* Posts by Black Betty

140 posts • joined 3 Mar 2010

Page:

Security bods gagged using DMCA on eve of wireless key vuln reveal

Black Betty

Re: There is a reasonable process....

All well and good, until you set yourself up in the business of providing (and promising) security beyond that offered by a decent mechanical locking mechanism, and then utterly failing to deliver on that promise.

IIRC Cybelock's claim was that their electronic "enhancements" EXTENDED and COMPLEMENTED that mechanical security, when in fact it did the exact opposite, by coupling a proprietary (and seriously flawed) security algorithm, with a single (lock) pin pattern deployed enterprise wide. (Might as well be a wardrobe key or bent piece of wire at that point.)

If the highest possible (root level) access can be extrapolated from a guest access key then there is a serious fornicating problem with the implementation, which needs to be addressed right now. Right now as in, sending out a bunch of "We screwed the pooch and you need to change your locks now and send us the bill." letters immediately.

Cyberlock's customers might deserve a certain grace period in which to find a solution to a problem not of their making. Cyberlock deserves nothing but a kick in the corporate teeth.

Strikes me the solution when something like this happens is for a duly appointed entity to step in immediately and notify ALL affected customers. AND for the responsible company to be stripped of limited liability status, and given the choice of providing an IMMEDIATE fix, even if that means deploying a competitors product at their own expense, or the principal stakeholders facing those they've wronged in the courts with ALL OF THEIR ASSETS up for grabs.

0
0
Black Betty

Re: Perusing this Cyberlock website...

What employee's privacy? What names were named?

What do we know? That SOME (less than all of a quite large workforce) employees of Amsterdam Metro tried lots of doors they knew they shouldn't open.

0
1

Travel back to the 19-Z80s this weekend

Black Betty

Re: Why?

If more programmers actually knew how computers worked, and learned how to do what they do in a resource limited environment we might have fewer security issues to deal with.

When you grow up searching for somewhere to squeeze in just a couple of dozen bytes of code you get pretty good at recognizing code which performs no useful purpose, and even to a certain degree, does more than it appears to on the surface.

My first effort, it was replacing the cassette tape code on my old Apple ][ with an inline assembly language print routine. POP the return address, output (through the I/O hooks so DOS could see it) whatever followed the JSR call until a 0x00 was reached, PUSH a new return address, and continue.

With an overlaid Monitor ROM I eventually had a suite of "inline data" calls which made my machine code very difficult to disassemble, (at least until you realized what was going on) but my macro assembler source code, very easy to write and maintain. The fact that it wouldn't work on any other machine but mine unless that machine was modified with a piggyback ROM was a niggling detail.

1
0

Win10 Insider build 10532: Avoid if you run Chrome 64-bit

Black Betty

Initial intent and possible damage (potential or realised).

With a small company, the most likely reason for someone to randomly paw through a client's data is boredom and simple curiosity. Someone who does do it systematically with malicious intent, is also likely to only ever hurt a handful of people, even if they are never caught. Even a solicitor directly managing the financials of their clients is somewhat limited in the amount of damage they can cause.

With a large company, the intent from the get go is to extract the greatest amount value it can from the information it possesses or can obtain about its customers. All neatly collated, tagged and packaged for bulk slurping and misuse in the wrong hands. When in those wrong hands, it's not individuals, but thousands or even millions who's economic (and possibly social) lives are turned upside down.

When the local Pizzeria gets compromised, a handful of people are out their credit card details, and in all likelihood will be fully reimbursed. When a site like Ashley Madison (or heavens forbid Facebook) is breached, there is generally more than enough detail to carry out total identity theft and completely destroy a person's life. AND rinse and repeat ad infinitum.

Furthermore, Mom and Pop's piddling 1000 usernames and plaintext passwords are of little value to someone seeking to use those compromised credentials as part of a broader attack front against multiple web sites. Whilst on the other hand, as has been demonstrated recently with the Ashley Madison database, that even decent encryption is near on completely useless when people insist on using really, really crappy passwords.

It doesn't matter how solid the encryption is, if the algorithm AND the final hashes it produces are known quantities, given a large enough attack front. A 1000 word dictionary attack on a million password database will yield a significant list of usernames associated with those passwords, which can then in turn be used in front door attacks on other websites.

