents?
That's what I use on my old router, but I realise that many people wouldn't have a clue where to start. I also realise that a serious and well equiped hacker would be able to sniff my WiFi devices MAC addresses; but there are further layers of protection as well as a 'strong' password.
.... when you give companies your mobile phone number. After a few similar but less distressing experiences, I don't give my mobile phone number to anyone anymore, unless I feel that I need/want them to call me and I regard it as a 'long term relationship'.
A 'beak' is a magistrate or a judge.
When I came back to England from Tunis airport, after a package holiday in Tunisia, back in 2000, lots of people were just standing around looking at noticeboards and waiting for flights. A security man was wondering around carrying what could best be described as a cross between a wand and a mace, about a foot long with a bulbous translucent plastic head. Every now and then he'd wave it around someone and every now and then it would flash coloured lights in the head and make a noise best described as 'beeeee-weeeeee-oooooo-beep'. Then he'd move on, apparently doing nothing about the lights and the sound.
He approached me and I decided the best course of action would be to ignore him. He waved the 'wand' over me as he passed me to my right, then the wand made it's noise. I made no reaction and he moved on. I can only assume that it was some kind of psychological test whereby a person who was feeling guilty about carrying a bomb or drugs would jump out of their skin and make a run for it - or so their security theory would go. The entire thing was surreal and very silly. Has anybody else encountered this type of thing anywhere?
If I am sent data in error and that data is encrypted, how can I see it if I don't have decryption processes and the decryption key? That would be the point of encrypting data for security in the event of sending it to the wrong person outside an organisation.
Within an organisation, there would be less risk in case of accidental sending to the wrong person, but you could compartmentalise by division/department etc. as far as was thought to be needed.
That would have been my immediate line of inquiry.
Edit: Mark, check out those 'environmental workers', I wonder how they might have disposed of the brains.
"dot-rodeo, dot-vodka", " .news, .golf", "dot-spot addresses"
How about .consistent and .convention?
(I remember when Star Wars was released and journalists wrote about those lovable characters called 'Artoodeetoo' and 'Seethreepio'. How I laughed.)
Can a player have the role of a female and/or a 'black' character and do all the things you described? If so, it would be non-discriminatory. (Just trying to be logical here.)
"Problems with the initial release of an operating system are nothing new, especially on existing hardware ..."
Does it usually run ok on non-existant hardware?
Wasn't that supposed to do away with the need to travel anywhere?
" ... you have to change the key frequently to prevent the world and his dog connecting from the car park over the road months after they left the company, ... "
Just remove their device from the MAC address filter whitelist.
That would be a series of experiments in which the measuring instrument is affected by each experiment. Not scientifically sound but good fun I'd say.
... my fridge and my central heating system will never be connected to the internet.
Why does an airport security gate need to be accessible from the internet anyway?
"As well as eccentric weights, which are already used in the gyroscopes of iPhones, ..."
I thought the integrated gyroscope used micro-machined beams with a mass at the end and force/strain gauge sensors on the beams? Am I thinking too 'modern'? One day, they'll use ring laser gyros I suppose.
" ... should warn every organisation that accepts credit card payments that they are an active target,..."
But it won't, because, "We're not retail/parking/whatever and we have good security; it was tested by experts (five years ago)."
My XP laptop went into terminal slowness after a long spate of Windows updates. This was just before Win7 was unleashed onto the world. I always thought that was a strange coincidence.
That's because it's irratatouinalle.
Coat: As fast as I can.
It was the fate of Acompli to be gobbled up by Microsoft. $200 million should be worth the pun-ishment.
Do Google (and others) publish a list of accepted and rejected requests for removal? I think they should.
If it was round, then it wouldn't have corners. I don't know where I'm going with this ......
Will The Register be hosting any of these brave pioneers, to show them what is possible? Imagine their reaction of seeing the consequences of letting a thousand commentards bloom.
So, tell us about the fanny.
I assume there is some kind of sensor to prevent it from retracting if a reasonably large/warm body is in there. Perhaps a small, well wrapped up person might be taken to a different world one winter's day?
For reference/research purposes.
The navigation system in my car is a large spiral bound GB road atlas. They are very cheap (about £2) and available at many shops and petrol stations. The disadvantages of my system are that it requires me to be able to think and remember stuff but I don't seem to have a problem with that.
