3634 posts • joined 10 Jun 2009
Re: Bridging IPv4 to IPv6
The problem has never been IPv6 talking to IPv4. There's a reserved IPv6 prefix for IPv4 addresses. The problem has always been going the other way: an IPv4 site wanting to talk to an IPv6 site.
But on the other hand, some things are irreversible once committed (murder, for example, or destruction of a unique object), so the only satisfactory solution in that case is prevention; anything else is too late for the victim(s). So in that sense, we won't settle for less than prevention because the only way the victim is happy is if they don't get victimized.
So how do you reconcile the justice system with such a desire?
Re: I find this amusing...
OK. How about ANY encrypted traffic will be inspected and anything the plod can't decrypt (= trusted and vetted site) will bring the Men in Black. Then make every site I allow require image mangling and other anti-stego techniques such that anything that would get through would be extremely low on bandwidth: impractical for large applications.
Re: A better solution: better defences
Impossible. The ability to access it is ALSO the ability to break it. Because of this, there's no way to create a system that is BOTH intrinsically secure AND easy to use: they work at cross-purposes. The only real way to improve security is to make it harder for EVERYONE to get in, but once you do that, you make it more onerous for the user, and it is usually the intractable PEBKAC problem that is going to do you in in.
Re: A better solution: better defences
"Rather than going through a public wringing of hands and gnashing of teeth as they bewail the fact that these criminals are doing the online equivalent of wearing a mask with two eye-holes, aren't there other ways to use their time and budget to better effect? Such as stopping crimes from occurring rather than running around - Keystone Cops style - trying to catch them afterwards: once they have their swag, or have tweeted vaguely insulting things about someones mother."
Because you run into the "eternal vigilance" problem. YOU have to be lucky all the time. THEY only have to be lucky ONCE. Meaning, by the Law of Averages, they're gonna get through at some point. Look at Stuxnet, that crossed a blankin' AIR GAP! So given that inevitability, the next step is to try to limit the damage, which is also easier said than done.
Re: Insurance is a scam only scammers can appreciate
Unless you actually have something go wrong. Me? I paid $10 a month once for the insurance. Nine months in, all the touch-buttons broke down simultaneously. Just flat broke. Got a replacement phone through the mail with little fuss. Phone kept working for the duration of my contract, so I call this Your Mileage May Vary.
Re: 24 hours?
People already know how to PREVENT the phones being bricked. Faraday bag.
We already have that. The HARD part is sharing and ENFORCING it between countries. Good luck with that part.
Re: Don't trust iSEC or NCC Group audit
Probably because any company NOT in bed with the NSA or GCHQ is in bed with someone else. IOW, it's pick your poison.
Indeed, given the environment, why contract an American security firm?
Re: Can web-based 'secure email' ever actually be secure?
"paper is a pretty virus- and hack-proof tech"
Au contraire. The virus can encode itself INTO the printout, meaning it can still be transported via paper: encoded WITH the message.
Re: Why I'd never use this...
Point is that if ANY part of the system can be arm-twisted by the US, they can perform MITM attacks to obtain your private key. This combined with hoovering the raw encrypted data would allow them to decrypt your emails. And since they can squelch, there's no way for you to know they've done it.
Re: Well ...
Last I checked, the Big Bang was considered more than a hypothesis but a theory: the difference being there is consensus in the experimental data being used to support the idea: red shift, accelerated separation, etc. While some healthy skepticism is okay, any competing theory would have to be able to tick more of the boxes than the Big Bang can.
As for "divine presence," a few questions always spring to mind. Foremost, if there really is a divine presence, why only one inhabited world so far as humanity knows?
Re: give me a break
The fossil counts as proof that life form once existed on Earth, and perhaps a living relative still exists on the planet, but that fossil itself is not evidence at all of evolution.
OR a Creationist would argue that the Devil planted those fossils in there to trick you into thinking the Earth is older than it really is. Similarly, it's impossible to argue facts when you're arguing lies at the same time. Even facts backed by consensus can be countered by the old, "one lies and the other swears by it." Fact is NEVER UNDENIABLE because you can ALWAYS call it a lie, boiling it all down to belief again.
Re: The takeaway . . .
There's another problem within the problem which is in turn wrapped around the conundrum. It's the belief that the situation at hand is PRESSING. Sort of like someone telling you the boat your on has sprung a leak. IOW, part of the debate is whether or not this is an emergency, as in if we don't do things immediately, there could be drastic consequences for which we can't escape (ex. having to swim the remaining 100 miles to shore because you took too much time arguing the context while the boat sank under you).
