* Posts by phil 27

74 posts • joined 6 Jul 2009

Page:

Little warning: Deleting the wrong files may brick your Linux PC

phil 27

So, those files becoming corrupted can brick the device. Ergo a disk error could do the same without any os interaction regardless of what is loaded on it.

Design implementation flaw if it won't let you back into the bios to nuke efi & a bit of a gamble all round to run with regardless of what your flavour of os happens to be.

0
16

Four Boys' Own style World War Two heroes to fire your imagination

phil 27

I came here to post mad Jack Churchil for the last RECORDED longbow kill in a military conflict, but he's already up there ^

Also Wingate was a interesting chap, and his chindit unit's activities went on to form the basis of the para's. Not to be confused with the modern repurposement of the title for the geeks...

https://en.wikipedia.org/wiki/Orde_Charles_Wingate

2
0

Five technologies you shouldn't bother looking out for in 2016

phil 27

Re: Five technologies you shouldn't bother looking out for in 2016

Thats mostly because they cost more than ordering it with windows and blatting the hard disk on day 0 of ownership. Or as I do, taking it out and putting it in a storage cupboard so if it has hardware poorly sick issues I can RMA it knowing they can't wriggle out of fixing it.

And this fine bit of marketing has enabled people like you to carry on doing microsofts marketing for them.

5
1

Outsourcer didn't press ON switch, so Reg reader flew 15 hours to do the job

phil 27
Thumb Up

Re: Floppy drives?

Not just "pc" in scope for the usb key issue. A Dell 1950 does that if usb hd is enabled as a target in the bios and the bootloader on the key is borked. The first time its nearly had me napping because I thought I had video issues on some of the boxes by the time I wandered back to the kvm station on another floor before deciding to get someone else to perform the complex task of pushing the on button on the contents of a rack one by one while I stood at the station and being able to see all the perc controller crap etc before going into blinky underscore of death mode.

To the original story, as a *owner of dell 1u hardware, there was obviously a requirement to be utterly deaf with no skin sensation of draft in addition to colour blind for the local IT support. When they first power before the environmental sensor tells the board thingy that no its not about to melt (this is a achievement...), all the considerable amount of very small high rpm fans arranged across the middle of the chassis accelerate to max speed and it has a go at making the rack move from the rearward thrust if you leave the rear doors off the cab/had to find a creative solution a too short rack cab...

* now ex, I ripped the xeon's and ram for my workstation out the last still twitching still overly hot carcass of the last one this week, and it felt good to finally slay the last of the beasts.

1
0

Cyber-terror: How real is the threat? Squirrels are more of a danger

phil 27
Thumb Up

Re: Forget Cyber terrorists

Use a drone, this is the interwebs, we like cats remember.

0
0

Chef launches Compliance: Server security policy as code

phil 27

Re: Seen it in operation.

I think I know where they got jobs anyway... Or maybe its endemic. Except now they'll be "cyber" not security as cyber is the current lightbulb job title the moths are drawn to.

Isn't letting it automatically "fix" problems without intervention flying a bit close to the edge?

Usually when something has been altered you want to know about it to go poke around and see why, its often a good way to see early on when someone might need some re-education, or that someone is up to no good or early warning signs to nip a incident in the bud before it becomes worse. Plus, there's always the chance that someone has done something for a good reason, and without understanding that reason your tool might just be rebreaking something that just got fixed before someone remembers they have to teach the fix to it too...

Not a huge fan of fixing things by script as you can imagine, I worked one place that borked most of their infrastructure with a automated change system that applied exactly the logic someone loaded into it in the most efficient manner possible. Only took about a weeks downtime and a few hundred thousand in resource to recover.

Just my experience. YMMV.

0
0
phil 27

I would think this *should* be targetted for realtime monitoring of things in the field as early warning and early mop up of issues to stop more serious issues deeper in being missed, to clear the wood from the trees, not to replace skilled compliance testing during intergration testing. Its in the same space as Tennable's security centre coupled with nessus probes or IP360, though hopefully the logic in it might actually be better designed than them.

