In related news...
Ursine Coprolites discovered in forested areas, former Argentinian bouncer took Holy Orders, and the Paris attackers did not actually use encryption:
255 posts • joined 17 Jun 2009
Ursine Coprolites discovered in forested areas, former Argentinian bouncer took Holy Orders, and the Paris attackers did not actually use encryption:
So, if two people piss me off, I can use one of the various number-spoofing services to call in a strike on one of them "from" the other. Good to know. (Or just sit outside person 2's house using their pathetic WiFi password to forge a VOIP call...
don't see a problem with funding two groups: One to make a security product and One to try to break it. That's how you get robust products. So I am curious about the hooraw over the government even funding CMU/CERT research into TOR. Of course I question the (possible) misuse of this research, and the (probable) gagging and tap-dancing involved, but just doing the research is a good thing (_IF_ the TOR Project was in fact warned. I get a whiff of "not me, no, I didn't know anything about it" in the original statement).
wants to know how many of those 98KLOC approached 509 characters.
--- Oh, and I'll bet you'd be even more surprised at the number who text each other rather than call. ---
Bandwidth and battery-wise, texting is more efficient that calling, IF the message is really just something like "Running 5 minutes late, see you at 5:35". Voice, as crappy as it has become via VOIP and digital mobile, still takes a fair bit of bandwidth/battery. Not as much as streaming the shopping channel in HD, mind you, but more than SMS, AFAICT.
why my wife's Comcast email (the only busy one of the four we have, mostly for websites that insist) was curiously silent for about 24 hours a day or so back. Several folks asked her via various other channels if she had received the email they had sent. Test email we sent from gmail etc. showed up, so it wasn't just the Comcast DNS throwing a wobbly again. If only it was possible to get internet connectivity in my neighborhood from someone who wasn't incompetent or a crook (Inclusive OR, of course).
OTOH, we weren't told about any such password reset, and the previous password still works. OTOOH, it's not like we're still using the one from 2013.
It was if you wanted to avoid pre-recorded porn.
Despite my grandmother's cautionary response to any gossip: "Were you there?", I suspect I am not the only person who remembers things a bit differently. Never an SGI employee, but a customer both of SGI computers and MIPS processors (for embedded systems). What it looked like from the outside was that some suit in a corner office bet the company on WinNT/(Itanium?), quite possibly without running that idea past the folks in the trenches. I don't recall the exact timing, but SGI also sold the "no use to us" line of Sparc-based Cray supers (that they got bundled with other Cray IP) to Sun, thus kickstarting some of their most serious competition. Reminds me of when Intel fobbed off that "useless" high-performance StrongArm they accidentally acquired from the ashes of DEC, to Marvel.
There's a wide variety of stupid at the top of many (formerly) successful companies. Rarely do they die of a single cause.
Traditional vote-rigging schemes require a fair bit of labor, well organized. Electronic voting machines require sufficient capital to bribe the manufacturers and election officials (although some services may just be "donation in kind"). So it is natural that, e.g. in the U.S., the Democrats with their skill at street-level organization favor paper, while the Republicans with smaller numbers of larger contributions favor e-voting.
What's interesting is the push toward vote-by-mail and Internet voting. Since both of these have as their main feature the elimination of the secret ballot, they simplify the use of traditional vote-rigging by buying or coercing votes. So they have no specific constituency. Or rather, they are attractive across the spectrum.
BTW, there was (small) mention of counterfeit "social workers" in San Francisco visiting the residents of some subsidized (typically elder) housing blocks, to "help" those residents fill out and mail their ballots. Some were alleged to have been seen at campaign rallies for one of the candidates, who has now won the election. Surely a coincidence.
(in a day and age when video compositing hardware capable of keeping all the footage in sync was really hard to come by).
That would apparently be today. While Western Electric wowed people in the 1920s with sound synched to picture, that goal has apparently been discarded. Much of what I see today, either streamed or broadcast TV has mismatches of up to a few seconds, either way. It's like watching a badly dubbed foreign film.