Re: Not surprising
The matter of "No Child Left Behind" raises a very important moral question. If we don't follow this principle, children WILL be left behind, resulting in societal rejects.
The moral question is, "What does our society do with the rejects (for the hopeless ones for which there's just no place in our society)?"
Re: WTF is PDT?
So IOW the standard is to base the times on the location of whatever or whoever is controlling the thing?
Re: Security risks
"And the way things are going AI-wise, you will just buy a container of Aperture Science Turrets and put them at strategic points. Problem solved."
Just make sure you get a load of good turrets. Don't know how much good a load of half-naked, empty, and snarky "crap" turrets will do in such a situation.
Re: Barcode anyone?
Someone at the thread about luggage beacons posited everyone getting an RFID tag like they make for pets. Embed in the back of the hand and all.
Then again, like with the barcodes, someone's always gonna try to clone them. I think the concern is that anything man-made can be cloned, so they're trying to use something biological and thus innate.
Re: What is really needed
If they're THAT nasty, it doesn't matter WHERE you put it. Some idiot takes the whole bloody case, there's little hope for you. Remember, we're not talking about preventing theft of the case and/or its contents. We're simply talking about a better way of keeping track of it as it moves out of your sight. The handle is just the most convenient location because EVERY suitcase has a handle.
Re: What is really needed
Tag chips aren't that big these days. The one for pets is about as big as a grain of rice. Perhaps a manufacturer can use this as a selling point: an RFID embedded in the handle with a 64-bit UID (20 for the manufacturer, 44 for a serial number). Especially now with more phones containing RFID readers.
Re: Wrong end!
The same thing will happen here that happens with those paper loops: they'll affix the wrong one to your suitcase and everyone will claim it went to Madrid because it was TAGGED for Madrid.
Re: But 3G does work
The article specifically mentions Japan has no GSM coverage. By that, I think they mean GPRS/EDGE. It would make sense for the device to go low-tech to save battery (higher gen=higher drain) while it would make sense for Japan to drop old tech frequencies to make room for newer ones.
Ergo, the thing uses tech too old for Japan.
Not much new
Basically a small version of a hemisphere lens. At least they're upfront concerning distortion. More a curiosity IMO but I'd try one for grins.
Re: Charged again?
The initial jeopardy has been negated by the ruling that the trial was invalid. But if he's convicted a second time, time already served must be accounted in a new sentence.
That's the thing about the computer industry vs. other industries: they move at different paces. In most other industries, it's pretty common to obtain a very expensive piece of equipment and expect this equipment to last a few decades at least (otherwise, amortizing the cost over the life of the equipment isn't worth it). Many of these industries are small, highly-competitive, and wary of the competition. This means there are no standards in them since no one trusts the other to agree on anything. End result: the machines become black boxes, and the computers that control them (part of this black box and the point of contention here) are full of proprietary trade secrets. It's a Hobson's Choice since all the players do the same thing; you have to put up with it or you can't play in the industry.
Re: not to diss open source software
Did you remember to install the Guest Extensions? This creates hardware abstracting bridges between host and guest making it much snappier.
Plus this solution only works if the only snag is software. If your problem is due to EOL hardware, you can't virtualized and you're basically on your own.
1) Relay it from some corner of civilisation.
2) Hotspot uses too much power.
"I want it to be designed for things I don't have yet."
The trouble is that reality never throws a straight ball (or to use cricket lingo, it's a nasty spin bowler). You try to anticipate technology going one way, you suddenly find out it's gone somewhere entirely different, making your spec useless. For example, there's a distinct likelihood monitor cables in and of themselves will be obsoleted in the near future with short-range high-bandwidth wireless. That's probably why tech companies are leery to plan for the future: the plan tends to go awry.
It's extremely difficult to make a coaxial plug electrically safe. You can get away with a headphone jack due to the low power involved. One of the design aspects of USB is that earth is always the first to connect.
Re: Here's what to do if you're stuck with it
The problem ISN'T fear of malware and such. THAT can be alleviated with a backup regimen.
The REAL problem is EOL'd hardware support. The example I gave noted that XP was the last Microsoft OS to support the ISA. The firm isn't worried about a bug; they're worried the ISA controller gives up the ghost since it can no longer be replaced. If that board goes, the entire CnC (which is a specialist machine full of proprietary trade secrets; therefore, nothing about it is public) would have to be replaced just because of that one controller. Because no machine beyond XP supports ISA, and since the controller is proprietary, it can't be virtualized, so just replacing the computer is not an option.