I've been involved with the latter for quite some years, and we have written some in house scripts which do the basics which hopefully will get the devices into a roughly ready for test scenario, then we dig round each component for more information and for things more complex as detailed by yourself and check the output from our scripts for false positives. Differentiating between the two end products is sadly something management and non security specialists are unable to manage. Or they don't want to manage to understand because pretending you don't lets you get rid of that resource for a immediate impact on your departmental costs. Ask talktalk and others where that leads...

This is not a pancea for everything, but in its niche its a useful and complemental technology to a wider security solution. Something I personally will download and see if I can recommend it to any future clients should my next job as pianist in a whorehouse prove not quite as palateable as its looking right now :-)

0
0

UK/China cyber security deal: National security attacks still OK, it seems

phil 27
Joke

It's better than that, it'll be double rot13, then they'll burn it to cd and put that inside a envelope inside a envelope and send it through normal mail. That's sure to put off any potential interceptions!

2
0

Bosch, you suck! Dyson says VW pal cheated in vacuum cleaner tests

phil 27

Re: Kettles

230vac and 16amp limit is the norm on the continent, smidge over 3.6kW. CEE 7/5, 7/6 & 7/7 are 16amp 7/17 can be 16 or 10, ze german's shuko standard aka CEE 7/3 should be 16 as it accepts europlugs and 7/17 plugs so is requried to cover that capability and 7/4 can be 10 or 16, but originally was 10 which may be where your 10amp figure is coming from.

TL,DR; mostly continental europe has 3.6kW.

2
0

Lancashire Police warn of malware email impersonation scam

phil 27

I reported this via the city of london site on tuesday I think, origin ip of the mailserver was in india, no spf on the domain, provided full headers and original content.

It spoofed a genuine police.uk domain, the funny bit was the attachment was a mswrod (spelt like this) filetype, with the usual macro virus payload embedded.

I only bothered reporting it because they had got most of the detail that normal people would trip up on. And well, spoofing the police is bound to actually get the police interested in sorting it out...

1
0

Temperature of Hell drops a few degrees – Microsoft emits SSH-for-Windows source code

phil 27

Re: There's a lot of embracing and extending going on here...

I can't believe its taken until capslock's post for the obvious leopard spots history of microsoft and new protocols to come out although someone hinted at it with kerberos earlier. What short memories you all have while bickering about posix and permissions systems...

1
0

Miss Brittany dethroned for posting 'nude' Facebook pics

phil 27
FAIL

Re: Arnaut the Clueless Metronews website

Matt, she's french, in France crowned miss Brittany. This is the same France that it was culturally ok to give 50 shades of Grey a 12 rating while the rest of the world went into hysteria overdrive and made it a 18 rating or higher.

I can't come up with any reasoning for this to happen apart from the American organizers imposing prudish values on the compettition, without needing to even hint at desending into anti american bashery.

1
1

Arabic-speaking cyberspies targeting BOFHs with crude but effective attacks

phil 27

<sarcasm> Just wait till they develop the next level of sophistication, zip of exe.</sarcasm>

Anyone running a milter that lets through a exe or zip of contect without blinking wants shooing with a length of ftp, ESPECIALLY those in a position of a company large enough to be a target. Its not point and click for monkeys people role, test your own stuff, do a professional job.

Of course then you might find people killing your mail server cluster with recursive zip attacks, but hey, its not 1999 anymore and you should be capable of stopping that too.

I did bring down a entire cluster sending someone carrying the EICAR test string inside this exploit payload via mail who absolutely insisted on pain of my dismissal to do so despite my dire warnings.Fun call with the cluster admin at 10pm on a friday who put in place proceedures to not have managers strong arm security staff with requests against their better judgement... And I hope harden the cluster of mailservers that it took out...

0
0

What does EU farm subsidy get spent on? Yes, broadband for Irish farmers

phil 27

Good! You might scoff at networks for farmers, but modern farming is enhanced by having good connectivity. Forgot your image of a bod on his clapped out fergie scratching a living, modern farms are massive and professionally run enterprises with huge amounts of automation and computerization of assets, self driving tractors, uplinks for remote maintenance and diagnostics on kit etc.