(this was written in reply to Anonymous Coward, but the Reg Reply seems to have misplaced it)
Generally agree, but please add "return is not a function".
That said, I suspect that you never ran across a system where free(NULL) did bizarre and hateful things. Programmers who have used such things get gun-shy. Much of the code I have written ran on a fairly wide variety of (allegedly) POSIX. systems, but I learned pretty early not to assume that every implementation was flawless. I wrote a simple "acceptance test" for the functions declared in string.h and ran it against the most common systems at the time (Vax VMS and BSD, DOS, SunOS). Not one passed. Don't even get me started on SunOS sprintf() and toupper().
There's a Chesterton's Fence argument sleeping here, but I will not fully awaken it.
As for braces, I agree in principle, but we are discussing Linux kernel code, where braces on single-statement if clauses are forbidden. Yeah, even though using them in the "goto fail" code recently under discussion would have allowed the compiler to catch it.
And I've written FORTRAN on 90-column cards, for a compiler that IIRC Don Knuth worked on as a student. He also co-wrote a paper regarding "Notes on avoiding goto" that remains about the most sane discussion of the topic. (It also got him a witty comment from Eiichi Goto)
I'm older than he is, and have had 3 or more email accounts since at least the mid 1990s.
Different accounts for "over the transom and spam", "Work related", and "Doctor and bank", to start with. Only one (guess which) has the ability to use an automagic process for resetting the password, and that process uses two factor ID.
Do most folks forget their passwords so often that a slightly more secure reset policy would be a burden?
Yes, truly wonderful, especially once the vendors stop producing updates for older CPUs, but continue to publicize the vulns they would have addressed. Gotta have some reason to ditch your 3 year old system for something shinier. No I don't know of such an event (yet), but plenty of OS instances. BIOS and Microcode cannot be far behind.
And then there is the "upgrade" that actually introduces a vulnerability, perhaps "encouraged" by a patriotic duty to save us all from evil (such as opposition to the current regime).
The PROMS are bipolar "fused link" type, IIRC. There have been cases of such fuses "re-growing", but not many. They were used in many arcade machines of the day, and many of them are still running fine. "re-flashing" these parts, or even putting them in a modern hobbiest PROM reader/burner, would be a very bad move. The hard part of restoring (or counterfeiting) an Apple I is the shift registers used in the CRT controller.
One major issue you might run into is the high-resistance eutectic alloy formed by prolonged contact between gold IC pins and tin sockets (or vice versa). When I ran into it, circa 1977, my research found that mainframe manufacturers had run into it in the 1960s. For an industry that talks so much about "memory", computing seems to be willfully amnesiac. Fortunately, the "folk cure" of rocking the chips in their sockets (or removing and replacing them) will buy you another several years. Minus the damage caused by over enthusiastic application of the fix.
("IIRC" above refers to my not wanting to bother to find my Apple I manual. No, I never had the machine itself, but do have a manual. The PROM implements a small 'monitor' for the equivalent of PEEK and POKE. It is 256 bytes, again IIRC)
I didn't have to survey anybody to find one example. My sister was a victim of the "phony IRS return" fraud. about which apparently nobody can do anything. The IRS itself has been essentially useless in sorting it out (they make Comcast lok like customer service champs). A friend may have been exposed by the OPM cockup, but (naturally) doesn't talk about it. Your 50 "friends and family" must lead extraordinarily dull lives, or perhaps are lying to you out of embarrassment, since many of these problems come from using bad passwords or clicking on the "cute video of a baby pig" in emails.
In the IT world, "Legacy" is more likely to be like that hide-covered chest in the cellar of the ancestral home (or Miskatonic University). The one of which it is unwise to ask "What sort of hide is that?"
That said, despite the points made by the author, the philosophy suggested would work better in a world where the "upgrades" did not come with substantial stability and security issues. I'm looking at _you_ Apple. Isn't it about time for a usable release of OSX? 10.6.8 is getting more than a bit long in tooth, and I'm starting to feel like a Chicago Cubs fan: "Wait till next year".
