42 posts • joined 25 Dec 2009
Apple covering you breaking your iphone for 1 year still does not count as offering the minimum warranty that EU law requires (2 years).
So instead of straight up stating that their products have a 2 years warranty (and still make it "1 year if you break it" if they want), they instead went the sleazy way of saying "if you ask about the 2 years warranty, sure, we'll honor it". Basically hoping they still get to con people into buying new kit because the Apple warranty is over, unless the customer mentions the 2 years thing. Sleazy is sleazy.
Re: but why steal them
> if the currency fails then stealing them is a worthless activity.
I don't use Bitcoin so I had the same thought, but this does not seem to be happening.
After all it seems hundreds of millions worth of coins were stolen recently and news about it have had that "the sky is falling!" feel to them, yet Bitcoin value has gone up 30% in the last 7 days.
Anyone can shed light on this?
Re: Grammar nazi FTW
> I'm sure you meant to say "complement"...
hopefully he really meant "compliment", i.e. the only way anything "social" will happen on this new disaster?
Re: "He used my access to make you a domain admin?!"
"In the Linux world, there's "Blue Proximity" that requires a particular Bluetooth device to be close enough to the computer to keep it unlocked."
We've had something similar setup with our developer pool for a few years, however we've recently added a "name and shame" component to it where it sends an email promising to pay for friday's beer to the rest of the team.
Re: y'know ...
"But that would be wrist and tablet."
Re: Ok, not so quick and easy
"And from where do you think we will obtain trust-worthy hashes?"
The real issue is reading the BIOS binary to calculate the hash, which nowadays resides on a chip that is soldered on the motherboard, meaning that any attempt at reading it will actually be controlled by the compromised BIOS. It'd be a simple thing for a compromised BIOS to return the uncompromised binary when it is read like that.
Re: iOS 7
What are you saying?
That the 75% install rate for an update that your phone constantly tries to push to you, which most people probably install "because it's newer so is probably better", or "because this latest app requires it", with no possible way back to the previous version if you don't like it, is a proof that people prefer that version?
Re: I won't read this
Same reason we'll downvote someone who doesn't get, say, a Doctor Who reference, and then proceed to insult the author of an article because of it. "Embiggens" sure isn't a real word, but it's also a well-known made-up word that's been used a lot in The Simpsons - in fact it's part of the city of Springfield's motto.
Sure it's a made up word, and sure it's ok that YOU don't know it, but then you went and made an ass out of yourself by insulting the author and/or the article because you missed a (very old, very common) pop culture reference.
Didn't defend the word, rather, downvoted your dumb overreaction to it.
Re: I won't read this
A noble spirit embiggens the smallest man.
Re: how about ...
"Yeah, because none of those servers out there on the Internet run anything that anyone might care about."
I hesitate to step in a Linux vs Windows thread... However many of the classical malware spreaders go after bank accounts and the like. Or they want to make botnets for various nefarious deeds including apparently bitcoin mining now. These are all attacks that want to hit a critical mass of machines, which they'll reach by infecting of millions of desktop.
People that go after databases (the recent adobe mess comes to mind) typically don't do it by emailing dodgy .doc or .pdf files to sysadmins hoping they'll execute them on their web/database servers. So saying "lots of servers run Linux and there's not a ton of malware on it so it's proof that Linux is malware-proof" is dubious logic.
At the very least we can look at the reasonably large number of Windows servers our there, see that most of them are not malware-ridden like their desktop counterparts, and see that there is some logic behind the idea that malware attacks target the most common denominators.
Re: Make The World A Better Place? Microsoft?
Nah, by far, their best slogan was Windows 95's installer,
"Whatever you do will be more fun."
"No additional coding will be necessary."
Honestly, this being Facebook, who are known for breaking their APIs every other week and telling developers after the fact, this was actually a pretty useful clarification.
> But didn't Android copy the iOS interface?
Ergo, Jolla's UI looks like crap!
"And going forward you can be sure there will be ways of deploying internal apps to ithings and athings."
This is the part I'm not so sure of.
At this point Apple seems to show no interest in supporting corporate control over their (iPad/iPhone) devices. If it was going to happen, it would have happened (or been announced) already.
Re: Nice cat
Holy crap, printers with their own control panels are one of my most hated things.
