Re: Wrong Ship
I'm too slow... here, have a photo:
1555 posts • joined 12 Jun 2009
I'm too slow... here, have a photo:
if only a human individual can file as the inventor, why are patents mostly owned by companies, and used to obstruct competitors?
Just let the AIs register as patent lawyers, that's where the money is.
"you cannot change your ethnic origin" - That would be "European Royalty" for Mrs Elizabeth Saxe-Coburg Gotha. I think a case could be made for designating them as a separate ethnic minority.
@Ellipsis - I was with you until, "nothing to do with some perceived risk", 28 ATM logical attacks is not nothing, and it rose from 5 the previous year. It's small compared to the ATM physical attacks, and the physical attacks are lower than the ATM fraud, but "nothing" is a very specific quantity.
I've heard the NSA has positions for this skill-set.
We've had so many 'ventilation blocked by X' stories, but I don't think anything: dust, manure, deceased rodents; will beat this.
It would have to be a
weekly daily award...
"We’re constantly focusing on innovating." - so their autofocus is broken, and all the innovation is fuzzy?
That really does run hot!
@Prst. V.Jeltz - Try China: 中國, usually translated as "Middle Kingdom", implying "the centre of civilisation, everything else is barbarians". Or one that no longer exists: the Holy Roman Empire.
Would you count putting "Democratic" in your name as boasting?
@Roland6 - You forgot the joke icon, right?
No-one's going to update these insecure IoT devices that are already installed, and there will always be new insecure devices being sold by the latest manufacturers at the lowest possible price.
Our only hope is to make the exploits known, release the source code, and rely on competing groups of miscreants spreading the DDoS more-or-less evenly over their targets, diluting the effect. The internet equivalent of the Bangkok rush hour... everyone gets to work... eventually.
So called because it Sucks?
@Lost all faith... But what makes you think that nuclear devastation will deter Kim from doing anything? NK is a strong counter-argument to the MAD doctrine.
obligatory xkcd: https://xkcd.com/705/
Once called by a user about a new external floppy drive that wasn't working... took me 5 minutes to find the rocker switch carefully recessed in the overhanging base.
Hold on, I've got a PCMCIA ISDN (I Still Don't Know) card around here somewhere...
so it's easy to retrieve crushed phones and severed fingers. As a bonus, use a wipe-clean surface - blood stains are notoriously difficult to get out of fabric.
@Number6 - "perhaps if people started voting with their routers"
Sure, each time my 2-year contract nears its end, for the past... 8, 10? years, I'm not sure, I've asked around for ISPs IPv6 plans. So far, they have progressed from, "what's that" to "no plans" and "take a look at our really expensive premium service". Of course, they charge for fixed IPv4 addresses, can you spell "conflict of interest"?
At least with the Pinto there actually needed to be a collision at the rear end.
@Ken Hagen - I ordered a bowl of shrimps, and it was FULL of arthropods!
@x 7 - Sorry, I call fake. If it was a real durian, you wouldn't say "saw". You wouldn't need to get that close.
@Chris King - sounds like you're guilty of "disagreeing with the Government", and are therefore a terrorist.
The only hope we have is government incompetence.
So, no worries.
When a bank asks me for my DoB to verify my identity, I've taken to demanding that they send me a birthday present at the appropriate time. Sadly, this hasn't resulted in an increase in the number of presents I receive.
Well, there are theories that the inhabitants of the Isle of Wight are a different species, but...
"Also: 'Any work you do is ours. This includes work done outside the office, in your own time, and on your own equipment.'"
So, if I rob a bank at the weekend, the Directors go to jail? Are you sure you want that clause?
@Leeroy: Not "close enough", sure they game him a link and he followed it, BUT that led to, "the surveillance-ware was deployed". They were looking for more than the public IP address: "public IP address, MAC address, details of the logged-in user". The MAC address covers the, "it must have been someone else at the same ISP, these IP addresses are reused" defense (difficult to argue that someone at the same ISP happened to reconfigure their network stack to, coincidentally, the default MAC for your PC), and logged-in user makes the "someone else was using it" defense more difficult (I'm changing my name to Mr. Guest, BTW). They were working on getting a watertight link between the crime and the perp.
It seems the deception, that the agent was a journalist, was key in getting him to relax his guard... what harm could there be in following a link to a public article [edit: it says image... I'm only guessing that was in a page at a supposed news site] at a newspaper?