I doubt that "putting through the court system" is likely to make the average EULA understandable to the "person of reasonable skill". After all, I've rarely seen a patent that the inventor could really understand once the lawyers got through with it, and sane people have no way of understanding how U.S. "civil forfeiture" could possibly be legal.
That said, that "200 page" EULA for Flash is probably only 15 or so pages in English. The rest consists of various translations, of which Adobe apparently feels Arabic is the most important. They always place me on that page and I have to skim the file to find English.
Combining the apparent difficulty of writing comprehensible legalese and the nuance of translation to multiple languages, it would be interesting to know what that Arabic version binds me to that the English version does not.
Did you read the article? Her observation of the computer's ability to manipulate abstract symbols, rather than only numerical quantities, is a watershed. Unless you use that powerful computer in your pocket _solely_ for computing logs and tangents and the like, you are using computing much more in her vision than Babbage's.
This is not to take away from Babbage, who is also properly celebrated as well. Science and Engineering are not zero-sum games.
Beer because Menabrea.
Perhaps they intended to use _your_ numberplates on a similar car when they robbed a bank later that day. Of course, they would considerately re-swap them to your car as they left for Brazil, later that night.
Not just RasPi
1) I once shared an office with a gent who in his younger days had designed such a televison for "Mad Man Muntz". One valve (possibly one section of a multi-section one, but none of that fancy Compactron stuff, too expensive), was used as RF, IF, and Audio amplification. Ask your Grandpa, or imagine three loads in series from B+ to plate. That set also featured nearly no adjustments. Decade boxes were used on the assembly line, then the appropriate fixed-value components soldered in. Labor in the U.S. was a good deal cheaper then. Of course, as things "aged in", they were a bear to repair...
2) "Will nobody rid me of this troublesome priest?"
About the only thing that regulation would foster is the rapid rebadging of the crap gear as each shell company is fined but cannot pay and disappears. They might even change the color of the new logo, but that might push the price up a few pennies and we know what that does to sales.
I assume just like Yelp is accused of (and denies). You have your sales "associates" subtly hint that folks who buy some sort of premium account can avail themselves of more careful (read: existing, and generally favorable) moderation.
Not that you can put that sort of thing in your (published) business plan. Not that lack of a plausible business plan has stopped a lot of Web Companies.
Back in the day, I was made an "honorary IT guy" because I knew something about computers and tended to come in at 8AM or earlier, as opposed to the actual BOFH and PFY. Well, actually they were both decent chaps and could take a joke as well as give it, like when I replaced the PFY's VT100 with a Teletype 33, leaving a note that a new-hire needed a terminal and since he was a TECO user...
Anyway, the days from Christmas to New Years leave the office more than a bit sparse. BOFH has gone off for two weeks, and PFY applies to take his holiday too. I'm "the man" for that week. Not to worry, PFY left me a nice document with hints how to deal with expected possible problems, and a list of phone numbers to reach him if I really need to.
Sure enough, a problem _not_ on the list arises. Call the first number: Answering machine saying out of town. Second number: (His inlaws' place) no answer. Last number? Dial a Prayer.
I would have thought 126.96.36.199 would be more appropriate.
I'm sure they could come to an arrangement with cttel.net
"Nice little hosting business you have here. Shame if anything were to happen to it"
to unspeakable items?
Charades. (Oh, lord, now _I need mind-bleach)
Exactly how do those differ substantially from "real" Thin Clients (tm)?
Or maybe "Decisions get a bit dodgy if asked to work more than 8 hours between reboots"?
I'm sure Putin would be enough of a gentleman to confine all potentially hostile moves to regular White House working hours.
At one point I had to use an HP blade server system.
She did us all a favor.
I note a great deal of discussion about slavery. IIRC, someone above pointed out that there are probably more (at least de facto) slaves today than ever before. Nobody seems to have mentioned absolute monarchs. Are we ignoring the kingdoms of the Middle East? Or de facto monarchs like Putin, Kim, maybe Al Sisi?