7
0

PALE BACKSIDE of lovely Luna flits past in imagery from 1 MILLION miles out

Black Betty

Someone got left out of the last shot.

ftp://nssdcftp.gsfc.nasa.gov/miscellaneous/planetary/apollo/as11_44_6642.jpg

+ 1

0
0
Black Betty

Re: Lunar Imaging

All of it. Provided you don't mind the nearside being imaged from an extra 1/2 million miles or so.

0
0

Budget UHD TVs arrive – but were the 4Kasts worth listening to?

Black Betty

Possibly, but why bother?

Unless something's changed somewhere,it's my experience that computer monitors are considerably more expensive than comparably sized TV sets.

1
1

Jeep drivers can be HACKED to DEATH: All you need is the car's IP address

Black Betty

Why are we using GP computers/OS's...

with all the bells and whistles for limited functionality applications?

It would not surprise me at all to learn that like with IoT devices, computerised cars are loaded down with tens of megabytes of code which serves absolutely no useful purpose except to provide an expanded attack surface for potential miscreants.

Recall this old joke?

Windows 95/98, (n): 32 bit extension and a graphical shell for a 16 bit patch to an 8 bit operating system originally coded for a 4 bit microprossessor, written by a 2 bit company that can't stand 1 bit of competition.

This joke is why black hats have such an easy job.

12
0

Practice makes perfect: NBN fibre deployments accelerate

Black Betty

Re: Chewy on ya boot Malcolm

On the contrary. He achieved exactly what he set out to do. Give his mates the opportunity to do the same job twice.

The current project of bringing the network up to last generation standards. And then a second time delivering what was originally promised, five-ten years late, and massively over-budget.

0
0

Infusion pump is hackable … but rumours of death are exaggerated

Black Betty

Dongle?

Just how hard would it be to create a wireless to Ethernet dongle? One small enough to be practically unnoticeable without knowing what to look for. It wouldn't even have to be wireless, just preloaded with the exploit.

Someone dressed as a nurse or doctor passing from station to station with a pocketful of these could easily compromise every pump in an infusion centre.

0
1

AGL trumps Tesla with batteries-and-solar-cell package

Black Betty

Re: Rent, don't buy

Did you read the article on the Tesla batteries? He's selling them outright.

It looks like their batteries have been deliberately nerfed (in terms of discharge rates) in order to maximize their lifespan.

1
0

RELICS of the Earth's long lost TWIN planet FOUND ON MOON

Black Betty

Re: Was there even a collision

Beg to differ. Venus is plenty runny beneath the surface. Difference between there and here is, there the entire crust turns over catastrophically every now and then, here we have plate tectonics and relative stability.

4
0

Microsoft announces Windows 10 and Azure for humanity's implacable IoT foes

Black Betty

Why mega/gigabytes of code for kilobytes of functionality?

Strikes me that most IoT devices have very limited functionality. On/off, power level and not a great deal more.

So why the hell are we using advanced general purpose computing devices (fully blown PCs for all intents and purposes) to carry out tasks for which a 1975 6502 would be massive overkill?

Far better would be a decently hardened "home server" as the sole interface between the wider world and the devices it controls, and a collection of dumb devices which WILL NOT take instruction from anything but the server to which they are registered.

11
0

Brute force box lets researchers, Cops, pop iDevice locks

Black Betty

Re: PIN over USB?

At 6 seconds per attempt, a PIN punching bot is very doable. Seems Apple has already speed limited the rate at which PIN's can be entered EVEN WHEN BYPASSING the usual interface.

0
0

Elon Musk's Tesla set to unveil home storage battery

Black Betty

Re: Stupid

Battery does not have to beat the grid. It has to assist in balancing the load on the grid.

Practically, to achieve 100% electricity generation from renewables, there is always going to have to be a certain degree of overcapacity in generation simply to compensate for the fact that the wind and sun are inconstant as well as intermittent. But there's also an upper limit how much under-utilisation of generating plant that can be financially tolerated. A small amount of storage can go a long way toward limitting the amount of over capacity needed to meet peak needs.

0
0
Black Betty

Re: Oh great...

Actually about $4000 or less at Musk's CURRENT prices. Combine with a sub $15k 5 kW solar system to go off grid without sacrificing much in the way of convenience or lifestyle, but with probably enough back from even a pitiable feed-in tariff to justify remaining grid connected just in case.

With sub $100 per kWh of battery on the cards, staying grid connected is a no-brainer. They'll be installing the battery for you. Even leasing it off you if you choose to own outright more hardware than you actually need. Idling wind generators would no longer be a waste of free electricity. Everybody's battery gets a top up and those cheaply hoarded electrons are ready and waiting at a discount rate for when the ads come on and everyone's kettles sing as one.