Thing is, IT lifecycles and industrial machine lifecycles differ by scale of about 10:1. Industrial machines typically run for decades, but the computers and software that control them aren't designed to work that long--their industry moves too fast to allow for building something with a 30-year working life. Another thing is that these industrial machines are expensive. It's their long working lives that make the investments worth it since the cost can be amortized over that long period. Short-lived controller computers are rapidly becoming weak links in industry.
Re: I assume ...
First, isn't exFAT considered SEP because it's part of the SDXC spec, meaning all SDXC cards you buy come in that format?
Second, doesn't UDF have a big memory overhead?
Re: Having a cracking time
Given the repeated findings that people give up their own passwords under the flimsiest of pretexts, the ideal system would contain features unknown to the very people to whom the credentials do in fact belong.
Which kind of puts you in a dead end since a credential has to be presented in order to be used as a credential. How can someone present a credential they don't even know about?
Plus, as I've previously mentioned, who authenticates the authenticator?
Re: Makes sense
The US doesn't have a sales tax. That's assessed at the state level and depends on the state. Oregon, for example, doesn't have a sales tax (Oregon's more of a "settle down" state, so they get you with the income tax and other fees instead), while New York and Florida have historically high sales taxes (due to high levels of tourism and/or visiting traffic--you can nail out-of-staters with a sales tax).
Besides, one key difference between sales tax and VAT is the point of application. VAT is applied at the wholesaler level (it's the retailer and any middlemen that are charged the tax--they just pass the cost down). Sales taxes are applied at the retail level (the customer gets hits for the tax and the retailer has to report and pay that tax to the government). I've noted that one advantage to a VAT is that it encourages honesty since anyone trying to evade the tax is likely to get reported by the next higher link (lest they get caught up in it).
PS. As of present, states lack the authority to force a business to charge a sales tax for its residents unless the business has a brick-and-mortar presence in that state, as that runs into the Commerce Clause, meaning they can't do it without authorization at the federal level. Congress has yet to pass an act providing such authorization, and they're pressured by e-tailers like Amazon to not pass one. Some states like New York can pressure some firms like Amazon by targeting affiliations established within the state, but not every state can use that angle.
If nothing else at least legal teams seem to have a little more sense but it shouldn't have to come to that to get the most basic of service.
Unfortunately, it's only when the legal team (very expensive) gets involved that the cost outruns the benefit of ignoring you. Any other situation, they could probably leave you high and dry 24/7/365.25 and they'd still turn a profit from the terminally stupid.
IOW, they make a killing selling you the stuff but would get killed the moment they have to support it. Now imagine this being status quo through a whole industry.
42 languages of user manual that's mostly disclaimers or warning about incorrect battery insertion (they ignore the excellent battery manufacturer's app notes on how to design battery compartments so batteries CAN'T be inserted wrongly!).
Because what you describe is impossible. At least some small but significant percentage of the help calls will be for people, in the sheer depths of stupidity, who somehow managed to cram a battery the wrong way into a compartment only designed to accept the battery one way.
"A common mistake that people make when trying to design something completely foolproof is to underestimate the ingenuity of complete fools." - Douglas Adams
Re: nine times out of 10, it’s explicitly meant to keep you from talking to a human being
At least most of them are toll-free now. Imagine if you had no choice but to put up with this on a toll number. And since it's likely a vendor in a captive market, the only alternative to give the vendor the finger would be to walk away with nothing at all.
Re: Photosynthesis, solar, ...
Believe me when I say I was not attempting to push a green agenda. I was simply seeking some kind of comparison between them (and I did have low expectations for both photosynthesis and photovoltaic--I was more interested in the scale of the difference).
Re: The real difference
What you're seeing are "defensive" patents, taken out on things they're currently inventing to make sure no one beats them to the punch. Defensive patents are prevalent in many industries, particularly pharmaceuticals where companies can't risk BEEELION-dollar-plus investments on new drugs on being stolen by the competition. So they take out patents on new drugs before they're ever made. Because of the time limit on patents, this puts the drug companies on the clock. To maximize their profit potential, they need to get the drug to market ASAP. However, they have to get past the testing the regulatory stages first. On average, by the time a drug actually gets to market, the patent clock only has a few years remaining on it.
Re: How hard it is to suck CO2 out of the atmosphere
Interesting discussion. Perhaps you can enlighten us with a related discussion. Compare what you've just described to photosynthesis: the energies, inputs, outputs, and efficiencies in comparison to the raw C from CO2 discussion you've just given.
Another possible discussion would be attempting to do what you described using non-grid sources like photovoltaic cells. Instead of money, perhaps time would be a good measurement to see just what it would take to crack CO2.
FireWire isn't THAT asymmetric. I've has my share of having plugs upside-down.