These may not be so obvious to "first world" folks, but the globe is shrinking in more ways than one. Previously, there was some chance that, e.g. Spain or France would help out those rebelling against Britain or the Netherlands, and vice versa. Once pretty much every regime outside "our" tight little circle has even less interest in our welfare than our own overlords, and nothing to gain by helping us that couldn't be gained by helping our overlords squash us, it's Game Over.
There is no Frontier out there.
Like those baby boomers who were running Standard Oil when they were caught refueling U-Boats? Or maybe the ones at Siemens selling components to the U.S. Navy during WWII? Or Watson Sr. and DeHoMag?
Ahead of their time, they were.
No generation has a monopoly on traitors and scoundrels. Imagine how dull Shakespeare would be if all that stuff started in the 1960s.
Long ago and far away I refused to sign off as "Responsible Engineer" on a modification that I thought was the near occasion of a potential safety hazard (but could save almost $2 on a $1000 product). They got some other chump to do it and went into production only to find that some countries (including one of our largest markets) would like nothing better than to use the slightest whiff of such things to block imports that potentially competed against local stuff.
If only management could be persuaded that good engineering could actually be more profitable than "the least we can get away with".
Fewer years ago I left another large company because (among other things) of their intense allergy to having anything discussed in email.
"This was noticed in the 1920's"
Or rather earlier, since it appears in Poe's "The Gold Bug" in the 1840s.
Meanwhile, I have to wonder if the sale of "rare and precious" copies of the Hut Six Story (I have my copy here somewhere) are in the same vein as the "Teletype message about JFK assasination" (or other noteworthy event) that crowd out search results for actual teletype machines on eBay. Nice way to recoup my investment in old Teletype machines if I had space to store one outside the purview of SWMBO.
Problem is that the exit nodes are in the basement, infested with Rodents of Unusual Size.
Yeah, sure, you don't believe in them...
Not sure why you would consider the NOVA to be "not a RISC". Decently orthogonal instruction set, fixed (well, two possible lengths IIRC, but could be thinking of later members of the family) instruction length, predictable (and deducible) instruction execution times, at most one operand changed per instruction...
As for Ferroeletric memory, I recall seeing a photo of a prototype from Bell Labs, back in the 1960s. It was only the substrate and metalization, with off-board drivers, but had either 64 (8x8) or 256 (16x16) sites. Again, I don't recall. But, yeah it has been possible to buy FRAM for quite a while. Just as it's still possible to find "bubble memory", although IBM calls the on-chip version "racetrack", and NCR's Thin-film memory has a new on-chip incarnation whose name and sponsor I can also not recall at the moment . Perhaps I need a new memory.
You could try getting help from Archibald Tuttle (Or is that Buttle? Damned auto-correct).
How about making it a requirement that the person filing a takedown as the rights holder ACTUALLY HOLD THE RIGHTS?
--Will there be a clapper forthcoming that also connects to your wireless network? --
Here in the former land of the free, we already have a Clapper, but he says they aren't actually "collecting" anything from that network. Not until they get around to reading it, that is. Sort of like a cat that's not dead until someone does a little parallel construction and gets a warrant.
Anyway, now we know why incandescent bulbs are illegal and CFLs make a right hash of anything RF.
Should keep in mind two things:
1) PDF has been used as a malware vector several times now.
2) Blue Coat devices have been used by e.g. Syria (under arms embargo), although Blue Coat says they have no idea how they got there from Dubai. "Once the rockets go up..."
Also, don't walk around the S.F. Tenderloin at night with $100 bills hanging out of your pockets.
Once while working for a Colossal Internet System Component Operation, I happened to run into the CSO (some12 layers above me in the Org-chart) and mentioned that I had been syrprised to see a particularly bad bit of mandated security procedure. His reply "I know, but it's not my call". What part of 'C', 'S', or 'O' was being misinterpreted?
Of course, I got there by being acqui-hired from a startup where the *nix boxes were all pretty locked down, except for this management-mandated requirement that any Windows user could mount any *nix hosted filesystem as any user they wished (selected from a convenient drop-down menu). Because we cannot have people who wear suits more expensive than my car, or the folks who bring them coffee, need to remember their own usernames.