It's at least 30 years since I called upon the 'services' of the police, unlike some people I read about or even some I know who've had cars vandalised or stolen or had their homes or businesses burgled. Yet, I still have to pay my general taxation and a distinctly annonated amount for police services in my councuil tax every year.
I'm far less of a drain on the police budget that these people, so why can't I get a rebate?
I immediately thought of war rocket Ajax. Can the asteroid be named Flash Gordon?
It's the colour of an unripe banana that's been stored badly in a supermarket warehouse.
.... being there when they boot it up and hearing it play its startup tune for the first time in decades. Awesome!
It looks like they need a syntax highlighting editor. ('mount', it's what jockeys do.)
You mean 'paywall', unless you really were making hacking attempts on the WSJ firewall.
" ... this won't be a quantum laptop but a scalable machine which will open a "pathway to quantum computers big enough to tackle any problem"."
After a short time, it will say, "The answer is forty two. I'll help you design the next one."
" ...the kind of firm that couldn't have existed in the 1930s."
Never underestimate the bandwidth of a packet steamer full of ribbon bound handwritten folio sheets.
Data latency would be a problem but that encourages a slower and more pleasant pace of life.
Why didn't you patent it or 'register' it? (Ask Apple for advice .... oh....)
Yes, this takes me back to the 70s when I was a student apprentice on a thin sandwich course. The entire system requires companies to have faith in their future, a 'vision' of long term stability in their operations and willingness to invest time and money in their staff.........
I remember a manager telling me that he wasn't happy that I and my fellow apprentices were given 'time off with pay' to attend a degree course, because we'd just leave for a better job when we'd finished. I said that we might do but the company could also recruit new staff who'd themselves had a degree education as well as experience in appropriate areas by similar methods, so everyone would benefit. He went quiet and scratched his head over that one.
questionable and quizzical?
I think that the Met gave a copy of what they had (been given) to Vodafone so that Vodafone themselves could figure out what they had done. The impression is that Vodafone just dug out a big lump of data without paying much attention to it.
However, the data was all about many journalists and staff at a particular news company. If the Met had asked for mobile phone data on one particular person who happened to work at a bank, would you expect the mobile phone company to give data about all employees of that bank? It may be that Vodafone had a contract to supply mobile services to the newspaper and made a mistake. It may be that the Met specifically asked about the newspaper and identified the original 'lone' journalist as a journalist working for that newspaper .... etc. I suspect we will never know, unless the Met tell the truth.
What is 'safe search' anyway?
Is that because the broken ends can stab into you then snap off and cause all sorts of problems?
Maybe they could rewrite it, slowly, with an average two year rewrite cycle? I don't think anyone would use this for long term archiving if no frequent access is needed. They could rewrite the entire drive, as a low priority task every two years ....etc.
Don't apologise to us, apologise to Académie française.
Isn't 'goodput' what you get when you've increased throughput?
"... an increased delay.", "... a moderate packet payload size ..."
I can't imagine that my fridge or central heating controller would be bothered or affected by an inreased delay or have anything more than a small packet payload size. Is this about the IoT things or the neighbourhood network data gathering process?
Alternatively, I can imagine the problems involved in controlling individual IoT enabled lightbulbs and kettles in a large office building; if you want to go down that route.
.... is to download a large and popular torrent, but not for a long time of course, just to test it you understand.
The mainstream press get their information from 'trusted sources', i.e. sources who they often have lunch and drinks with. The NSA and GCHQ are probably running a serious lunch and drinks operation on this one.
You make a good point actually. My first experience of Linux (Mint 13) was basically a good one but had at least a month of swearing, mostly because I was in a 'Windows' mindset after many years of using Windows. I've found that a quick Google search will point you to a variety of forums on which absolutely every aspect of Linux operation is discussed with forums specialising in particular distributions.
After a short time and a bit of refining searches, I found drivers and setup instructions for my old Dell network printer, my old Epson scanner and lots of well written advice on how to do many things. I've even set up a RAID-0 array, using mdadm, on my desktop PC after following the instructions and advice on the more technical forums.
Do you want to see pictures of my wife riding the pink pony? [We used an approved vegetable based dye, of course.]