784 posts • joined Friday 23rd April 2010 13:30 GMT
Yes that was the primary purpose of Basic - a first educational programming language that was designed to be interpreted. It was and is irritating that MS decided to use the Basic brand to create a much more sophisticated language (VB) which they controlled. But then they did similar with C# ...
RE: I bet various 3 and 4 letter organisations would agree this is the way to go.
I bet various 5 letter organisations already have a pile of essential patents with futher patent applications in the pipeline...
Re: orientation-neutral connector
>They were called DIN plugs.
The problem with DIN plugs was that they did have an orientation, get it wrong and you risked bending pins - this being even more of a problem with the micro DIN aka PS/2 connector...
Re: China begs MS to maintain pirated copies of Windows XP
>Because the US tends to get a bit anal about restraint of trade type issues....And they are Chinas largest trading partner.
Yes, the US do have a problem - access to the Chinese market is probably worth more to them (both financially and psychologically) than the US market is to China.
Currently, I would suggest that China is happy for US companies to outsource manufacturing to them, letting the US companies concerned build the reputation of "made in China". But in terms of real exports I suspect that presently China is quite happy building trading relationships with the rest of the world, where doors are more willingly being opened.. Remember China doesn't think of tomorrow so much as the day after tomorrow, this is probably due in part to it's long history of dynasties influencing it's thinking.
Re: I just started my own IT services company
Sold by the year's free banking, personally better option would of been to join the FSB and then get free business banking for as long as you're a member, plus free access to lots of experienced business bods...
PS word of advice NEVER business bank with the same bank as your private account, with small business'es banks don't tend to see the distinction between the two particularly when business account is overdrawn and there is money in your personal account...
Re: Real deal industry superstar experts @Don Jefe
I think you also hit the nail on the head, real superstars need to be managed. Unfortunately the manager will always be in the shade and so will only get recognition from those who are perceptive and have an inside track. By 'manager' I don't necessarily mean formal line manager but someone (or a team) who can influence the superstar to get the best out of them.
Re: You forgot one thing...
>Microsoft didn't add support for AES or TLS1.0 to XP, ever.
Did you miss KB893357 ? Obviously your WiFi adaptor and its drivers also needed to support WPA2, AES etc.
Re: Starting to envy the folks without access to BT fibre.
Shouldn't envy those in areas that will be untouched by BT's fibre-to-the-cabinet technology rollout. Because until BT have largely finished their rollout we don't really know where the areas are that will benefit from the additional £10m. So this 'sweetener' will effectively be a way of paying BT to include these areas.
An area where people have over looked is "the Type C jack will support power charging across a range of voltages in order to support not only devices able to operate off standard USB power lines, but also kit like laptops that require much more power than USB usually delivers."
I suggest for this to happen, safely, the cable will need to be intelligent ... Over the years, I've noticed that various manufacturer's mobile phones, don't charge over USB if you don't use their cable and their USB mains plug. So I expect this part of USB 4, will behave similarly, so whilst the vendors will be able to tick the USB box, you the user will still have to have dedicated cables etc. for some devices.
Re: orientation-neutral connector
This is a challenge, but going back to the audio jack - I remember seeing plugs that adopted the key principle, so earth/shield engaged first, other contacts when fully inserted and rotated.
A variant of this approach is used by one manufacturer of child safe UK mains sockets - the plug will only rotate when the earth pin is fully inserted. Hence effectively the plug could be as long as a DSi's stylus... the only downside is the amount of space the socket takes up - remember Apple were wanting the SIM standard changing because the required socket took up too much space within a device.
Re: China begs MS to maintain pirated copies of Windows XP
Why should China let MS have access to their internal market? If MS want to play then there is a price to be paid...
Re: AC "I have an XP workstation installed 2005"
"I have several old computers running old operating systems (RSX11M, VMS, ZCPR etc) for media conversions but ... $DEITY$ forbid, connect them to the Internet."
Don't see a problem connecting them to the Internet (assuming the TCP/IP stack is reasonably recent - I suspect a 1980's~early 1990's TCP/IP stage might complain if connected to today's Internet), particularly if it is via a router with no inbound port redirects mapped - Otherwise these systems are immune to any Windows or mainstream browser exploits and if some kiddie managed to gain a Telnet login, I suspect they would struggle to come to terms with the unfamiliar command line...
Getting back to J.Cook's original requirements it would seem the problem is the reception of large files via email from third-parties, with whom he has little control of.