Since this is about telnet access from the WAN side, I assume it is not a cockup, but something demanded/requested by carriers. As for detecting/mitigating it, the TOS for some (many? well, at least Comcast) pretty much forbid use of any sort of monitoring on the WAN side. Because, of course, the Internet runs on Coyote Physics, where nothing bad happens until you _notice_ that you are standing on thin air.
So, I have three choices:
1) HTTPS Everywhere, which in practice means only bleeding edge browsers (that can keep up with the drumbeat of deprecated crypto protocols) running on computers that are backdoored everywhere from the networking libraries down through the BIOS and beyond (Trusted Computing? By whom?). Provides easy access to Kardashian news and cat videos, but makes one completely unable to view "labor of love" sites on long-tail subjects.
2) Use a computer old enough to have a chance of escaping the most virulent backdoors (e.g. with a physical jumper on the BIOS Flash write enable), and wait for somebody like the TenFourFox folks to release a browser with the crypto du Jour, Decent access to sites that look like it's 1999, but have information you are unlikely to find anywhere else, but No Cheezburger for You.
3) Just give up.
-- I really don't understand why so many Linux distros install it [...] --
Probably the same reason a "server" install (on a headless machine) of some mainstream distros includes a metric buttload of video-card drivers and other media-munging cruft. Either they can't be arsed to figure out what is useful or
"I once left Hercules support off the install disk I made for my Gran, and caught hell"
"Does your Gran run a rack full of headless Xeon servers?"
"No, but she _MIGHT_!"
-- I thought I was the only person on the planet who knew about it's existance. --
You, me, and all the wannabe PCjr cloners who heard the rumors that "peanut" would be 80188-based and pre-bought carloads. Than someone noticed that PC-DOS used "reserved for future expansion" interrupts as system calls, and Intel had assigned them to things like the on-board DMA engine. Other rumors suggest that IBM (and only IBM) were allowed to return their 80188s for credit on the 8088s they ended up using, but I was never a Rat Mouth confidante and as my Gran used to say upon hearing a rumor "Were you there?" Nope.
So why exactly do older versions need a patch?
That said, I agree that Yosemite was "not entirely successful" on the stability front, but having to choose between "known kinda flakey" Yosemite and "Lord only knows but the track record has been not so good" El Capitan, I'm torn.
I agree that Snow Leopard (10.6 for non-Mac folks) was the last mostly harmless version. It's been quite a while since I clicked on UPDATE without hearing the Jaws theme
Government IT pay poorly? Well, I decided not to take such a job because I wanted to finish college. It too four years after graduation to match that salary.
Retirement? That's the thing. As a former phone-freak, I considered monetizing my skills by providing "communications consulting" to a local bookie. Then I remembered the guy in our town who was killed in a (alleged, never solved) botched holdup of his liquor store. Seems he was running a floating card game and fell behind on his payments to the local police. If you lie down with dogs, you'd better hope you get up with nothing worse than fleas. As one of the premier organized crime groups (OK, the Chinese PLA has them beat), the FBI are unlikely to let someone with both knowledge and a conscience just quit.
includes some who _claim_ not to have access when asked by a pollster, and take care to leave as few footprints as possible in their alternate identities that do go online.
I got from the IT bods when I did not promptly act on an email consisting entirely of an attached Word(tm) document, at the height of panic about Word(tm) macro viruses. "But it's from the CEO". "Yes, it says it is, but the same batch of email contained a penis-pill spam 'from' firstname.lastname@example.org". He did not get the connection.
Having been through a couple cycles of computer programming being "in" and "out", I assure you that you do not want to be working on a team made mostly of folks who got into the field for the pay. We used to refer to them as "Matchbook Programmers". See also discussions on leaning too heavily of "certificates" when choosing who will implement your Mission Critical projects.
All this is independent of gender. Most of the useless paper-holders were male, as, of course, were most of the staff in general.
I am hopeful that efforts to interest young girls in the filed, or STEM generally, will eventually work out. Of course, the first step is to not actuvely discourage them.