1
0
Black Betty

Re: Count me in, but...

With conversion efficiencies above 95% it's perfectly practical to buffer a delicate high capacity battery bank with a smaller capacity battery that will tolerate high charge rates and also being sucked dry by a joule thief.

0
0
Black Betty

Re: And all because

You might be surprised. The Old paradigm of continually managing the energy supply to match the demand is fast flying out the window.

The new paradigm is matching demand to a continuously variable supply. Even a quite small battery (2-5kWh) in the home in conjunction with a rooftop photovoltaic system, would suffice to significantly limit the amount of time your home has to resort to the grid at all, even when firing up energy hogs like air-con, kettles and vacuum cleaners. Simply trickle charged at off-peak rates that battery combined with an increasingly affordable inverter will let you avoid the worst of premium rates.

If Elon Musk get battery prices down to a genuine $100-$200/kWh, a few thousand dollars worth of battery and inverter would allow most households to make ALL of their electricity purchases at the lowest available tariff. Even at $400/kWh (looking at < that price right now) such a setup would result in enough savings to more than cover the cost of a new battery every few years. Provide the overcapacity and in all likelihood, electricity providers will happily lease it off you for load balancing purposes. Do your number right, pop on a few solar panels and become a small scale electricity provider yourself with a zeroed power bill and showing a modest profit after amortised costs. Can't argue with that.

1
0
Black Betty

Re: I've already got the system beat.

Two separate dwellings sharing a wall, on a single land title. They often share certain features as a commons, ie basement and yard space.

I suspect a certain amount of lawbreaking, given that he is to all intents and purposes DEFRAUDING an incentive scheme intended to pay for electricity generated from renewable sources, by instead feeding in electricity from an ICE*-generator set powered by fossil fuels. He probably pays a premium of 50-75% over the standard tariff for his fuel and running costs, but still profits on the inflated price he's being paid for the 25 odd kVA "generated" day and NIGHT by his 25W cosmetic solar panel.

* Infernal Combustion Engine.

2
0
Black Betty

Re: WTF?

Combine with rooftop solar for total grid disconnect, or stay connected to the grid and sell your leftovers for whatever pittance you can get AFTER you've accounted for your night time and grey sky needs.

I suspect, given the way power companies are starting to punish rooftop solar in some locales, that a new service industry might emerge offering a mobile rapid charge service as more and more people elect to abandon their connection to the grid entirely.

Or form a cooperative with your neighbours. Lots of solar panels on lots of roofs, a big battery bank and just one grid connection per 20-30 houses.

Affordable high capacity batteries are a real game changer, given their intermittent nature of the most mature renewables. Solar only works during the day, and wind only when wind speeds are neither too fast or too slow. Wave and tidal generators, not tied to rare geographic features, have a bad habit of being smashed to smithereens whenever the weather gets a little too boisterous.

One beauty of a fully mature portfolio of renewable energy sources is that the idea of excess/underutilised capacity ceases to have any meaning. Since running costs are extremely low, it begins to make sense to do energy intensive things like use desert sunshine to melt Boston's snow and use that to water lawns in Las Vegas.

0
0

They've finally solved it: Schrödinger's cat is both ALIVE AND DEAD

Black Betty

Re: Quis custodiet ipsos felis?

I believe it (the amoebae) might be.

The largest item successfully put through the quantum wringer (double slit experiment) is a 114 atom buckeyball.

0
0

WATCH IT: It's watching you as you WATCH IT (Your Samsung telly is)

Black Betty

Re: A little surgery

Sound ports tend to be fully configurable these days. The same sockets support 7+1 surround sound and 7 lines in.

1
0

Reg man confesses: I took my wife out to choose a laptop for Xmas. NOOOO

Black Betty

Clearly you bunk with Ms R. Palm.

There are NO WINNERS to be had by teaching one's SO a lesson by rubbing their nose in their own ignorance.

9
0

REVEALED: Titsup flight plan mainframe borks UK air traffic control

Black Betty

Extended Binary Coded Decimal Interchange Code

All the way to the D before Google auto-complete offered up EBCDIC.

0
0

How HAPPY am I on a scale of 1 to 10? Where do I click PISSED OFF?

Black Betty

Re: Even stupider security

Hold in hand with individual keys protruding between fingers. Punch. Not necessarily deadly but one can really mess a face up that way. You will also most likely mess up your hand too, but if something like rape is on offer, it's probably a small price to pay for escape.