I think the main problem is that it's hard to be very asymmetric when one of your dimensions (in this case, height) is very limited. No matter how much you try, it's hard to make something of Micro's size other than something relatively flat on both sides. KISS principle would dictate that if one can't make the two sides easy to distinguish (which you really can't with a necessarily-flat plug), the next best choice is to design it so that it shouldn't matter which way you do it (that's what Lightning does and what Type C will do).
Re: What about On-The-Go?
*Facepalm* 10 as in 10 (decimal) Gbit/sec raw throughput. Future iterations could then use its maximum raw throughput as its identifier. Does a twofer: differentiates versions and tells you right off how far one can take a particular version.
PS. Remember, we're talking a spec that lay people have to understand, so it's best to stick to good ol' decimal.
What about On-The-Go?
I have one big beef about USB On-The-Go: using it prevents charging. I would like the IF to, while they're at it, modify the OTG standard such that a charging pigtail can be standardized, allowing users to do OTG and still keep their phone topped up (which can actually be important if the device being attached is a high-draw device like a portable hard drive--say you keep your video collection on it but you face a dilemma--it draws too much to be practical, and charging means you can't use the drive).
PS. As for a spec, perhaps it's time to stop using adjective names and start using numbers. USB 10 sounds like a good starting point, in any event.
Re: Re:Linux running most of the world's servers
I had trouble finding the actual thread. I see, so it's also custom hardware. At this stage, it's only "good enough" until it's "not good enough anymore". It isn't broke now, but it will break eventually, at which point one's lost the paddle needed to stay out of Crap Creek. A similar thing happens when a piece of hardware goes to EOL because a key component is no longer manufactured. It happens in every industry sooner or later. About the only thing that can probably be done is to start putting aside for some sort of migration plan while there is still revenue being generated.
Re: Possible solution for your client
In this case, it's still an option since the CnC is communicating via a network protocol. As long as the protocol can pass through the virtual network adapter, it should be fine. It's when you get to a direct-hardware controller (or other things that simply can't be virtualized) that things get dicey.
Re: Have you tried a Virtual Machine
Proprietary PC hardware is going to come to a head no matter what simply because the hardware and its maker will eventually run out of time. In a situation like that, the only option is to start saving up ahead of time since the day of reckoning is a question of "WHEN", not "IF".
The idea of using the VM is pretty sound in this case since it means the machine can be upgraded (as needed) without having to lose the XP functionality. It's something that should at least be considered and perhaps planned for by, say, imaging the current machine in a known-good state and recording important details such as IPs and MACs. It at least opens a migration path that is not possible directly, and the good news is that it's not something that has to be done right away or in one go. Get the machine at some point, start putting things together bit by bit so that it becomes a useful redundancy in case the actual controller PC does fall over.
"North Korea is increasingly turning out to be the short tempered, retarded cousin of the international community."
Problem is this retarded cousin still managed to wrap himself with dynamite and grip a detonator switch. Meaning we don't want to tick him off since if he hits that switch, regardless of the circumstances, things are bound to get mighty ugly.
"What they could have done is pushed the reasons why the customer should stick with a Blackberry on T-Mob and not be tempted by the iPhone; instead they cut off their nose to spite their face."
I think the logic is that they'll concentrate on AT&T and start touting, "You want a Blackberry? Go with AT&T!" IOW, Blackberry loyalists (and it has a history because of its enterprise focus) may start defecting from T-Mobile as they change models, assuming they are on T-Mobile.
Without looking, who was the Captain of the Mary Rose? Ok, who was the captain of the #23 Hudson Auto Ferry? Don't look at me, I don't fucking know. But the Captain of the Mary Rose went down with his ship and the Captain of the #23 Hudson River Ferry got to shore. Guess which one got future job offers and became extremely desirable because he had successfully navigated (Ha!) a very dangerous situation? Here's a hint: It wasn't the dead guy.
You assume the captain of the Mary Rose had the CHANCE to get to shore. Truth is, we don't know for certain just why she sank. All we can conjecture by the remains was that she sank very rapidly: probably too rapidly to make any difference. Also, the Mary Rose was engaged in battle, meaning it was under a different operating procedure. Put it this way, whatever befell the Mary Rose would probably be considered "unsurvivable" regardless of who was at the helm at the time.
- +Comment Anti-Facebook Ello: Here's why we're still in beta. SPAMGASM!
- Vid+Pics Microsoft WINDOWS 10: Seven ATE Nine. Or Eight did really
- Analysis Windows 10: One for the suits, right Microsoft? Or so one THOUGHT
- Xbox hackers snared US ARMY APACHE GUNSHIP ware - Feds
- George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests