Naming of parts
> Blatter isn't a good Chinese name
The scientific name derives from the Latin blatta, "an insect that shuns the light" Wikipedia.org
1452 publicly visible posts • joined 10 Jun 2009
> Blatter isn't a good Chinese name
The scientific name derives from the Latin blatta, "an insect that shuns the light" Wikipedia.org
Oh Homer wrote:
> Most shocking, to me anyway, is the fact that this sick attitude extends to the deeply impoverished working class majority
I'm coming late to these comments, but shortly after seeing an even older Youtube video on the subject of US wealth inequality. It's difficult, as an outsider, to see how this situation survives in a democracy, except that the phrase 'indoctrinated by centuries of neoliberal doctrine into the delusion that they are all merely "temporarily embarrassed millionaires"' [Oh Homer, op cit.] sums it up very nicely. I can't be the only observer from the Old World, where "liberal" is a respectable description of a political outlook rather than a deathly insult, who wonders at the instability of the US system. By that I mean an analogy with the stability of the spinning plate trick: it requires constant intervention to prevent it from coming crashing down in an irretrievable mess.
Both Pioneer and Voyager spacecraft carry a plaque indicating the position of the Sun in relation to pulsars, so the first people to use pulsar navigation may not be people at all...
OK, pedantic wet blanket moment: the Milky Way is composed of billions of stars, but you can't resolve them with the naked eye. Despite the apparently overwhelming number of points of starlight in a dark sky, there's probably no more than 5,000 that one can see.
Source: earthsky.org
Thank you for the link, it's good to know that somebody has done some decent anecdote collection.
But... my eyes! my eyes! I haven't had to read orange on black since I elected to have that colour scheme on a DEC VT320, circa 1987. The site colour scheme brought it all flooding back: the hours writing extensions to EVE...
Under UK law, government computers have no greater legal protection than any other (although if you exfiltrate Official Secrets, then there's that, too). Computer Misuse Act 1990 <- here you go!
I just noticed that the Act contains no definition of a computer. Maybe sneaky peeking at somebody's slide rule might be an offence, who knows?
Obligatory disclaimer: IANAL, nor do I play one in any medium whatsoever.
El Reg won't let me post the quoted html from crashsafari.com here, but somebody has already done so at pastebin. I don't know whether the Google Analytics thing is the culprit within the javascript, or the huge loop shoving stuff into the browser history. Probably the latter.
Edit: explanation here[github.com], including why it crashes not only Safari.
Second Edit
Who the hell thought this was a good idea?
HTML5 introduced the history.pushState() and history.replaceState() methods, which allow you to add and modify history entries, respectively.
Some years ago, I was working in one of about a dozen different teams which were improving Information Assurance throughout a UK department of state. In order to track the performance of these teams, and hence the Department, the central organization devised a monitoring tool, which they were pleased to call a 'dashboard', implemented in ... Excel.
So, the teams sent in their performance measures to the centre, where they were entered centrally into the spreadsheet, which was then published.
So far, so good, and this went on swimmingly for many months, until one of my team members looked hard at the formulae underlying the pretty graphs and pie charts... It turned out that at some point in the dashboard's history [1] somebody had inserted a row into a "table" and put all the values off by one, so that reported values for target X were contributing to the charts for target X+1. Executive summary: Borked and meaningless. And this for a product that was meant to be tracking Information Assurance!
Irony overload, you might think, but that would leave you nowhere to go when you heard about the response from the central Information Assurance team. They acknowledged the fault, but declined to fix it, because "it would make the previous reports look different, and they had already been published to the Secretary of State".
If there's a moral, it's to have training for Excel operators in the use of the rather excellent but (IME) underused Auditing Toolbar, and then to audit its use!
[1] version control? No, that would have been a good idea, wouldn't it?
Uninformed AC is Uninformed, and frothed thus:
>[UC] are the ones who clicked on "ACCEPT" the terms and conditions of sale that included the harvesting of data from students emails.
They didn't click any such thing, and the terms and conditions specifically excluded the harvesting of data processed under the agreement.
Do read the article before spouting off.
>Then you can't disable it...
Come at it from the other direction, then. Disable the microphone device, except when you need it. This advice is clearly only useful if (a) we're not talking about a mobile phone, and (b) we can rely on Chrome not to fiddle with the hardware settings behind your back. Perhaps running as an unprivileged user would help?
Richard wrote: >Sorry if they did not understand terms of trade
And SW10 [1] wrote: >It's not clear to me that they made this trade
This appears to be the nub: Google made several statements to the effect that student and college emails were not being processed for ad-related purposes (see para 16 of the complaint, et seq.) and then admitted in April 2014 that they were taking steps to remove ad-scanning, i.e. they were then going to stop doing what they had said they wouldn't do.
Now, if you consider the terms of trade to be "ignore our stated privacy policy, you just know we're going to mine your data", then the suit is meritless. I don't consider that. I am one of those people who read privacy policies before agreeing to them, and consequently rely on them. If I thought that a company had reneged on that agreement, I'd consider suing them, too.
[1] Kensington & Chelsea? :)
Hmm... indeed. One of those low-risk:high-impact failure modes that crop up in these discussions is a solar coronal mass ejection that takes out a significant number of orbiting electronic devices. Unless we believe that Galileo, GLONASS, etc. satellites are better hardened against radiation damage than GPS, they don't constitute an effective backup (for that scenario).
As far as I remember (haven't looked it up) we're currently on the downslope of the 11-year solar activity cycle: I'm sure we'll have reduced our dependency on orbital electronics by the time of the next maximum. [Insert unwarranted optimism icon of your choice].
> unix presents non-file data as if it were a filesystem
Exactly so. This is the Unix way: in Unix, everything looks like a file, which means that you *can* pipe things between program outputs, network sockets, logical disk volumes, physical devices, and, crucially in this case, firmware (flash memory) on the motherboard. This is a Good Thing.
The bad news is that, for some broken implementations of UEFI, if one clobbers the firmware, the computer is bricked. Bricked, as in won't POST; as in {attach suitable chain && redeploy > boat anchor}.
All the fuss arises because the developers of software systems that make it possible for a (super)user to create boat anchors from expensive IT gear have a limited appetite for protecting people from their own, umm, creativity.
rm -rf appearing on a command line should strike fear into you, even without the EFI angle. I didn't really like even typing it in a Reg comment just then... hence the icon.
I think that's confusing an Internet Connection Record with a World Wide Web Connection Record (it wouldn't be surprising if the Home Secretary was unaware of the difference). If I cause to be executed:
jonathan@Odin:~$ ping 185.53.177.8
have I created an ICMP ICR to horsesex.com that would be of interest to the plod? [1]
If I did
$ lynx 185.53.177.8
I should certainly create an HTTP connection [2], but no objectionable images would be retrieved, so the WWWCR had better remember the browser's User Agent string, too. I would take a moderately large bet that the Home Secretary doesn't know what one of those is.
[1] Source:
jonathan@Odin:~$ dig horsesex.com
; <<>> DiG 9.9.5-3ubuntu0.7-Ubuntu <<>> horsesex.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22088
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;horsesex.com. IN A
;; ANSWER SECTION:
horsesex.com. 600 IN A 185.53.177.8
[2] I haven't done so, and don't intend to, so I can't tell you anything about the site, or even if it responds on port 80!
When we were putting somewhat secure PCs on office desks in 1996, they came equipped with removable hard disks which were supposed to be locked away at night. Several folk discovered that instead of doing the whole "Start, Shut down", power off thing at home time, you could get out of the door a few seconds earlier just by yanking the spinning RHD out of its slot and slinging it in the cupboard. Needless to say, file system corruption and disk damage ensued. In one (perhaps apocryphal, who remembers?) instance, the user complained that the open document he had been working on wasn't there when he plugged the disk back in the next morning.
But of course Eratosthenes (276-194 BCE) did measure the Earth's circumference, and did come up with a very respectably accurate figure. He did this by noting the angular discrepancy between the sun angles at two points separated by a large known distance. Not for nothing is this man known as the originator of geography.
Ref: Eratosthenes' method for determining the size of the Earth [wikipedia.org]
+1 for the link to Dr Park's "Seven Signs". My hobby now: posting that link on a metric shedload of kooky YouTube videos :)
More seriously, a proper sociologist could have a field day with conspiracy theorization [1]. Why are such ideas so attractive to certain individuals, and so enduring? It must be something to do with the gloating pleasure that the believer gets from feeling superior to the "sheeple". The very existence of that word is a data point. It would be interesting to know how many people believe in two or more scientifically unrelated conspiracy theories.
[1] Pedant warning: may not be a real word
@Sean Timarco Baggaley re Trump sues for breach of human rights.
There is nothing in the Universal Declaration of Human Rights about freedom to travel into a foreign country[1]
Article 19Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.
What the UK Home Secretary is able to do, and (as others have said) often does, is refuse entry to the UK on the grounds that the presence of the individual is 'not conducive to the public good'. I don't think that Trump would have a human rights case that the courts would not throw out in mere moments.
[1] Unless, of course, Trumpf should turn up seeking asylum (Article 14 refers). Could happen...
...and you lot are moaning about the colour of the taskbar!!!1!?