Having infrastructure in place for this sort of thing rolls across the entire commercial spectrum and is massively beneficial for the countries concerned as a whole, and is a bit beyond having a few people extra getting facebook access.

4
2

'Intrusion' at ceph.com makes for red faces at Red Hat

phil 27

Not to be a syncophant, because I have a intense dislike of redhat nowadays due to their driving of corporate linux direction (pottering et all), but this actually looks like responsible behaviour and correct management of a incident to me.

They have been compromised in some way, occasionally it happens due to things unforseen, that's been communicated out, a mitigation put in place, stuff resigned with a good key and they're doing forensics to see how its occured and to what extent. I'd be unsurprised to find once RCA has finished they look into how to avoid it or similar vectors happen in future. And... they're actually being transparent about it having been undertaken.

What a refreshing change.

12
0

Cryptome founder revokes PGP keys after weird 'compromise'

phil 27
Joke

Re: He used one of those new storage devices....

Enterprise level san then?

Joke, or is it...

3
0

US Catholic Church launches app for Jesus-phone

phil 27
FAIL

*whoosh noise at icon*

7
0

Students! Graduates! Win £10,000 with the Cyber 10K challenge

phil 27

Re: Is the word "cyber"

Nah, BT has a cyber defence team too. And hillariously its not a legacy title left over from when it was cool.

0
0

CODING PEEP SHOW offers chance to hire devs as they program

phil 27
Stop

Would you work like this? Not me...

Either a client trusts I have the skillset and intent to deliver, or they don't. If they don't its not going to be much of a working relationship is it?

Every time I've felt the hot breath of oversight focusing on me, I know its time to move on.

5
0

Confession: I was a teenage computer virus writer

phil 27
Mushroom

Re: Damaging PCs ...

"You could hammer the read/write head against track 0 as fast as physically possible - if the owner was unlucky it would upset the alignment, and start to fail."

I did that accidentally in the late 80's trying to write my own diskloader for an amiga megademo.

I scoffed at all that namby pamby capturing the trackdisk device at $4c and playing nice, instead to hit the cia's that controlled disk io directly in 68k asm and write the entire disk controller for myself. Somehow I got the whole idea so spectaculary wrong it tracked the head over the whole disk surface, and the software of the day couldn't recover anything off a floppy so destroyed. So... not to look a gift horse in the mouth, we released it as the fast disk destroyer (and as far as I know, no floppy mechanisms died as a direct result, but who knows... Mine was alright mister...)

Did learn a lot about controlling hardware, though we ended up using trackdisk.device for the demo loader in the end anyway.

To the author, I mean this in the nicest possible way as I don't think it was your original intent, but, you b*stard! I pulled the SCA virus apart in a debugger to see how it worked, but only so we could see how it loaded and stayed resident and to admire the code (it was the first virus we'd ever seen) . We used that to write a intro that we jammed into the bootblock (with chipmusic to boot!) , but decided *against* making it propogate to inserted disks as quite a lot of games of the period relied on funny things being inserted into that sector as part of their copy protection (plus it took another 120bytes of precious space). Its the difference between unlocking someones bike at school for practice picking combo locks then swapping it with someone elses bike lock out of mischief vs unlocking the bike and nicking it.

I'm still locking other people's bikes together out of mischief (professionally, correctly engaged), but not nicking their bikes.

2
0

GCHQ wants to set your passwords. In a good way

phil 27

TL;DR; summary of what GCHQ really are saying:-

Please, weaken your standards, your making our job more difficult than it should be.

1
4

As McAfee runs for US President – we ask a crucial question: Will Reg readers back him?

phil 27
Thumb Up

Having watched some of his youtube vid's slagging off his former antivirus company, he comes across as mad as a box of frogs with a pechant for getting up people's noses, scantily clad women, guns, alcohol and other fun stuff.

Hell yes I would vote for him, seems to me theres not much left in his closet to blackmail him with!

One for posterity.

https://www.youtube.com/watch?v=YpRvaQsGIY8

9
0

Boffins unveil open source GPU

phil 27

From the reaction from people who actually were at the presentation, MIAOW hasnt been designed to steer clear of patents. Right now a non issue, but should it take root the big stick will come along and make its stamp... Really, not the best base for a patent free open source GPU.

It's also missing some gfx functions, texture-mapping, and has a single processing pipeline, when you start enabling more pipes you run into all sorts of caching and corruption issues you never spotted, so its not just a case of altering some parameters and resynthesising. Great start for a uni project, but there are better options out there already not gaining the publicity.

If your interested in the subject of diy gpu processors and fpga, check out Jeff Bush's amazing write up of his open gpu on fpga. You need something with a fair number of logic elements to load his design on so something like a de0 nano or similar but you can check out the code/verilog etc from github right now, and his blog is amazingly insightful to read.

http://nyuzi.org/

I'm also interested in cpu on fpga, but its a massive massive rabbithole of learning to fall down into. There is the venerable tg68 implementation of the 68000, fpga arcade, vampire v1 and a few other interesting ones released under open source licenses you can download the sources to and check out, plus there are further closed projects in this space. The above is focused on m68k because its a chipset I knew well back in the day, so I can relate past experience to bootstrap learning for the bits I don't understand. But there are z80/6502, even machester computer on fpga...

The chinese are getting in on the area with their own fpga designs and fab, gowin semiconductor has released two designs in the past two years to compete with altera and xlinx etc. Lattice is another with interesting developments and now there is a open source toolchain (icestorm) covering the lattice icesticks to lower the difficulty bar to getting started.

http://www.latticesemi.com/icestick

Its like that guy on here that built his own diy wirewrapped discreet gated computer that took up half his house (I think he is my hero after that elreg article...) , except you can pop the dev board and usb blaster in the desk drawer between sessions without visitors spotting your a raving loon until you start to babble about von neuman architecture and the like. And its great fun giving the brain a bit of a workout compared to the level of thinking required for real work.

2
0

Hacking Team spyware rootkit: Even a new HARD DRIVE wouldn't get rid of it

phil 27

In light of the suggestion that this *possibly* could have a remote install vector in the bios attack, having to put a bios jumper in another physical position to reflash was a good idea after all...

But, I suspect the vast majority of people who cared about security said this at the time. Only to be shouted down by the IT ops people who no longer had to go round people's desks to do things.

3
0

Land Rover's return: Last orders and leather seats for Defender nerds

phil 27
Facepalm

"Defenders on parade: entrance to the factory tour", not one of those cars is a defender, they're all series landrovers. This opening few paragraphs of the article reads like a train wreck until further in when it kicks in properly and someone who actually understands their subject seems to have got involved, until then its a confused mess suggesting that every land rover apart from the disco was called a defender since the first 4wd landrover product. And "We all know there’s only on one true Land Rover: the Defender", er, I can hear various series owners choking on their brews from here.

.

For the record I drive a 90TD, which although its defender shaped, is most definitely not a defender also.

7
0

Self-STOPPING cars are A Good Thing, say motor safety bods

phil 27

So you have a big chain of self braking cars, the front one sees a obstacle and has to throw the anchors on hard. The one behind react to the vehicle in front braking hard etc.

Imagine if they all had their own braking charecteristics, stopping distance, tyre widths, brake disc size etc. In fact a whole slew of variables which affect braking distances.

Will we see who has the best results for minimum braking distance by noting the ones without front end damage in this scenario?

1
0

HAHAHA! Go on, HOST YOUR NEWS on FACEBOOK, FOOLS!

phil 27

Re: Bloody kids

Only those of us that didnt have some glue and a bit of mdf to cure the rampack edge connector wobble mechanically :-)

0
0

'Photof*cket' men manacled, indicted over Photobucket password-protected pic plunder

phil 27
Stop

Re: What's the fraud?

This, where are the people investingating photobucket for really crap software design?

After all by letting people put private albums then not keeping them private by misuse of a feature, are they not breaching their duty of care?

This issue has been known about on reddit etc long before photofuket made it pointy clicky. Indeed there used to be a section of reddit dedicated to fusking techniques...

Photofukets authors guilty, but mostly of embarassing legal commercial business and rocking the boat.

0
0

Cisco posts kit to empty houses to dodge NSA chop shops

phil 27

Your dreaming. Yes it looks like the factory board and it answers the same checksum when asked isnt exactly unforgeable if you have the appropriate resources to hand.

0
0

systemd row ends with Debian getting forked

phil 27
Stop

Gentoo is another one fighting against the tide on this.

I have been using linux and doing it for some household name companies amongst other flavours of unices since the 90's, and systemd represents a lot of thinking I don't want to see in my systems. Just read the rants in here, they have most of them off to a pat, and we've already seen some of them in action (corrupted binary logs etc). Nobodys mentioning the potential vulnerabilty of having a monocultural monolythic binary handling pid0 with absolute privileges and how it will massively increase the attack target having one big spaghetti monster of a daemon hacked together by people in a hurry to dispose of the alternatives, but its lurking at the back of my mind.

For a good many years I ran gnome because I didn't at all like the way qt was licensed back in the trolltech early days but now I have switched all my boxes to kde/enlightenment wm, installed eudev to stop udev shimming in any badness, and hard masked systemd from my systems.

I don't want binary logs that require a additional daemon to convert everything into clf or similar format logs to feed into the traditional logging and management system infrastructure set up at every company, I dont want to get a mangled log and find the remnants on the partition after the platters been rebuilt in a clean room into a new chassis but was more borked than we thought and not be able to read even fragments (we have used this in the past), I don't want to be trying to comprehend and dig round in systemd's sourcecode when its suspected of being behind a weird issue because once things disapper into that monolithic blob that is what it may end up being ("Open a ticket", please, the server is dead now and its costing us big time, we have to fix it there and then not palm it off to a vendor), or have issues with a system that wont come up and needs hand fettling to bring it back up enough to rescue and my desktops boot fast without it because they're full of the magic of ssd's. All with the magic of openrc, which solves some of the very same problems systemd was supposed to with dependancies, but somehow manages not to turn the os into windows for unix. I've even wrestled with the odd start up script bug and won.

So, right in my gentoo use config I have INSTALL_MASK="/usr/lib/systemd/" , its about choosing to have the os the way I want it. Linux has been, and always will be about choice for me.

Now you may want a "modern" linux with systemd, but some of us greybeards chipped in to make linux what it is today, and out of every one of my skilled collegues, the talk is all of moving to freebsd or similar. Interesting times are ahead.

Pity about gnome until gnome3, but E17 is pretty nice nowadays.

8
0

Holy vintage vehicles! Earliest known official Batmobile goes on sale

phil 27

There can be only one true batmobile!, the reworked Lincoln futura, reworked into the batmobile by ace Kustomizer George Barris. George bought the futura which was a ford concept car built in turin after a sucessful tour of the show circuits for a few years for $1. Bet that would make more than $112k now.

http://en.wikipedia.org/wiki/Lincoln_Futura

0
0

Could YOU identify these 10 cool vintage mobile phones?

phil 27

Identify them? Ive owned 5 of them! There's 3 I wouldnt know to be honest though.

I owned 4 instances of the 9110, a cross between bad luck and very subseptible to absorbing liquids, my last one the insurance told me no more replacements and I spilt some chemical cleaner on the bench near it and it wicked it up in a instant and ate the solder inside the phone so it was declared an unrepairable unit by the insewerants repairer, every chip ruined, so I went back to a 9000i for a bit then gave up after I developed the needed giant muscles to carry it around and started carrying a ipaq installed with familiar linux instead. I remember using a app on the nokia's that you could set an alarm on when it entered a certain cell tower, and I used to set it to wake me up on my evening commute back home when I took the train. I bought the pebl to the salesman's disgust because it fitted in a little angled pocket on my bike leather jacket that zipped up well.

I still have some 9000i's, a razr kicking round, I remember the 888 and thought it looked dated at the time, I also remember friends with the nokia slider phones continually returning them under guarantee when they opened and carried on and shot the slide section off completely, always good for a office laugh when they were trying to look cool.

Memory lane eh?

0
0

OpenVPN open to pre-auth Bash Shellshock bug – researcher

phil 27

Maybe he's been downvoted because some people understand all the child process called by the "good" script have to be not running bash as the variables persist onto the child processes even if its ignored and not interpreted by the parent shell so you need to audit not only the parent but all its children, then its children's children ad nauseum, and people haven't had time to audit their entire distribution before nipping the shops for a sarnie at lunchtime instead of applying a yum/apt-get/emerge bash like is being recommended in multiple places.

Just patch it, its a one liner on linux, solaris its a bit of a shit because of the patch cluster issue if the box is behind on clusters due to "commercial pressures" and "development cycles" and whatever other guff has been trotted out as a cost saving excuse, but we'll get through it while all the hardcore solaris guys shout about what linuxifcation has done and this would never have happened back in 2.6 days and for embedded devices pester the snot out your vendors.

0
0
phil 27

Re: I use OpenVPN and auth-user-pass-verify....

ls -l /bin/sh :-)

The good bit is you've patched bash unlike a few of the osteriches around here. Hopefully two or three times now :-)

0
0
phil 27

Re: auth-user-pass-verify Option

Thousands of people who have bought a "privacy vpn" use passwords, because thats the only manageable way of tracking the userbase for some offshore vpn provider. And as you don't control the vpn server, you can't enforce authentication by certs. Which is why I had to patch my openvpn to put the option back in because I didn't want to have a shell script to handle credentials (well actually I put my shared secrets in a included file and made it 400 and owned by root but thats not directly related)

As above, meanwhile in the real world, yes quite likely.

0
0

Microsoft's Black Thursday: XBox Live goes down as XBox Studio canned

phil 27
Thumb Down

Re: It is no surprise.

Not the OP, but do you not have google while your trolling the (non) troll?

http://www.engadget.com/2008/01/03/xbox-live-outage-day-13-still-up-and-down-still-preventing-fu/

What a fantastic example of search engine comparison results also. Or at least for me, its like googling for tianamen square on google.cn :) :-

https://www.google.co.uk/search?q=xbox+live+down+for+13+days+at+christmas

www.bing.com/search?q=xbox+live+down+for+13+days+at+christmas

I have a xbox 360, wondered why it wouldnt save the game last night. As I've never paid them a bean, my reaction is limited to a MEH.

3
1

Five arrested over money-grubbing fake UK.gov shocker

phil 27
Joke

Re: Shocker !

The fake works properly on linux based browsers!

31
0

BOFH: You can take our lives, but you'll never take OUR MACROS

phil 27
Facepalm

Re: Kerr-ching

Do you work in finance perchance?

2
0

DON’T add me to your social network, I have NO IDEA who you are

phil 27

b*stards

How many of you b*stards out there in el regoland have sent Alistar a linked in request after seeing this article :D

11
0

French Hacker Legion is West's foremost snoop squad says Robert Gates

phil 27
Black Helicopters

There's no doubt the French undertake some kind of surveilance. I ran a unix server on a fixed IP in France at one of my houses there, and I was continually seeing ssh brute force attempts even about 8 years ago. Then, after moving it to a high port, I got a single entity repeatedly portscanning it during working hours and probing the high numbered ssh port, which didnt respond as was running a knock daemon. At one point the ip testing got some of the port sequence to get it to open but it was running keys only login etc so wouldnt have done them that much good but someone was obviously looking at packet dumps to see the knock sequence etc and slowly figuring it out.

Curious at a rather technically skilled attempt, I traced it back to a group I knew about by name. So I dug until I got hold of a email address connected that I could cross reference to the source IP, and lets say it was a more official address than I was expecting.

I fired off a cheeky mail saying thanks for the scan but please can you stop scanning me now as I'm happy everything is secure and got back some cheesy reply how they were just auditing fixed ip's in France to help people from external attacks due to insecure services and there's nothing to worry about. And the next day the scans stopped dead.

Its nothing that I haven't seen in the UK, but I've never traced a uk scan back to a official entity yet...

5
0

Do+ you+ use+ Google+? Seemingly+ you+ DO+

phil 27

Re: I signed up for it once

I actually opened a google+ account very early on and was experimenting with hangouts and things then the automated real name scanning algo crap came out and they suspended my account. I started the hoop jumping then gave up as its about as big brother forced as it gets. So if you want to borrow my rusty screwdriver your welcome.

They probably still count me in the stats though. Lies, damn lies and stats eh?

1
0

The Raspberry Pi: Is it REALLY the saviour of British computing?

phil 27

I really like the PI and we have a few of them. We were watching streamed hdmi feeds from my mythbackend running xbmc with the mythpvr connector, something even my low end atom's cant managed the other night (atlantis in hd). Granted its the one with a usb key as the disk instead of a sd card, the sd only ones can only manage sd content and I should probably add some more heatsinking for that level of abuse. We have one doing 24/7 duty as our home automation computer also.

It only has one major downfall as far as I'm concerned, the ability to corrupt some sd cards when power cycled, but this can be mitigated with certain types of card. I just dd a new image on when they get corrupted and away it goes. Some of the cards seem immune to corruption though, I have found older smaller capacity cards are better in this respect.

I bought the first solely with the intention of putting it on my lad's bedroom tv as a mythfrontend this coming xmas, and give him general computer use in there with a usb wireless kb etc. He has a android laptop, but all that leads to is being stuck in xyzville and playing facebook games in a closed ecosystem...

We've already had a tinker with basic (running on a genuine zx81 out of my weird old computer collection no less) and he's eager to tinker. Ideal for the job I'd say! And when he messes it up, five minutes and two dd's later, it'll be back to working.

Will he grow up a programmer? god I hope not. I hope he does something that can't be done remotely in india therefore stands a chance of having a career and a future...

0
0

Billionaire vows to turn 007's Lotus Esprit into actual SUBMARINE CAR

phil 27
Go

The esprit is just a fibreglass cover over a X form frame, pretty adaptable for projects like this.

Making the body watertight and strengthening it to cope with the pressures is do-able for a man of his resources, and sealing up the drivetrain also.

The layout of the esprit lends itself to this too, its rear/mid engine means adapting a different transaxle that can be sealed is easier, and plenty of battery root around the engine bay to replace the exploding super leaky petrol tanks. As for damaging a icon, pass me the hacksaw, I'll make the first cuts for you :)

I owned a fire damaged esprit for 3 days after a cheeky £25 ebay bid won it, I bought it for the adaptable running gear (which I still have, underneath my nova kitcar bodyshell with a rover v8 and renault un1 transaxle), and we were amazed at how easy it was to detach the shell complete, which I'd sold on to a lotus dealer covering all of my costs to purchase the car with.

All power to mr musk, I wish I had the resources to play with interesting stuff like he does.

2
0

Too busy tweeting to turn over TV channels? AT LAST a solution

phil 27
Go

Re: Epiphany

/dev/null please :)

Twitter is useful, long may it continue, my house tweets me when it starts raining. If you think thats useless, wait till you are in good books for saving the mrs washing from getting wet due to your technology, or dont have to endure a evening of your house smelling of wet dog...

I could add some config to let incoming tweets change the tv channel, but then my entire stack is opensource so flexible...

If the brainded masses stopped supporting twitter, I'd have to start checking emails, or getting im's from the house instead!

2
0

How to get a Raspberry Pi to take over your Robot House

phil 27

I'm looking at my Pi right now running the freedomotic framework, with backend duties being taken care of by a pair of Denkovi ethernet relay and aquisition switches sat on the end of a pair of ethernet cables with power by POE.

Once the local electrical inspectors pass my house so it can have a electricity meter (hopefully tomorrow), I'll be swapping these into the lighting circuits and replacing my switches with momentary ones plugged into the digital inputs on them. Interestingly when we rewired, we ran ethernet to empty boxes adjacent to the 3 lighting junction boxes covering the whole house...

Sheild? we dont need no steenkin shield, pi just does framework stuff, leaving the switching down to the relay controllers, that way its local to the boards and lightning fast (painful memories of x10 in this regard...) but the home automation computer (the pi) will still be aware of whats going on and able to switch it too . Remote control of the framework at the moment is a webserver based frontend, some java applet local to the pi or an android client.

1
0

UK micro pioneer Chris Shelton: The mind behind the Nascom 1

phil 27
Thumb Up

Very cool. My first exposure to the inside of computers and using them as more than a black box was at a local computer club, where a older member called Jerry had a kit built Nascom2. I was fascinated that one week he'd slide in a new card and do a graphic of a pixel bloke running, another something else. It was housed in this old tv case. It led me to build a keyboard from scratch for my then brand new zx81, add ram to shunt the char rom into ram so it could be edited, and all sorts of other nasty hacks which were incredibly educational.

Much later on I found he'd swapped it for a telephone answering machine for his business, I'd have loved to have owned it, it'd be set up next to my amiga and things in the second office :(

I still warm a soldering iron up and tinker with embedded stuff now and again for fun.

1
0

Weev gets 41 months in prison for exposing iPad strokers' privates

phil 27
Unhappy

Well, Im sort of torn on this one, firstly unlike a lot of the preaching types here, I've *tried* to report a flaw to a website I wasn't involved with commercially and been accused of "hacking" by a clueless sysadmin a few years back, even though I'd noticed the flaw going about my legit business, and had notified them rather than trying to exploit it further. And it was done for the guy to save face, and he was friends with their legal dept. Not a pleasant experience but not one that ended up as bad as it could have.

That taught me a harsh lesson, unless your under specific engagement contractually to test something, never ever ever try to be open and helpful and do full disclosure anything but anonymously as your exposing yourself to risk needlessly. I had a spate of reporting things anonymously via throw away email addresses set up after multi hopping through proxies and vpn's but Ive given it up as a completely bad job now. Why risk it at all? just wait for them to get p0wn3d by some kiddies and job done at no risk for me. Its not good internet citizenship but you cant be a good citizen with the policicization of internet security going on of late.

Secondly the actual sentence for what is in effect exposing a shitty api with no security is completely inappropriate. He didn't even have to circumvent any digital controls, which is the legal definition of hacking, just use the standard interface in the way anyone could on the public internet. If you loose that distinction I could put a webpage up with robots.txt set to deny listings by goog etc, and charge you with illegally accessing it as I dont want it public. AT&T should be in the dock for letting it go live and handle subscriber data in that state, not getting the feds to bash the finder over the head until he's out of sight.

So given the above, why am I torn? Because weev has been a pain in the ass to the internet for years and its certainly his karma catching him up. The GNAA, last measure, 4chan, ED and other things done solely to piss in everyone elses pool. I can't think of any good thing he's been involved with. He is part of the cancer that is destroying the internet.

Having said that, its the sick porn distributers and incomprehensible idiots we should be defending the strongest, justice shouldnt just be for the nice people on the net, so I hope the EFF etc step up to the plate regardless of his history which shouldnt come into this.

Torn torn torn, and not posting anon for a change.

2
0

'Leccy-starved Reg hack: 'How I survive on 1.5kW'

phil 27
Go

Re: Adversity breeds ingenuity

To be honest, its always better to have a genny to hand if your off the beaten track a little.

We're about to enter the "extremely very cold" bit of winter here, and I have my little 1kw genny ready to run the central heating pumps for the wood burning heating system should it falter. A single bulb and the ability to stay warm while the leccy company takes a week to restring all the overline powerlines that fall down with the weight of snow is worth far more than you can measure in a simple cost of power vs fuel/generator calculation.

Future plans here include a 100kw 3 phase diesel backup genny on a skid off fleabay uk, because its really not cheaper to pay the higher tarrif long term for those few occasions we need more than 25kw 3phase...

Oh if you can get 3phase into your house but current limited, you'll have the fun "getting everything phase balanced" game, so the microwave isnt on the same phase as the washing machine etc. And if you dabble in home automation you too can find out how crap x10 3 phase filter units are (2 blown per year on average...)

1
0

Chinese man pleads guilty to $100m piracy scam

phil 27

The disconnect is that is the OEM selling price, not their sticker price which would be considerably lower. Hence their disputation of the amounts in the court documents.

0
0

Page:

Forums