2845 posts • joined Wednesday 10th June 2009 16:31 GMT
Re: Defense in Depth
Don't savvy IT guys set those buttons up as Schmuck Bait these days? The ones who press the button don't get the trusted positions and so on?
Re: A golden opportunity
But at the same time, any country with an excess of something (in this case, human capital) would do well to find ways to trim the fat, whether it be in inhospitable mines or as cannon fodder.
Re: Acer W510
The point was that 1024x600, single-core ;power-sipping netbooks were plenty good enough AND they kept the price down: which is another check for the netbook as well. I got mine used for $125, and most netbooks of the type run in the $125-150 range used depending on wear and tear.
Whether it's a service mark, a design patent, whatever. Point is, it's SPECIFIC. They're locking in a signature style, not saying any other electronics company can have a store. So I say, "So blanking what?"
IINM, Apple now has a Design Patent for their Apple Stores. It's not as if this is the only way to arrange an electronics store and has more to do with Apple's sense of style. As long as the patent is specific to this layout, I say OK they've locked in a signature style. Just steer away from it and life goes on.
Re: I think the only solution here is DBANing the drives.
If I were really sick, I'd give them a few hours through which time I'd try to obtain the victim's identity and address. If they didn't pay up, I'd scatter the pron around the drive (perhaps encrypting a few with a password), lock as much as I could, transmit the information to authorities in e-mails and self-terminate to leave little trace that it was malware. Unless the plods were ready to admit the computer was tampered, the victim can now be arrested for possession of child porn (which in most countries is a felony). That would add real fear factor to the scareware: pay or face the end of your freedom.
The sentiments of this article are echoed with this writer, who is in fact doing the exact same thing. Personal experience has shown that practical remote computing, even web browsing, requires a decent computer with decent software. Tablets are all right for occasional reading, but I type a lot, and the Bluetooth keyboard I brought with me was hit or miss, not to mention the battery life was an issue since you don't have options for them. OTOH, my Acer Aspire One had the option of tacking on not only extra batteries but also a bulkier triple-capacity one that gives me about nine hours of casual use and several hours on more serious stuff like video playback: not bad in my book, and it's proved genuinely useful in an environment where access to wall power is iffy due to my remote location. At least the wireless service is decent and they don't seem to have an issue with mobile hotspotting. For a small investment, I can stay connected for the duration of my trip.
And I thought I was one of the few who actually got genuine use out of these netbooks: small enough to transport easily (note: you don't have to open up netbooks at airport checkpoints) yet just good enough with its SD slots and USB ports to do honest computing work (including handling a TrueCrypted external HDD for the bulk storage).
Re: Licence agreements
Not even a Live OS complete with Kernel which by definition must have low-level access to the hardware in order to function?
Re: @Ru re. Oh How I Laughed...
There are different levels of bricking. Each start with the same problem: useless machine. But "soft" bricks can usually be remedied by switching the machine to different or alternate modes of operation that go around the piece of software/firmware causing the brick. Harder bricks usually affect some piece of software that can't be avoided. In this case, we're dealing with something worse, a "baked" brick in which some hardware or firmware component has been damaged, instantly rendering any fallback worthless because the failure is either in the fallback or affect something above it.
Re: Bad Firmware or Bad Ubuntu ?
Probably because the fallback routine needs to be updateable in case the fallback itself becomes an exploit avenue. And this fail occurred during kernel (Ring 0) operation, so it could conceivably do anything: even access the EPROMs that contain the fallback units, messing them up beyond any means of either recovering (because you now have a backup failure) or preventing (because it's already running at the highest level of trust short of hypervisor mode--who watches over the kernel?).
What about if you use Generation IV technology which burns the fuel more thoroughly and leaves less waste with shorter required storage times?
Depends mostly on the card. A Class 4 SDHC Micro is probably not going to be as speedy as onboard Flash. A Class 10, OTOH, should get you pretty close, and all SDXC Micro cards are at least Class 10 (as UHS-1, the minimum speed of SDXC, surpasses SDHC Class 10--it was specced for 1080p recording).
Re: MASSIVELY IMPROVES SECURITY: End Of Windows
They tend to get around that with botnets. Instead of 1 machine trying a million combinations, you have a million machines trying one each. This is hard to block since an actual user could be in the mix.
Re: These scanner should never have been installed
If you pay a little closer attention, you will also note that Israel has very few sanctioned points of entry. With that in mind, it's easy to concentrate your security resources. The USA, OTOH, has numerous points of entry, many of which are very, VERY busy. To employ Israel's style of security on ALL those points of entry (to say nothing of the thousands of miles of coastline and open borders) would probably compare unfavorably with the US Defense budget (already bigger than the next 10-12 countries combined, including China).
Absolute truth in advertising--there oughta be a law.
There really should be a law in the books that enforces absolute truth in advertising (we can use courtroom standards--in the US that would mean your words must be the truth, the whole truth, and nothing but the truth). If a lie or half-truth is found, the company is guilty of deceptive appeal to the public (thus enforcing the "case" mentality of ads--you're making a case before the public, after all), punishable by having the ad enforced as if it was completely true, compensation equal to twice the difference, and/or a temporary cease-and-desist against all advertising other than simple price points (this is the phone and this is the bottom-line price, that's it): be they print, Net, TV, or on location.
Re: Well if you're going to be picky
Wings probably aren't strong enough to support the shear from the engine thrust if placed on the wings. The idea makes me think of the Starfury from the Babylon 5 universe. It was specifically designed for what you mentioned. Four thruster clusters, one on each corner, each with a forward, backward, lateral, and vertical thruster so it can turn like few other ships could: even in place.
Re: This assumes you're looking out a WINDOW
"Best of all the CIC (or bridge) is well protected by being stuffed deep in the guts of the ship."
Andromeda had it the same way as well. Also, since the ships featured on the show were smaller, they took a different approach to protection. Instead of being huge and massively armored, the ships were more spread out with lots of open space between them. The universe of Andromeda had a lot of gravity manipulation, so the most common attacks were made by way of massive kinetic imapcts. The ships were designed to let the objects pass through: transferring as little destructive energy as possible to the ship itself. The spread-out nature of the ship meant it was difficult to get to the bridge in the center as its own gravity shields and outer layers would encourage more glancing hits.
Re: Power transmission?
IIRC overhead lines (especially transmission lines) use aluminum instead of copper. It's not as efficient but it's efficient enough while being MUCH cheaper.
If Google's smart, it'll be pushing VP9 support early, possibly touting decreased costs due to no need for licensing. They were too late with VP8 because too many H.264 devices were already out; now they have a chance to jump in while the slate's still clean.
Re: Does it work on Linux?
The planes themselves use customized built-to-purpose systems for the most part because of the high standards for safety required. As for the onboard entertainment systems, it's not surprising. If what I see in other industries is any indication, it's a customized embedded Linux distro (possibly even a specialist distro like MontaVista), and it likely has no external network access (with the possible exception of when it's undergoing maintenance).
Re: What a rubbish demo
How about encoding a segment of a football match (doesn't matter which type--all of them encourage movement)? With all the camera panning and player movement (not to mention the subtle green specking in the turf), that should tax the codec.
Re: so somebody can watch every detail of your internet banking transactions?
Sure, but if your bandwidth is so limited you have to call on a man in the middle to compress your web traffic, you have a trust issue. You can't really compress encrypted traffic and Mini browsers usually don't have a lot of horsepower or memory space to handle full-on webpages (that's why Mini browsers are chosen--to not chug the phones on which they run). So the only way the proxy server can optimize the traffic is to have access to the cleartext. So you're in a dilemma. The only ways to restore the trust chain are to (1) establish your own web optimization proxy, or (2) eschew proxies. For some people, neither option is viable (not enough resources for a full-on mobile browser, no resources for a self-owned proxy).
The file bloat is mostly a function of document makers going overboard with embedded graphics and fonts. Simple ones with only, say, one or two fonts and a smattering of relatively simple graphics, don't really tip the scales very much.
Re: Banks and Government
Any bets these banks that require Java get set up for drive-by attacks?
It is in programmer's parlance, since the official symbol isn't on keyboards nor recognized by compilers (since the symbol is Unicode). At least it's the C- and derivative-standard notation rather than the BASIC notation of <>. Since many of us don't know the escape sequence for the official one, why don't we just let it go at !=?
Re: Line of sight only?
Then again, that could be more a matter of signal strength, given that a satellite's beam, having gone a good ways, is bound to be pretty weak coming in, making it more sensitive to interference. 60 GHz may have a smaller wavelength, but it's also a much shorter trip, offsetting. We'll learn more as the kit starts rolling out.
Re: Colour me ignorant...