Anything you create with RemixOS does not belong to you, except that if you write about Falun Gong, or disappearing Hong Kong booksellers, The Government will be on your case. I wouldn't as much as download the ISO if you paid me, frankly, even if the OS looked gorgeous and outperformed everything else available (which it clearly does not).
It always occurs to me when folk talk of lightbulb inefficiency: whenever the lightbulb is operated in an environment which is being heated and thermostatically controlled, then the heat energy output of the lightbulb isn't being wasted. It is contributing to heating the space it's in, and that means the thermostat will click off that much sooner. For much of Northern Europe, when it's dark, it's cold. My venerable Anglepoise is at this moment sitting in the corner, helping to keep the room warm.
Security team: Your access privileges have been altered in line with the recent audit. Sir.
PHB1: Put 'em back the way they were, son. Of course I need access to everything, I'm in charge. And don't come running in with that password-change crap, either.
1Pointy Haired Brigadier
There are provisions in the UK legal system for the confiscation of the proceeds of crime, independently of any fine. Perhaps this is the correct course for deterring future offences. As it stands now, this individual has a £4,000 profit balance (although no job, and a criminal record...)
Edit: Wired-gov.net reports that the chap she sold the data to also got a fine of £1000.
Exif metadata is integral with the file (.JPG, .TIFF, .WAV) so is exactly as durable as the image data portions. If one were to edit or re-encode the image, there is a real risk of altering the Exif; simple error-free copying will preserve it.
Also, +1 for the earlier comment pointing to dvdisaster.net which enables one to pre-calculate error-correction codes which may make DVD images readable if it becomes damaged. (It won't work for already-degraded disks - lost data is lost!)
Yes, indeed.
On two occasions I have been asked, -- "Pray, Mr Babbage, if you put into the machine wrong figures, will the right answers come out?" In one case a member of the Upper, and in the other a member of the Lower, House put this question. I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question.
Passages from the Life of a Philosopher by Charles Babbage, p.67
Whacked by their northern neighbor
Hmmm. That could be made to look like a botched NK test, couldn't it...? After all, it's the nuclear capability that is the target, not Pyongyang.
Then turn the tin-foil hat inside out: a botched test could equally be blamed on a neighbor-whack, or on others further away. This is why developing nuclear weapons is a dangerous business.
The update is illuminating, in a dim way. So the Joint Committee holds hearings, supplemented by written evidence, but we are not permitted to know what that written evidence is, until The Committee deems the time right. At that point they "publish" the submission (or perhaps their edition of it, who knows - they're capable of forbidding the submitter from pointing out discrepancies). I'm willing to bet that some wonk will be appointed to choose the time of publication, and that its brief will be to get it out when it's least damaging to the Home Secretary's objectives. Is the ISPA permitted to publish an abstract or precis of their evidence? Surely The Committee doesn't own the ideas therein?
Final thought: even if The Committee were to rebut my allegation convincingly, it looks as if they're engaged in news management. To what democratic purpose?
Juniper's advisory says
During an internal code review, two security issues were identified.So, more than a cursory glance, and that is in fact how it was found. The CIO said that the code review identified "unauthorized" code. Whether or not Juniper will share with us how that backdoor got into their code repository remains to be seen; it's interesting that it seems to have been 'camouflaged' to look like a printf() command. That's not what you'd expect from some developer putting in a time-saving routine during development and then forgetting to remove it before release, it looks like something that was designed to stay under the radar in released software.
What the hell is going on ...?
Reading the page source, one finds that the image is called 'bergonic chair.jpg'. Searching for "bergonic chair" leads me to the Otis Historical Archives National Museum of Health and Medicine Flickr stream where, lo! the same image reposes.
I then observe that it's got a CC-BY license, which means El Reg should already have given you this information:
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
“The MoD can confirm that Windows XP will not be used by any onboard system when the ship becomes operational”
But we don't have a direct quote to support the statement that all the on-board software will be newer. After all, Windows 3.1 is probably resistant to all manner of modern malware.
Fired (haha) with enthusiasm, I signed up for the B2 beta. There's a typo in the command line tool, though, that makes it impossible to authorize an account. To fix, edit line 352 from
352 auth_urls = {'-production':'https://api.backblaze.com'}
to read
352 auth_urls = {'--production':'https://api.backblaze.com'}
that is, add a second hyphen before "production".
Derek's experience highlights two important aspects for backup policy. (i) Test recovery at the point of implementation, and often thereafter, and (ii) have redundant secure key storage.
I know nothing about Backblaze, but I'd be much more comfortable with a company that doesn't store my backup encryption key. If they can decrypt my backup, there's always a chance that they'll get hit with a court order to do just that. You either care about that possibility, or you don't.