You might be surprised by what ordinary, seemingly innocuous items can be used as improvised weapons or damage multipliers.

0
1

Hi-torque tank engines: EXTREME car hacking with The Register

Black Betty

Diff whine isn't diff whine.

What you are hearing is the NON-HELICAL reversing pinions in the gearbox.

1
0

Free government-penned crypto can swipe identities

Black Betty

Re: War Games

What security? The launch codes were all zeros. WOPR would have launched on the first iteration.

0
0

Back to the ... drawing board: 'Hoverboard' will disappoint Marty McFly wannabes

Black Betty

Re: Earthquake Proofing?

Ever tried pushing two magnets together?

5
3

Today's Facebook fury: Coppertone-like baby pic ban baffles US mom

Black Betty

Possibly. It would only take a single wowser...

...making a complaint to the plods. If you're unlucky someone will look at the picture and decide to investigate further. If you're really unlucky several departments will involve themselves and proceed to turn your life and the lives of your entire family inside out. It's certainly happened to people who put in rolls of film for developing.

Like as not, a judge would ultimately dismiss, probably with some scathing commentary for the prosecution, but in the meantime: Children's Services have threatened to take your kids into care unless you move out of the family home; your spouse is looking at you sideways; rumours are flying around the neighbourhood, your kids' friends aren't allowed to visit; your car is vandalised; your job is gone.

And even with a judgement in your favour, you're still not off the hook. Children's Services can still make you moving back in with your kids, dependent on you accepting counseling (ie admitting guilt) and in home supervision.

12
0

Oz refugee data leak a SNAFU, says KPMG report

Black Betty

Refugee's who somehow manage to pay thousands...

...of dollars to the scum of the Earth for their passage to our borders. Amounts generally equal to several years median income in their own countries of origin.

We take in a significant number of legitimate refugees through the proper channels, people (Mostly dark of skin and of differing religious habits) who have spent years of their lives in the virtual prisons of refugee camps around the world; people who lodged their applications and waited for their turn. Why should self entitled upper-middle class (and higher) queue jumpers be able to purchase cuts in line from criminals in the Near, Middle and far East?

And what percentage of that tiny number, (peaking at several thousand per year IIRC), drowned at sea because those criminals deliberately put people on unseaworthy vessels,and relied on the rules of the sea which forbid leaving a vessel in distress. Several hundred DIED, and thousands more are alive only because of last minute rescues that should never have had to happen.

2
0

Technology is murdering customer service - legally

Black Betty

Omnbudsman is a magical word. (If you have access to one.)

It's amazing how helpful people can be once one threatens to involve an industry watchdog with teeth.

Payroll errors corrected now instead of next paycheck.

New phone line now instead of next month, after I was told single pair flat didn't exist by the salesperson I'd ordered a second line through.

0
0

Tesla firms hot bottoms: TITANIUM armor now bolted to Model S e-cars

Black Betty

Re: Historical (Get a dictonary)

(of a part of a machine) Move backwards AND forwards in a straight line.

ie. "a reciprocating blade"

It's the cycles which are counted not the changes in direction.

1
1

Middle England's allotments become metric battlefield

Black Betty

Re: Measurements

I would hazard a guess that with the computerisation of records, it's making less and less sense to build into new software, routines to back-convert records which someone had just been paid a lot of money to normalise under one consistent measurement system.

These people sound like that old woman who famously back in the day, suggested that the government wait for all the old people to die before introducing the metric system.

The smart money should have been on duo-decimalization with the introduction of Arabic numerals and positional notation, however Roman numerals, and abacuses, fairly conclusively demonstrate that even back then, ordinary people and bean counters calculated by looking at their fingers. It was basically only merchants and people divvying up land who found 12 and it's greater number of factors useful enough to bother with.

0
0

Turnbull Twitfight - we're backing Mal this time

Black Betty

Re: Turnbull Twitfight - we're backing Mal this time

And then there is the problem a friend of mine has. It turns out his personal copper pair is pair-gained (multiple voice circuits over a single copper pair) from the exchange to the street corner and Telstra has no intention whatsoever of introducing new capacity this side of the NBN rollout.

Adding insult to injury, while our city in general was one of the first on the list for the NBN rollout, his specific suburb (with a very high percentage of retirees and other low income earners) was excluded.

And then there's the number of subscribers who are still stuck with single pair flat (untwisted) connections to their nearest pit or pillar. Something which bit Telstra on the bum nice and hard when I had a second line installed in NSW. Linesman came to install the second phone, took one look at the lead in and told me it would be at least a month before the connection I'd already been billed for could be made.

Fortunately, I'd specifically mentioned this problem to the girl on the other end of the line when I placed my order, and she'd responded with "There ain't no such animal." I argued, she insisted, and the recording made for "training purposes" bore me out. Telstra decided it was cheaper to string a new twisted pair line, then and there after 5 PM on a Friday, than pay the fine for an upheld complaint to the ombudsman.

Unfortunately for wannabe broadband subscribers, Telstra's legislated service guarantees top out at the 9600 baud analogue necessary for FAX machines.

0
0

IBM PCjr STRIPPED BARE: We tear down the machine Big Blue would rather you forgot

Black Betty

Re: The 6845 is a zero-colour chip

IIRC there wasn't a single ASIC chip in the original APPLE ][.

The CPU had access to memory in the for half of each clock cycle, and the video circuitry access the memory during the other half. This allowed the video circuitry to do double duty, refreshing the DRAM.

Recall the 8 line video interleave which IIRC saved a whole 2 logic gates.

1
0
Black Betty

Re: Floppy drives

I recall on the Apple ][ (please folk, get it right), the disk drives made no use whatsoever of the index hole for timing or locating the first sector, but instead relied on the motor spinning at exactly 300 RPM and reading and writing to the disk at the bit level. This meant making a flippy was as simple as cutting an extra write enable notch on the other side of the disk. (Or installing a switch which bypassed the write enable sensor entirely.)

All disk access was done entirely in software. A carefully timed (40 clock cycle loop) chunk of code waited for a specific patten of 10 bit long "bytes" to pass under the read head. Actual data was read and written with a 32 (8 bit) loop.

To avoid the possibility of a sequence of stored data accidentally mimicking the lead in index "bytes", only 64 of the possible 256 possible 8 bit patterns were originally permitted, and data was written using 5 + 3 bit encoding, meaning it took 3 bytes of space on the disk to store 2 bytes of data.

As it happens it's possible to store 96 (more?) unique bit patterns without upsetting the index byte apple cart, but the tight timing of the write code made it impossible to take apart three bytes and reassemble them into four (6 + 2 bit encoding) on the fly with code alone.

As memory got a bit cheaper, buffering and some trickery with lookup tables, solved this problem, and Apple was able to up it's sector count from 13 to 16 per track.

More exotic coding schemes were introduced by developers to prevent the standard utilities being used to duplicate disks and the copy protection arms race was on.

And then there was all the fun that could be had with 1/2 and 1/4 tracking, the early read/write heads were too "smeary" to permit adjacent tracks that closely spaced, but because ALL timing was in software, spiral tracking was possible.

Oh the joys of MUFFIN, FID, Locksmith and boot-tracing self modifying code with custom ROMs. All for legitimate backup purposes only of course.

1
0

Cable thieves hang up on BT, cause MAJOR outage

Black Betty

Re: It's a positive step for UK broadband

Not so easy. BT would either have to strip out more cable, all the way back to an exchange where a fiber access point was available, or splice in multiplexers and demultiplexers at each end of the break.

Either way you're looking at massively increasing the length of the outage.

0
0

NBN Co tells iiNet: Use Broadcom chips in VDSL routers

Black Betty

I wonder what (if any) relationship Broadcom has with the Alphabet soup?

no text

0
0

Microsoft to Australian government: our kit has no back doors

Black Betty

Re: Do people have no memories at all?

They are however quite possibly that arrogant, vis a vis their badge for their latest spysat. And code monkeys sometimes think they're that clever.

0
0

EE BrightBox routers can be hacked 'by simple copy/paste operation'

Black Betty

Re: Whose routers ARE secure?

Ten years and more ago that suggestion was a show stopper, too many discrete components required, too little under-utilised bandwidth to hide in. Today, not so much, the silicon real estate necessary for such a "feature" would represent only a small percentage of a monolithic device managing a dozen communication protocols over hundreds of I/O channels, directly connected to a "pipe" the size of the Mersey Tunnel.

Fortunately, such attacks on the underlying physical hardware must be done at the front end of the manufacturing process. The blue prints themselves have to be altered, and opportunities for being found out subsequently are myriad all the way through the manufacturing process and even the junk bin. Any lazy college student with electron microscope time on his hands might find it.

Now, when the next layer of abstraction plus encryption gets offloaded to the I/O chipset all bets are off.

However, it's all somewhat moot when we know that a spread spectrum digital radio transmitter can be hidden inside a USB connector. We should just thank our lucky stars that RJ-45 connectors are transparent. the size of my mouse dongle tells me there might well be room for a "listening" bug in even that ethernet connector waved about by the talking head last week.

1
0
Black Betty

Re: "WPA keys, ISP creds, MD5 hashes - all in plain view"

Nope not personal at all. Held jointly by you and your ISP. Or I'd bet that's how they'd argue it. And not quite in public view. If I'm reading this correctly, someone up to no good needs physical, or at least guest wi-fi access, which put this in the class of trusting your neighbour not to take a soap impression of your keys while you're on the bog.

And that's as far as it goes. Without special effort on your part, your privacy in the modern world is pretty much entirely dependent on the size of your profile and the amount of interest you attract.

I just discovered my (not by my choice mind you) ISP stores passwords using reversible encryption. And worse their lost password procedure is to send it to you plaintext in an SMS message, in my case to a phone number I'd just given the tech not two minutes earlier.

And that my friend is an improvement. In my previous lost password conversation with them, the tech read my password out to me off their screen.

Better still, up until very recently all email logins were clear text only, and the last to be upgraded to encrypted logins were of course the primary logins for each account. Their argument was that it wasn't an issue because the connection from the modem to their server was secure. I asked what about remotely accessing email from another computer and the response was essentially, they provided what they contracted to provide - A HOME broadband internet connection, and they couldn't be held responsible for what I did with their credentials on a third party's network.

0
0

Naked Aussie gets wedged in washing machine

Black Betty

& RESCUE. Strikes me we've got an editor clarifying...

that our SES (State Emergency Service) conducts S&R operations.

AND

A correspondent who demonstrates that such clarification is both necessary AND still insufficient.

0
0

Australia rebukes Apple for 'false or misleading representations'

Black Betty

Was thinking this myself. Re: TPP

The blanket meta regulation which forces all treaty partners to abide by the lowest common regulatory denominator, could well see future warranties become comparable to those which once came with "genuine" designer goods purchased in a Kowloon flea market.

0
0

Inventor whips lenscap off 3D-printed pinhole camera

Black Betty

@Chris_W - First in best dressed.

He saw an empty marketing niche (AKA people easily separated from their money) and filled it to the tune of a few thousand dollars.

1
0

US states: Google making ad money on illegal YouTube vids

Black Betty

Re: First amendment?

And no one appears to be asking Google to take the videos down.

Where Google could very well come undone is their ad matching technology under proceeds of crime legislation.

Only have to prove that someone used a YouTube video to commit a crime they could not have committed without knowledge gained from the video and Google could be screwed.

Hit them for the $3.64 raised by the ad and hand off to civil litigation by the victim(s).

Moral leadership is neither here nor there. Google regularly censors YouTube content. It's certainly fast enough to take down any bare titties which might appear. What this really boils down to is that wowsers have enough clout to scare Google into taking down content which they disapprove of, but without Gawd to whip folk into a frenzy, instructional videos for committing actual criminal acts just aren't the same threat to their revenue stream.

0
0

Love in an elevator.... testing mast: The National Lift Tower

Black Betty

Someone needs to water that pitch.

no text

2
0

Australia downloads a limping 13 Mbps, says Ookla

Black Betty

Or perhaps, one of the DSLAM-2s 'retired' in the upgrade...

...might be relocated to your nature strip as an interim solution. If not, there's NO BLOODY HARM in asking if it were possible for this to be done.

0
0

One of the world's oldest experiments crawls towards a fall

Black Betty
Boffin

Thick edge put at the bottom because it's more stable.

Simple as that. If the thick edge was consistently placed towards the top, in a leaded pane, mechanical forces would encorage to the pane to peel out of the opening if the fixings were compromised.

Less robust (even if only marginally) restraint is needed if the thick edges rests on thin, than with thin on thick.

2
0

Australian Federal Police claim arrest of 'LulzSec leader'

Black Betty

Central Coast? Point Clare? Gosford?

Where's the offence?

It's a nearly vertical, temperate rainforest, bedroom community. It has 4 shops and a vet clinic, a volunteer sea rescue base, and a land based "training ship".

And really shitty fishing.

0
0

Anons torn over naming 'n' shaming of 17yo's gang-rape suspects

Black Betty

Re: Rape IS a hard crime to prove... BULLSH*T!

Rape victims are easy subjects to denigrate.

0
2

Page:

Forums