I could see it have some potential with tablets and cameras, both of which would get an ease-of-use bonus if you could just tell them to beam their video to the TV (both would need to be compliant, but at least there's a target market right there). Could also be a neat trick for future-generation PC video cards to reduce the wire clutter.
For some reason, all this new TV tech makes me thing of Transmetropolitan again because in that comic world, nearly everything connected wirelessly to everything else: piping the phone through your TV and so on.
Re: Board Games = Fun
I think the trouble is not the coddling itself (for very young children, games that are more fun than anything help to keep up their spirits) but rather learning when to wean them off onto more serious games. For me, I started with Chutes and Ladders, moved up to Sorry! and then to Monopoly, and we then had more fun from there with other games like Go For Broke!
Re: Board Games = Fun
I got curious with Risk and noticed all the different variations. Each themed game had its own gimmick variation, so I came up with a variation of my own which you can use if you don't use all the colors. I came up with the idea for making a "Gang Wars" version of the game, but I guess you could call it a "Peacekeeper" variant. The variation is that, at the end of each turn, you placed a piece of the unused color on one of the borders or routes (and it had to be one in contest), and that border is now blockaded for the rest of the game; you can't move anything across that border or along that route. Eventually, the blockades prevent any more war, and the game ends with a headcount.
"effing annoying animations"
Oh, I don't know. Some can be quite funny. I recall playing the PSX version once, and one of the "For Sale" animations (St. James Place, I think) had the bird actually crash into the "For Sale" sign (sadly, same bird flew through once it was gone). Made that property a local favorite.
Re: +1 Anolther Old Geezer
But in a nod to the international community, the cheapest pair of properties are now brown in the US instead of deep purple.
Re: Monopoly Money
Lemme recall my childhood. US, circa 1982:
$1 - White
$5 - Pink
$10 - Yellow
$20 - Green
$50 - Blue
$100 - Orange
$500 - Red
Re: So you'd be forced to play by the actual rules then?
Had that AND the $500 rule. In addition, we also had a touring lap (couldn't actually buy anything until you passed GO once).
Re: Hydrogen tends to be quite reactive
Thing is, you don't have a lot of them (compared to say millions of hard drives) and being a generating station you would have trained personnel on hand should the hydrogen content approach the danger zone (that's the thing--as long as the atmosphere in there is too rich, there isn't enough oxygen to allow combustion). Because once it does get into the danger zone, you're looking at a bomb ready to blow any moment.
These checks against safety aren't possible in a consumer environment. Besides, given our litigious nature, the first exploding hard drive will likely result in a swarm of lawsuits.
Re: Perhaps a Full Vacuum is the best Hard Drive environment then? (Patent Pending)
Why does the head need to "float" on anything at all? It would appear to me at least that a rigid arm that had the right clearance above the platter is all that you need. Using the Bernoulli effect (aerodynamic lift) for spacing the head from the platter was probably done in convenience only to accomodate the issues of an air/gas filled drive enclosure.
Because the tolerances at the microscopic sizes of the hard drive heads are practically beyond pure human engineering to reach on a mass scale. The Bernoulli Effect provides a much-needed margin of error by ensuring the heads stay a safe distance away from the platter. Without that cushion, given that both the platter and especially the head can undergo flexes or heat expansions that can cause them to come into contact (and since the arms are so small and so thin and the gap so tiny, it wouldn't take much)..
Helium is SO tiny (it has an atomic weight of just four and, being a noble gas, typically exists as isolated atoms) it can pass through even the tiniest of gaps. This includes nanoscopic holes in otherwise-solid plastic and metal. The casings need to be carefully treated to render them truly gas-tight.
Re: IE truly sucks
But how do you do that without breaking half the software in the world (a good chunk of which is very expensive custom business software from firms no longer in existence)? Look at how Windows 8 is progressing. They're trying a new approach that has more security potential, but it's been a rocky road.
Re: USPTO is underfunded?
"Bollocks. Just up the amount they charge to examine a patent so that it actually reflects the fucking cost of PROPERLY EXAMINING the patent."
But that runs the risk of raising the price out of reach of garage inventors (who unlike the trolls are honest inventors most of the time). Part of the mission of the USPTO is to offer their services to all inventors and trades to encourage their proliferation, so they can't raise the rate too high or it'll go against their mission. And the USPTO is important because without some sort of protection, people will be less inclined to invent for fear of copycats.
Re: "...unlikely to be something most non-techie users could pull off..."
FAIL FAIL. You're caught in a Catch-22. To paraphrase Spike Milligan, you're trying to unlock the program with the key you will find inside.
Re: Set higher standards for trivial patents
1. Congress doesn't give them a big enough budget to do the research.
2. Again, Congress doesn't give them a big enough budget to do the research. It takes money and manpower to do the research, and if you raise fees, you discourage people from applying.
3. Basic American judicial law states that in order to file a suit for something, you must be AFFECTED by the law or policy in question. In other words, it must have harmed you in some way or the judge is required to throw out the suit as frivolous.
Re: Consider the 6/8 march
A 6/8 signature can operate as a for the purposes of marching while also allowing triplet beats for the music (since 2 and 3 both divide cleanly into 6). IIRC the jig "MacNamara's Band" is based on marching music, but you can hear the triplet pattern of the notes within each third or "step" beat of the song.
Well, since Windows 95 seems to be the GUI with which most people are comfortable, why fix what essentially isn't broken (the style isn't the problem, really--it's the behind-the-scenes stuff)?
Re: 6/8 time...why not 3/4 time?
"Apparently it's down to the fundamental note length not being 1/4 note, but half as much again, ie, 3/8ths (a dotted quarter-note in sheet notation). Three/Four time is typical of waltzes and has a ONE two three and ONE two ... beat structure, but I'm not sure how to describe how 6/8 time sounds, or even whether it necessarily has a fixed place to place the emphases."
I'd been wondering about it for years, and now I have some insight. Dotted quarters with plenty of other eighths in the sheet--maybe in triples (producing a da-da-da rhythm) and/or following a quarter (for a daaaa-da rhythm). Now I can visualize it and can recall plenty of music that had these types of rhythm. Thanks.
6/8 time...why not 3/4 time?
I suppose there is a reason some compositions emphasize the eighth note rather than the quarter note. I'm just curious why some state their time signature as 6/8 rather than the reduced form 3/4 (which sheet-wise has the same effect--three quarter notes last the same amount of time as six eighth notes all other things being equal).
Re: @Mark Shuttleworth: Comments Of An Ubuntu User
Red Hat targets the Enterprise sector, where support IS a money spinner. Ubuntu is targeting the Consumer sector, where that's not as viable.
Re: actually thankful for ineptitude in this case
Maybe it was way before my time, but I never understood why the letters QX. Interesting thing about the fiction of that era, though. It would make for an interesting fictitious profile: a pilot with a penchant for precise use of maneuvering thrusters in inert space and a knack for making accurate physics calculations using a slide rule.
Re: This proves what I have been saying for years..
The trouble is that there is more than one kind of end user, and Linux has the misfortune to be courting TWO kinds who happen to have competing needs.
Linux's strength is in the power user: the user who knows how to get around a machine so is happy with having tools that let them get into the necessary bits and bobs. And if something happens to break, they also know where to go from there to get things fixed. At worst, they know how to install OS's on their own. To put it in a nutshell, the power user's slogan is, "Gimme the keys!"
And then you've got where everyone is trying to reach: the everyday user. The user who may not be too familiar with computers, who see them more as souped-up TVs than a powerful device. Their attitude is "spare me the details, get me to my stuff". The prevailing philosophy for the everyday user is, "Keep it Simple, Stupid!"
And that can easily fly in the face of the power user. What lights up a power user confuses an everyday user, and in converse, what satisfies an everyday user feels like a strait jacket to the power user. So when you have an environment where you have to court BOTH types of users...AT ONCE, there's going to be some fireworks.
I'm probably gonna jump that way, too. Need to get my Windows affairs in order first so I don't lose anything.
Re: Tunnelling over 443 wont work...
Like I said, I'm surprised it hasn't reached that point already. Even stego has limitations against a determined adversary with enough DPI tools to recognize potential carrier streams. They could alter those streams while still presenting acceptable non-secret data: random loss of bits of data, resizing, quality reduction, etc. With these techniques, you could reduce the potential stego flow to impractical levels.
- World's OLDEST human DNA found in leg bone – but that's not the only boning going on...
- Lightning strikes USB bosses: Next-gen jacks will be REVERSIBLE
- Pics Brit inventors' GRAVITY POWERED LIGHT ships out after just 1 year
- Storagebod Oh no, RBS has gone titsup again... but is it JUST BAD LUCK?
- Microsoft teams up with Feds, Interpol in ZeroAccess botnet zombie hunt