94 posts • joined Tuesday 16th June 2009 15:02 GMT
I absolutely agree with you there.
In fact this is the reason I have "returned" my Applecare on my recent laptop purchase. £200-odd quid just to have a subset of my already legal rights, oh and telephone os x support...... herm...
i bought it because i thought it included accidental damage but it turns out thats only for iphones....
Exactly right Robert, I agree.
Except that maybe "Punishment on allegations alone is unlawful" - not illegal :) Theres a serious difference.
"A 12 gramme CO2 cartridge* will produce a mere six litres of gas under standard atmospheric conditions"
so surely the gas will be compressed ?
You say "This is why public opinion isn't used as a measure of guilt in courts" - but isn't that exactly what a Jury is?
@ AJ Stiles
"If it's another language that tries to use "+" both to concatenate strings and add numbers, and/or tries to use the same comparison operators to compare strings and numbers, then it's doomed to failure."
oh yeah, exactly like how perl failed.....?
what a bad idea. speaking from experience, atm's should be kept within their own networks as that is generally the only non-physical security they have. not tied to "the latest-buzzword" (cant bring myself to say the cloud instead of the internet)
More car reviews....?
"While it lacks the immediate thump-in-the-back of the 2.0 litre turbo petrol engines"
...thump-in-the-back from a FWD car...?
"With 138bhp on tap the 0-60 sprint takes a somewhat leisurely 9.3 seconds but the top speed is an autobahn-friendly 129mph."
...clearly you don't go on autobahns...
...but the police could seize the safe and then break the safe and then youre back to square one, where the password to go with the secureid card is being demanded...
USA Imperialism ? What's that then?
...and how did it happen before GB Imperialism ?
"Would it be too much to hope that the various government-related orgs that have been embarassed by LulzSec will now sit back and work out why they were so vulnerable and beef up their BLA BLA BLA BLA...."
you just dont get it do you? maybe the bbc site might be more your level... hiring a botnet for $50 and ddos'ing a public information page of an organisation isnt hacking that organisation...
i just asked a mate what lulsec have actualy done that wasnt a DDoS.... apparently some password hashes from poorly-configured webservers and a list of ATM's and their lat/longs...
Now the ATM one sounds interesting (bank attacks?) until you ask yourself where this could of come from... It'd be a fairly simple "hack" to take apart a TomTom now wouldn't it...
"But in general when the British forces perform badly it isn't because of a lack of skills and training. It's far more normal for them to be let down by their kit. "
LOL - bad workman blaming his tools, there ?
> "he de-compiled the binary back into source code"
> That's not technically possible, nor will it ever be.
...you go on to talk about dissassemblers...
These tools/techniques have been around for a long time and are suprisingly effective with some less strippy languages such as java. Of course, getting the original source code back is nigh on impossible (think, breaking an egg and then trying to put it back together) but this doesnt mean you cannot get effective code that works in the same way - modelling the broken pieces of said egg and producing your own model that whilst similar in function and design is not the original...
Skype has had some pretty good protections built into the code from what i hear, to stop exactly this kind of analysis. So well done. And, its about time :)
By the way......
To all who make the dumb comments like "but its okay for MP's to steal money is it?!" ... and so on, well... no, of course it isnt. scumbags living off the state because theyre too lazy is bad and MP's who misrepresent their expenses, thats also bad.
Just thought i would clear that one up.
"thirty or forty people out for interviews for *every* job vacancy, the odds of them actually getting work are pretty bloody slim."
interview much?? any decent job is going to have at Least 40 applicants. stop with the EXCUSES. anyway, if you do 40 interviews you can expect to bag one job, on average... so do ten a week and within a month you have a job ??
"He is a benefits claimant and I work."
If unemployment benefit - tell him it's about time he got a job - you go to work to pay for him not to.
--how did this post get 11 downvotes ???? Why shouldn't he go and get a job ? I might have totally misread the readership of this site.... Are we not all hard-working IT professionals ? Are there 11 layabouts to every 2 workers ? How do you pay for your internet connections ? Just wonderin.....
0.5% to 2.5% ?? so a variation of 2% ? Can you cite a source for this ?
I personally don't beleive you. I know of several areas where it is within the culture to "all claim" as much as possible, whilst topping up with whatever else. It's a gravytrain for some people.
2 short planks...
"How many countless lost billions, if not trillions of dollars could be traced back to the Sony corporation, and the consulting firm they used to deploy root kit technology"
- it's a bit early to be smoking what i think you must be smoking.... Trillions "traced back" to the Sony corporation, indeed.... Plz explain or GTFO
Westboro failed to properly secure their infrastructure before "asking" for a pentest.... Or anonymous have some tasty 0-days to hand..... would be interesting to find out....
"The Dutch to do it right - they have super expensive electronic equipment in nightclubs to test the ingredients."
WHERE ? sounds like an urban myth to me mate. considering i lived in amsterdam a couple of years ago and explored the city a fair bit...
"freshly-squeezed (not reconstituted) orange juice"
Can you explain please... I was just wondering why?
PCI-DSS is largely a paper-excercise for most companies anyway...
"Apple could do likewise, paying for punters' calls through a cut from every app, e-book, song or video they and others download."
are you soft in the head ? thats nonsense, could you imagine that even if that were feasable (its not, the amount of data the kindles use is tiny compared to a normally used phone) that apple would do it (that kind, generous, price-competitive company, apple.....)
c'moff it, must try harder
is ages off......
If the PIN wasn't bought from Voda staff...
given the fact that the voicemail systems hardly ever are set to do intruder lockout, it would be a fairly simple excercise to brute-force the PIN. For example say you can try 3 PINS per minute as a low estimate, you have a keyspace of 10,000 which means that you can expect to crack any PIN in 55.5 Hours at a maximum or crack 50% of pins in half that time, etc.
Not particularly difficult to do given the nCorrect response can be checked for using some waveform matching routine, making this an almost entirely automated hack once initiated.
There are some problems with your post.
"* Sometimes Starbucks puts tiny amounts of this in its brown-tinged milk."
Cracking WEP without reinjecting packets will take you weeks on a network with "normal" levels of traffic, VS 15 mins if you can inject packets. Like I said its about being being feasable. Sure without injecting packets you can collect IV's at a slow slow rate and get enough to crack using PTW in a reasonable time but not in fact in the amount of time a mobile battery lasts for ;)
Other guy who can crack WEP on his Desire ? Fantastic news, I'm off to Google that, any links or sources for me to go to ?
You're talking out of your &£$&
"Given the compute power available in modern superphones, cracking and joining said network is trivial. Android is a real threat here; the number of applications for the Linux ecosystem to do exactly this is staggering. "
Firstly, drop the "superphones" nonsense, nobody is buying it, sorry, you didn't coin a new term.
Is this trivial ? Why, which phones have wireless chipsets that support monitor mode, or even promiscous mode ? Which of them support packet injection ? The closest we have come is a promise that this is possible with neo-pwn on the n900. apart from that, mobile WiFi cracking is best left to your Zaurus or netbook.
Also how is the number of wifi cracking applications staggering ? Really ? You think ? Theres only really two or three, four at a push, that are worth using. Again, these are only useful on devices with wireless network cards that can at Least grab raw packets, and only practical with wireless network cards that can grab raw packets and inject raw packets..... Force a WPA handshake, etc.