Now in the past I've had problems with the sending of large files and jumped on Ipswitch's MOVEit Ad-hoc Transfer, because this has plug-in's that integrate with MS Outlook and web browser. Once configured the user see's little change and still goes about using these tools in the normal way. However, under the hood the MFT is working, so that when files over a specified size are attached the MFT moves the file to a server, and attaches a URL to the email instead. The recipient merely needs to click on the attachment to initiate download of the attachment.
This is great for sending files out, but not for reception as you have no control over third-parties and what they are running on their systems. Short of demanding that they subscribe to a third-party exchange service there is little that can be done to prevent them using email.
Therefore I suggest that you create a dedicated email server/account for this traffic, potentially on a different domain to your normal end user email accounts. This server can be given different parameters concerning size limits, enabling items received to be formally checked in and distributed within your organisation in a controlled way. You may also wish to set up an email pre-processor, on your normal email service, that captures emails with particularly types of attachments and redirects them to your specialist email server, users needing access to such captured emails can either use a web-service or a hotline to request delivery. The reason for suggesting a dedicated server etc. is for simplicity (it only needs to support SMTP) and to protect end user email services from the side effects of receiving complete VM images as a series of attachments...
Obviously as some have pointed out, you could still cater for those suppliers who are able to use a website etc. through locally hosted solutions such as that provided by Sharepoint etc.
Re: Unusual Case.
>But extended Windows XP support is already available. You just have to pay lots for it, and the cost doubles each year...
Do not under estimate the Chinese in negotiations, expect them to cut a deal, which MS will be able to claim their expansion of MS China (to support XP) as an investment in the Chinese market, with very little real monies actually being transferred from Beijing to Seattle.
Re: Changing user habits
Also changing manufacturing habits...
As many have pointed out, a well spec'ed 5~6 year old PC is still highly usable with today's software and broadband services. And given the spec's of many smartphones and tablets, many would be happy with a 10 year old system.
Therefore with a rapidly maturing PC market, we can expect manufacturers to follow others and start to focus on build quality. We are starting to see this with (some) printers where HP and Lexmark for example bundle free service and support for 3~5 years. So I would expect companies such as IBM/Lenovo to do similar with PC's.
This longer lived hardware platform changes some of the dynamics of the PC software market. In some ways it is odd that MS haven't ensured that Windows 8 could run on a P4 and fully support existing XP applications, thus making the upgrade relatively trivial.
Re: How many are waiting for Windows 8 to be "retired"? @Steve Knox
>Wow. How much would that have cost in 1996!
And that is before you take account of the size (both physical dimensions and storage capabilities) of available memory strips...
And number of D-Link routers updated?
I suspect that whilst D-Link have released a patch, very few products will actually be updated since this will require user intervention, and as others have pointed out Joe P(ublic) don't tend to mess with unfamiliar tech. particularly if it means they might loose their broadband connection.
Re: G Cloud
The beginning of the end for G-Cloud and the Cabinet Office Open Source intiative?
In some ways it has echo's of the demise of the CCTA in the late 80's, just when it was beginning to deliver open systems procurement...
Re: idiots... what better time to develop a self hosted open source solution...
>keep the data in your OWN cloud
Yes this would seem sensible, particularly as MS Office 365 with IL2 accreditation is available via G-Cloud and so Parliament would avoid all those data sovereignty and security issues that need to be tackled just because Parliament has decided not to use the G-Cloud procurement framework.
Giving Ms credit for being sharp salesmen, it wouldn't surprise me for MS to wrapper the G-Cloud service up and resell it to Parliament as MS Office 365P ('P' for Parliament) at a suitable price premium.
But yes agree it does look like yet another opportunity for the government to reinvest taxpayer's monies in UK-based software expertise has been missed.
Re: Full circle.
>It was abandoned in the beginning because processors weren't fast enough to make it viable
I seem to remember the reason was that MS didn't have the development maturity to develop and maintain a common source across multiple computer architectures. I suspect that with the fuss around XP and subsequent releases of Windows, MS may now have the controls etc in place to handle this.
Re: Why Windows is doomed.
>My windows 7 box boots in about 12 seconds.
What you need to regularly boot your Windows box!
I only really reboot mine (XP, Win 7 & Win 8) when MS Update demands it, rest of the time they either go to sleep or drop into hiberation....
Re: My work laptop @Dexter
Yes Outlook on my Win8 laptop takes forever to load, but I suspect part of the problem is that it first has to establish a VPN connection before connecting to the server and then sync's folders - almost forgot broadband connection is usually 1~2mbps.
So don't get too hopeful about start up getting quicker, but do keep the pressure on as getting a new laptop always feels good, just hope they put more than 2 GB of memory in the thing...
Re: Nothing new here!
Are you sure?
Whilst this might be the case with respect to the purchasing deals, the limitations on subsidises:
"If you subsidised a Samsung Galaxy for €100 then you were obliged to subsidise Apple for at least €100 per iPhone. You would be penalised for breaching that - either by paying Apple or paying in the equivalent marketing."
Does seem out-of-order, particularly as Amazon won when Apple tried that trick on books... Does seem that there are grounds for an EU competition investigation...
Re: Tell you what. Mr. Vaizey...
>There is no sensible question to which the answer is "DAB"
Ofcom: We need some more spectrum for M2M and Wifi, plus some extra for 5G wouldn't go a miss any ideas where we might find some under utilised spectrum who's current user's won't complain?
Re: Alternatively.... @Sir Wiggum
I must admit my opinion of Thinkpads is strongly coloured by my experience of the T series, which are designed to come apart (and go back together !) so as to facilitate maintenance.
Yes the fans do get noisy, but as I've discovered there are useful YouTube video's and other support out there to enable you to fix this yourself. About the only real problem I've found is that IBM keep changing the product numbers, so whilst you can find an exact match for what was in your machine, it can take a bit of searching to find the part numbers of the later revisions that fixed many of the faults in the components your machine is using...
The things that have needed replacing I've found are: battery, A/C power adaptor, fan. Anything else seems to be down to user (mis)handling...
Roaming enhancing the resilience of mobile networks?
Can't see how effectively enabling roaming in home region will enhance the resilience of mobile networks, but I do see that it could enhance the reliability of connection for a handset.
But the idea of improving the reliability of mobile communications by binding the various networks together is an interesting concept. Because whilst at a high-level it would seem the roaming approach would enable multiple paths for calls from a handset across the mobile infrastructure, digging down and we soon find lots of single points of failure that are tricky to get around, unless we practically rebuild the entire mobile network infrastructure, potentially resulting in all operators being VMNO's, ie. a bit like the various train operating companies.
Re: Emergency OK. Otherwise not.
There is a good piece on wikip http://en.wikipedia.org/wiki/Emergency_telephone_number
Basically, a SIM-less GSM/3G phone will attempt calls to pre-programmed emergency numbers; although not all networks will accept connections from such handsets. So whilst possible, it may take time for the phone to find a network willing to carry it's call, although network locked handsets may only attempt connections to the preferred network. A SIM provides additional emergency numbers and facilitates network connection.
Whilst the MNO's have a role to play in accepting calls, it would seem that a fundamental part of the problem is down to handset settings and the action it takes when unable to place a call, namely drop into 'emergency calls only' roam mode. It would seem that what is being requested for emergency calls is the establishment of a mandatory conceptual VMNO (!), namely an 'emergency' VMNO who doesn't own any network and with whom a handset automatically connects with, regardless of SIM status and network locking, when an emergency number is dialled.
Whilst this looks good from an individual callers' perspective, I suspect it would rapidly compound the cell and network congestion that occurs around major incidents, such as the London bombings.
I suspect the real value of this would be to the wider emergency services community, hence the solution is to create a real 'Emergency' VMNO with whom such bodies can obtain suitably configured SIMs and handsets. This would facilitate the granting of priority access to emergency services over normal public traffic, however, this still runs into the problem which bedevils us today ensuring that all 'emergency services' personnel have the relevant SIM's (or SIM update) in their phones, so that they can be identified to the network...
Re: Quote "XP is like 13 years old. Get with the 21st Century." @AC 28nov12 14:47
"Because a modern car will have a manufacturer's warranty as well as better locks"
Sorry to inform you, but if you purchased Windows 8 when it was first released back in August 2012, it is now out of warranty - so if using products that are still in warranty is important to you then I suggest you rush out and buy yourself a copy of Windows 8.1, but then the warranty on your PC has probably also expired !
As for the "better locks" agree the new locking systems are much better; for thieves.
Re: Another NC10
Know the situation, inspite of Win7 telling me otherwise, it just doesn't want to talk to my old but still fully working Deskjet 960c printer.
So now that the netbook has been forgotten about (superseded by an iPad and a Win8 laptop), it is being re-purposed as the home print server. This having the benefit that I can still run all my USB connected Windows compatible printers, scanners etc. and access them from the home network. Also I have installed Collobos Fingerprint so that all these devices are also readily accessible to iOS devices.
About the only downside is that very few battery managers support the partial charging of batteries - Lenovo's ThinkVantage Power Manager does, so I can set the battery to only charge to 20~30% whilst on mains power so helping to prolong it's life.