Not that Windows' default printer control panels are all that spectacular, but printer-specific software make adobe's software look stable in comparison!
Not to mention that most of these control panels nowadays are bloated adware to get you to order ink from the manufacturer's web site...
Re: Why did MS suddenly fall out of favour with contrast
The one trend I can't stand is all the UPPER CASE MENUS THAT NOW MAKE VISUAL STUDIO LIKE IT WAS CREATED BY THAT 65 YEARS OLD UNCLE THAT SENDS ME EMAILS IN ALL CAPS BECAUSE IT'S EASIER TO READ.
Any game released this month that does not work on windows 8 specifically (i.e. not your pc specifically) would probably be some indie title made by a small crew that only ever tested on their 5 windows 7 PCs. There's no good reason otherwise, just as the same indie guys couldn't be bothered to test their stuff on windows 7 for the first year.
Whoa there, don't get ahead of yourself, next you'll say false advertising should be illegal...
Salted passwords are not about keeping one unique salt secret, it's about having a distinct sale for each user assuming that if your shit gets stolen, the salt will get stolen too.
However since each use has a distinct salt, you need a full-blown hash generation cycle for EACH user hoping your password attempts will hit jackpot for that one guy.
As opposed to having a single common salt where you just generate your hashes for your big dictionary and just see what users have hashes that match those.
All it does is make a dictionary attack less efficient by a factor of "how many users do you have".
Because version numbers, for developers anyway, are not decimal numbers, they're incremental numbers separated by a dot. 3.10 comes after 3.9.
Now what marketing departments say about it is something else I suppose.
Re: Hang on
It's not a final requirement.
The issue is with the Release Candidate version of .NET 4.5.1 that VS 2013 RC requires. It will not install on Windows 8 "Preview" which already includes some sort of "Preview" build of it that is not upgradable.
It's "can't use on 8.1 Preview", not "won't run on 7"
Not to nitpick,
But aren't the lights in the wrong order?
Key: unlock device - green
Flip: arm - yellow
Button: kaboom - red
Re: Dev[e|i]l's advocate....
It all depends on the reason for the speedup. If it's a general "Intel-optimized compiler", you are perfectly right, this is a very legitimate reason to prefer one platform to the other.
However the past has shown us that hardware manufacturers have been more than willing to game benchmarks, all the way back to the old video cards whose actual hardware recognized testing tools and just skipped a lot of hardware work so the same software would run a lot faster...
Re: Couldn't even get arrested looking like that
The Reg needs to write an article about this event, this would make the most entertaining headline.
"I was hoping that the first Post-Eadon Patch Tuesday comment thread may have had rather more mature and rather less tediously predictable comments."
Post-Eadon? For real? I must admit I have been reading comments less and less because the fanaticism was taking up more and more effort to sift through, and obviously Eadon was one of the primary catalysts that derailed what could otherwise have been interesting arguments.
Now I realize that the few things I read lately, I've seen many Eadon references but not him actually posting.
Can we now safely open comments on articles about topics that have any sort of chance of being twisted into anti-Microsoft rants that drown out anything else?
Re: Times are changing in Googleland
The opt out wasn't there because you mindlessly clicked next. It comes up in big shiney letters. "We would like to install google toolbar, click next to accept this, or click cancel to continue the intallation"
If that's really how it is, it's clearly a cheap tactic meant to install without the user being aware. If replacing a checkbox opt-in with some phrasing that says "you must hit cancel to continue installing without this extra junk" is acceptable, then eventually this crap will get so obfuscated that you will need a lawyer to understand if the addon is going in or not.
"I understand that by clicking next I am not agreeing to the notion that I oppose the fact that adware will be installed now or at a later date and should I hit alt-F4, it will signify the opposite of that non-agreement."
Re: Give an automatic rifle
"Is the USA driving age still strangely low?"
Young men can join the air force and fly combat missions where they get to drop bombs on people while they're still considered too young to drink.
Re: @Meh ...
So, you actually mean it was Big Bang powered?
Call it paranoia if you will but,
"I love Dropbox, and have used it in both the personal and corporate contexts."
Using dropbox in a corporate settings to share folders or files, even just "as we collaborate on presentations or other files", is unbelievably crazy. I'd love to see the face on most of the companies we work for if we told them we shared files with dropbox "because it's convenient".
Given that we're a non-US company, and that Dropbox puts out statements like this:
This makes using dropbox entirely unacceptable within our entire company. It's not paranoia, it's actual business contracts - none of my clients would be please with the idea that we hand anything related to them to Dropbox to do with as they please.
And spare me the bit about "using it only for non-sensitive material". Once you put dropbox in your users' hands, no matter how much you drill it into them that it's not to be used for sensitive information, you can be sure that some retard somewhere will find it convenient enough to sneak some super sensitive crap there to work on it from home without thinking.
Re: Platforms that scale
" "We had never in our industry seen four network platforms that scale."
What is a "network platform" and what does it mean to say that "it scales"? Can anyone provide definitions for both that make it clear why the chosen four meet the criteria and no-one else does?"
I would assume he meant "four network platforms OF that scale." - that's how I read it anyway.
Not that I don't fully agree with the rest of your sentiment.
Re: What does "support" mean though?
" ... but if a catastrophic security flaw surfaces in iOS 5, would Apple fix it and offer a patch?"
Actually no, they won't.
I bought an iPhone 3G the day they were available up here in Canada. Only way to buy was with a 3 years contract (yeah it's a Rogers contract, but fact is, I bought a phone I was not allowed to use / pay for less than 3 years). Just under 2.5 years later, the first iOS that was not supported on my phone came out.
At that time a few Safari bugs / flaws were floating around. Apple declared it was fixed in the new iOS only, and therefore users should upgrade. But I couldn't without buying a new phone. Before the actual contract on mine was over.
That was the last product I will ever get from Apple.
IMHO forcing people into contracts and then ending support for bug fixes on a product that you still have a contract for should be criminal.
Re: Volume issue, amongst other things.
You're missing the point here. That brick isn't for your basement, it's for the streets / walkways outside to let water seep through underground before it gets to your basement, instead of flowing and accumulating (and eventually getting to your basement).
Re: £25 for a box and a couple of DVDs
To accomodate the retail channel's profit margin maybe?
So you're one of those "it's not the thief's fault, your goods were stolen because the lock on your door didn't work properly" guys?
I read the two sentences, didn't see a difference.
I read them again, because your post made no sense to me, I mean what were you talking about, those two sentences are the same.
But wait, they're not the same length, SOMETHING is going on! Only caught it on the 3rd pass, comparing word for word visually :(
Re: Old-timer Mac Fan despairs
Doesn't it make your hear hurt a little when, as a Mac user, you type "Microsoft" with a dollar sign?
So-so argument there.
To use ANY browser, you have to buy a computer.
Therefore no browser is free.
Was actually purchased by Apple, and it was announced, including here:
I remember that because these guys were my neighbors ;)
Ok this is somewhat of an issue, but...
If I understand what they're describing, it's a way to bypass the filter you can pass to the HTML "input type=file" file selector control, that will let you pick a file named something like "evilcode.asp;.jpg", and then once posted, this would show up in the values that the upload-processing page would get as "evilcode.asp;.jpg", in which case poor validation code might not catch it, and if that code were to use that file name to write the file to an IIS-readable folder (say, for an avatar as in the example), then it would end up on the disk as "evilcode.asp".
For this to be any sort of threat, doesn't it require some major programming/security failures on the part of the developer in the first place?
1) The programmer trusted the client-side file extension filter
2) The programmer's upload validation code did not catch the bad name
3) The programmer used the client-supplied name instead of saving said avatar to something like "avatar12345.jpg"
4) The security context the web site runs in has write-access to an EXECUTABLE folder, which is a disaster waiting to happen in the first place (someone needs to get fired over this)
While there is definitely something fishy going on because of the way .asp;.jpg can eventually transform into .asp while handling the file, if a site is set up in such a way that this can be exploited, then we're dealing with a site managed by people that don't have the slightest clue about security in the first place...
- Vid Hubble 'scope snaps 200,000-ton chunky crumble conundrum
- Bugger the jetpack, where's my 21st-century Psion?
- Google offers up its own Googlers in cloud channel chumship trawl
- Interview Global Warming IS REAL, argues sceptic mathematician - it just isn't THERMAGEDDON
- Windows 8.1 Update 1 spewed online a MONTH early – by Microsoft