"Use your existing IT tools to..." Do you mean the undocumented switches on tar?
Remember, if you're in the basement, you can use dig
"Now kiddies, throw your phones into the deep end, then dive down and retrieve them"
You pass if you don't get back with a brick.
"I'll just adjust the seat so you can get your fingers in"
Worse: "It's a tight squeeze with your fingers in there, I'll just adjust the seat. Odd, that smells like burning flesh; are you OK?"
"All USB 3 ports and plugs are blue"
Which is a great help when you're trying to plug the cable in at the back. Remember that it always takes 3 tries to get the plug the right way up, so it's going to take forever to get it right.
With thanks to Old Tom and TP.
@Symon - mea culpa
Agree that a password safe is another good option. Doesn't beat the envelope option when the admin has been run over by a bus, though. It's all tradeoffs.
Sure it'd be a lot better than using a cloud service that doesn't do its job... But:
"what is wrong with a password-protected Excel file"
Check out the number of Excel file crackers that are available. You'd want to use a strong password.
"only IT (sysadmins etc) can view that file"
You loose accountability when there is more than one person who can view the file.
There are trade-offs. Sealing a password in an envelope in a safe is another option.
"old enough to be in a courthouse" - aren't courthouses public spaces where everyone, no matter how young or old, can bring their case to be heard? OK, most of what goes on there is going to be as boring as hell to anyone with a zest for life, and they need a standard for behaviour so that they can get the business done, but they are fundamentally public spaces, for the people.
"lanyards used at the conference, ... that contains a light and can be controlled from without. With impressive results, as the video below shows."
I hope that was sarcasm... surely an indistinguishable result could be obtained by a random flasher in each one? Wake me up when each one can establish its location accurately enough to show a readable message across the hall, and they are still cheap enough to throw away in a lanyard.
I must get one for my front door as soon as possible. It will make things so much easier when friends visit...
@Dr Dan Holdsworth - looking at genetic diversity to identify origin...
This could be an interesting study, but you'd probably want to study samples pre-Jet Age, (or, possibly, pre-World War I) when mass human travel stirred up the bacterial populations. Then you have the problem of DNA decay in old samples.
What could possibly go wrong?
@Dave 126 - Perhaps those "Free sound improving techniques" are there to flag up the gullible, and they are sending teams of con-artists round, looking for easy marks?
Perhaps they're selling training courses to stupid con-artists on how to look for these signs?
"but knew I was drunk..."
Like, who closed the server cage door?
I hope the gift card was good, a week of intern's pay is pretty cheap.
@AC - 'It was just more "in" the ground than "on"'
Well, no, "no damage was caused, other than to the drone itself", so the very expensive, military-grade concrete runway was completely unscathed by the incident.
Continuing this analysis, "Nobody was injured", so, on the basis that any landing you can walk away from is a good one, this was a good landing. They got the drone down, as fast as possible, without damaging anything else, and walked away.
For argument's sake...
You're down the pub with some mates, and a photo is snapped, you decide to go home, but lend your brother your jacket (it's a cold night) and your mates and him are later caught on CCTV doing something inappropriate with a traffic cone.
This system is likely to say it's you with the traffic cone.
Good enough for flooding you with Ads (road maintenance equipment, alcoholic support organisations...), but should NEVER be accepted as "beyond reasonable doubt" in a court of law. Of course, not being used in courts won't stop the security services using it when targeting drones.
read the headline and think, "WTF, Microsoft is killing Windows 10 ALREADY!"
No, no, no, no, NO! It starts,
"Wheear 'as ta bin sin ah saw thee"
What are you, a S'thner?
I don't think anyone else has mentioned (apologies if they have) the story I was told when young. While it is technically possible to detect the stray signals from a working TV, it's a lot easier to look for the aerials and cross-reference to the list of licenses. Of course, the old, VHF H-shaped aerials were big and easy to spot.
@anonymous boring coward
I wish you luck in your court case, trying to persuade a judge that a switched mode power supply isn't direct mains power.
@Charles 9 - but there's a limited number of look-alive Unicode domain names, and they can be permanently banned after misuse. Even better, for CC TLDs, only allow characters from the official languages in the country and prevent the misuse before it happens.
The criminals will always go for the low-hanging fruit, that's a good reason to improve the stature of the tree.