329 posts • joined Monday 29th June 2009 22:12 GMT
I won't put too much stock in the "More intelligent" comment
I mean they answered a phone survey and all...
Re: Trusting ANYTHING plugging into a USB port....
Just snip the Data(-) and Data(+) wires on the USB Cable, I had an old USB cable that was broken, so I only wired the Power wires back on and my phone charges without problem. Nothing can get in wvia the power lines, so I suppose all my phones are no immune to this.
Re: Adult app
I saw a macro someone had made that used an Excel spreadsheet as a photo viewer by making all the cells 1px by 1px with no borders, it would then color in each of the cells to actually print out the image. Just give it some porn and there you go...
Re: Which way do we point the dish?
An object that size would have either bounced off of our atmosphere or burnt up before it hit anything , resulting in no danger to us earthlings.
Re: Single unit power? Think bigger....
Having a bunch of smaller units ends up being a lot more reliable in the long run (Eggs, Basket, etc). Especially when you want to patch something (Taking down only 2-3 VMs is a lot better than 16 or more)
8 GB is enoguh for a few WIn 7 machines
I run my VDI instances on Server 2012 and give Windows 7 512 MB and allow to expand to 2 GB. I end up running about a dozen or so VMs on a Xeon E5 with 32 GB of RAM and haven't heard any complaints from the office drones that use them.
Hyper-V server 2012 will happily run with only 768 MB of RAM, and will usually only take about 300 MBs when lightly used.
Re: @Trev - IPMI?
The Super-Micro IPMI is about on-par with HP's stuff, even more so when you consider that you don't have to pay out the nose for it.
The real reason they want them turned off
Most aviation accidents happen during either take-off or landing, so they want you focused on the flight crew and what is going on rather than on your tablet and miss out on the "Please remain buckled in your seat and remain calm until the plane comes to a complete crash".
The concern about the electronics interfering with the craft's electronics started because they weren't sure (And devices back then caused orders of magnitude more RF noise than anything today). The warning was then kept as a scare tactic to keep you safe (Nothing convinces people to do something than telling them that fiery death will occur if they do not comply)
Really what they should be doing is telling people that they must remain alert and ready in case an emergency occurs without harping them on powering down their electronics.
Re: I can only WISH we had this show
There was a short-lived version made for North America, but it was terrible and it never made it passed the pilot broadcast.
Re: Its time to celebrate!
Re: Not surprising Apache hacked?
It was determined that it wasn't cPanel as mentioned in the article. As for how they got it in, I would assume they downloaded source for all three, compiled and are copying/replacing the binaries to infect the victims.
Re: Only in San Francisco!
The plastic bag idiots managed to get that passed in Seattle too. Now we are forced to either carry around or buy those stupid $4 re-usable bags (which some places won't accept if the aren't theirs)
They sure do. I have seen it far too often, you get some idjit that believes that Linux server are invulnerable and also thinks that 'chown', 'chmod' and even 'sudo' are deep wizardry and never uses them instead opting to run everything as root.
The most common reason I see is that they installed some extension or library that requires more permissions than what the service account has so rather than sitting down a figuring out how to allow the additional permissions, they just run under root because it works.
Re: Almost as embarassing as...
Yeah, I am really embarrassed by the $125k + Full benefits I pull down each year as a Windows System Administrator.
Re: I can't believe...
I assume they tested the envelope of bank notes they were handed.
Re: As boring as watching...
The Boston Molasses disaster happened with molten Molasses not your standard off-the-shelf variety. Glass or pitch (or anything for that matter) heated sufficiently could also travel at 35 mph...
Wow, screw Google
They should be forced to pay the $39 million in public funding that has gone into this project, plus the interest on the bonds. It is unfair (And probably very illegal) for a Private company to make a profit when the public paid for almost all of it.
So it does fuck-all if you want to use said apps on a modern system? I was hoping that maybe they just emulated ActiveX; then maybe I thought it would automatically detect when it needed IE, but you have to do it manually. So what good is this?
I was thinking this was bogus
I was wondering how he could even connect to the FMS and the other flight computers in the first place. These systems are fully air-gapped and there are no wireless links and no way to access these things without being in the cockpit or other engineering compartments which will be noticed immediately if any one accesses these.
As for the Nav systems with the wireless links to the ground and satellites, it would be impossible for a phone to even rival the power output of these, and that's even if the Cabin wasn't shielded against EM and RF in the first place.
Re: Hard to do
Yeah because a user that doesn't know how to use the Uninstall feature in Programs and Features is totally going to be able to install Linux...
Yeah because testing with 100s of different software packages and system configurations while there is a looming deadline to get a patch out before the exploit becomes common is so damn quick and easy to do....
Re: It takes quite a bit...
Yes, temperatures in factories and kitchens do regularly exceed 38c/100f but the law states that any time a worker feels their health is in danger (such as feeling dehydrated in this case) their supervisor must allow them to recover before putting them back to work. Something the supervisors involved in the warehouse incident denied the workers.
Re: Er... how about...
You just need to set up a BGP router to advertise KP's AS number and you will receive all traffic destined for their network (Including replies for sessions they created). You could then just drop all those packets and it will effectively drop KP off the internet (unless your local router is closer to KP's router than the dummy is).
China performed a similar attack a few years back against AS number associated with US companies.
Re: UNIX malware?
Wow Eadon, you finally figured out how to make another account?
If you attract employees with free food
then all you'll get is hungry candidates.
Re: Devious and Disgusting
That is assuming the images are actually of children, there are pornographers that specialize in making 18+ women look like they are young children; as disgusting as such things may be, they are still legal.
<- Such people really need to be thrown into a fire.
The easier way to get Privacy
Just set up an account for everyone that uses the machine. Simple, effective and limits the 'preference wars' when sharing a computer.
Re: "A year should be plenty of time for the average Reg reader to pull that off? ®"
If my coworkers are anything to go by, they'd be models for the 'Before' images for medical advertisements...
<-Coat, because I wish most of them kept theirs on...
Re: Using multiple OSes to test pages
Most of the engines out there will render things differently depending on the underlying OS. Even Firefox on Windows 7 will render a slight bit differently than the same build of Firefox on Windows 8. The engine and the OS are not entirely separated, specifically in the image and video rendering and in the appearance of certain controls. While something like SuperPreview or the like will give you a good idea, it doesn't give you a completely accurate one.
I went to plain text just to ward of the gigantic signatures that are nothing but a single image (To make sure the formatting stays and to prevent people from stealing their contact info [I know, but they won't listen]).
My email client is does allow clicking and following links in plain-text emails, but it can't be obfuscated.
Re: but why?
I was thinking that the filing was pointless anyway. It'd be as useless as making a filing for every variation they make such as having a different patent for "iPad 3, 32 GB, WiFi" and another for "iPad 3, 32 GB, 3G AT&T edition"
I suspect that this is more marketing than 'brand protection'
I would have assumed someone would have already pointed this out since this is wasting money and companies hate spending money, hell most companies are so serious about that that if they could, they'd go to strip clubs and throw naked women at money.
Re: "Disallowing EXEs to run"
because we all know that viruses only come as compiled binaries and never anything like a java package, a PDF, or really any other file format (None are safe). Most e-mail / internet borne viruses are just using scripting in PDFs or Java applets to infect the machines.
Hell, there are text editors that can be exploited by putting the EOF character in the middle of a TXT file with the malicious code following that character; the text editor only counts the file size until it hits the EOF character but the OS might load the whole thing in memory, stomping over the rest of the editor's code.
Lately I've been getting:
The servers don't need patching, they are running Linux!
They continue to say that even after I report that postfix on the DB servers is spewing spam all over the place (we are a sendmail shop, so there is no reason for postfix to even be installed, let alone sending out mail to world+dog)
He just wants more countries open so he can get more of our personal information and use it to advertise to us. The soapbox he is standing on is really just a obfuscated pile of bullshit.
Re: "UNIX-based operating systems such as Linux"
Linux isn't based on UNIX, it is merely UNIX-like. GNU is Not Unix after all...
I had the same question. I can see 'Blood play' being banned, but where do you stop? Someone could argue that a knife showing up would be considered violence, another even just holding someone down, and yet another would call it violent if someone said 'Bitch'.
Internet censorship is a gigantic cluster-fuck, especially with things like this where it is all subjective and there is no clean lines. It should be the parents' responsibility to monitor their kids' actions, not Big Brother's.
Yeah, because Genocide fixes all the world's problems...
Re: Panic ye not!
Windows 7 is signed with Microsoft's private keys and would be allowed to run under SecureBoot, XP, Vista, Server 2003, 2008, 2008 R2 will all also run under SecureBoot.
Re: "PCs that shipped with Windows installed"
Nearly all servers nowadays come with some sort of IPMI, BMC or LoM to allow you to do things like manipulate BIOS and UEFI settings.
Re: What a surprise
Except that Microsoft has mandated that the switch to turn off SafeBoot is a required to pass the 'Designed for Windows 8' certification. The worry is Mother Board manufacturers that don't give two shits about MS's certifications and push out boards as soon as they can (looking at you Asus).
I've had a lot of problems with Cisco switches dying from bogons in the networks such as:
*MAC addresses appearing on more than one interface (once on the local interface and again on the trunk port)
*Malformed packets (bad header, same dest/source, etc)
*MAC Address/port limits on trunk ports (had this issue when we started getting more than 4000 servers per VLAN set, it would kill the core routers)
These are all issues that I've had with Cisco kit (6509's and 3750g's) and would like to see how the others handle these kinds of thing.
From what I see, this attack requires perfect conditions:
1 client accessing a single server, no other clients connecting to said server
*If the server is busy with another client, then the packet will be delayed and change the timing.
An unencumbered router, or at least one that is perfectly consistent in moving packets
*Any slight delay could change this packet timing, even a simple CRC check would take a different length of time on different packets.
*Special features on the router may also delay the packet randomly
No specialized network equipment
*Load Balancers, firewalls or NAT/PAT device would add random delays due to processing, of course a pair of load-balanced servers would have different timing even they used machine with only one-off serial numbers.
All links are the same exact length
*If the packet is going over a set of bonded links (Like nearly all ISPs have and most companies), a difference in cable length would delay the packet enough to defeat this attack
Using a non time-division style network
*crossing ISPs wouldn't work or even within the same ISP. Cellular and 3/4G networks wouldn't work either.
While this is good work and patches should be made for the affected products, an attack isn't practical outside of a lab.
Texas Instruments makes an ARM-based with 2x GigE ports and a crypto-accelerator for $199. It also has a touch-screen and some other goodies (no video-out though).
I've been using a couple of these for firewalls and VPN gateways for remote sites and built a very simple GTK-based UI for the office staff that just kicks off a couple of simple scripts.
Because everyone that doesn't like Open-source must be a corporate shill...
Re: I'm *so* happy that I've divested ...
It'd be easier if you just said "I'm so happy I sold all my stock".
Wireless gear that isn't complete crap usually has a setting to change it to a different frequency. That and production companies are required by law to use equipment that has been certified by the proper authorities of the nation where they want to use said equipment.