Re: You can buy new batteries cheap!
It's a Lenovo!
Yes you can buy cheap batteries, but with Lenovo they have to be recognised by the Bios (and if using Win7 or later have the data fields populated how Windows expects them to be...). So whilst with some shopping around you can avoid paying full RRP, expect the really cheap models to be of questionable quality.
Re: Low-resource OSes
What is quite telling is that the author didn't get Mr 12 to evaluate Quick Start - Lenovo's implementation of Splashtop, that was installed as standard on the S10e. But probably he disabled it in the Bios settings and (naturally) forgot all about it.
Re: What about keeping XP?
>Can the XP machine be set up so that a breach of security isn't the end of the world?
For most purposes restricting Mr 12 to a limited user account will prevent much and minimise the damage from some of the worst. One of the limitations of XP is that you can't specify "run in administrator mode" for a single program without the limited user knowing the administrator's password... so no installing any user program that requires admin mode to run.
If really concerned about things, then download MS SteadyState - may need to google as MS withdraw this very useful & free XP add-on (if you wish to pay then Deep Freeze is the better product)... The only issue with these tools is that you need a cloud-based AV as otherwise when you reboot, you loose all the updates...
From recent security reports, I would limit Mr 12's access to any home shared drives to read only.
As for passwords, well to encourage good habits, I would install a password manager that support's cloud storage of the password file, which will be readily accessible from a future replacement machine. But probably the best thing will be to use a security tool with good browser integration because as you point out the vast majority of the threats will come via the internet and hence automated use of browser add-ins.
But from my experience the biggest risk Mr 12 actually faces is the closing of applications without saving his work ... but he'll soon learn ...
Agree about the Thinkpad or similar business grade laptop (eg. Dell D630) with at least a CoreDuo CPU loaded up with at least 2GB of RAM.
Over the last few years I've done several for children of this age group, running XP-Pro (sticker on laptop, relatively easy to obtain an OEM distribution so next to no OS cost) and a stay in the background AV - my preference was PrevX SafeOnline, but Webroot are now charging for it... If you are concerned about malware, then MS SteadyState can be downloaded and installed (which is where cloud AV such as Webroot/Prevx and Panda prove their worth).
The nice part about using these older business laptops is they are still reasonably performant, they will take a few knocks unlike many consumer-grade products, plus once the child has shown due care and attention they can be upgraded with a new machine that will be care for better than if they got the new machine straight away ...
The other good thing for running XP, is that much good software exists for this age-group that is either cheap or free. Because putting together a laptop
Re: Have you tried...
Actually it is the school that needs beating!
"My son's school has decreed that next year he'll need a computer of some sort."
For the school to make this sort of announcement means that they won't actually be using the computer for classwork!
I would expect the school to at least give an idea as to what it is they will be expecting pupils to be able to do on this 'computer' and where. A trend I've noted in my local secondary schools, is that they not only mandate a computer but have gone so far as to provide computers at school which do not leave the premises - this avoiding pupils forgetting to bring them in each day and has reduced the amount of support - (this includes re-installs due to botched attempts to upgrade the OS to MS's latest and greatest).
Re: It isn't a wifi issue...
Having read some more, it seems that the EP didn't and don't run any form of IDS, as otherwise a rogue AP using the EP-EXT SSID would of been flagged.
Perhaps the EP need to engage some qualified UK consultants to deploy a WiFi network based on Manual-Y. Which raises a question about the security standards used by the EP and who oversee's them.
>The problem then is with nicked pix off facebook et al
I thought all photo's posted on Facebook became the property of Facebook? So can we expect Facebook to join in, as this practise must impact their revenue....
Re: Not SMTPauth - HTTP SSLStripping
"wasn't encrypted [...] So a MiM attack is pretty straight-forward" - disagree - the layer at which you implement encryption is not nearly as important as how you implement the encryption.
? The WiFi network totally open, there was no encryption hence a MiM attack on the WiFi network to gain access to the traffic is pretty straight-forward. Yes the how encryption is implemented is important, hence the reason why you should use WPA2-Enterprise on your WiFi networks. WPA2-Private can be just as good if the PSK is properly managed, but as you note if the key is known to all the encryption is compromised.
Once the MiM is in and has full access control over the network traffic then the way security has been configured for end-to-end communications becomes important as you note. My take on the webpage is that it enabled the collecting of EP Intranet access credentials. Hence to gain email access details some additional server spoofing was performed by the MiM to get the email clients to initiate a connection and send login credentials. It would seem that the way security was set up on the EP mail servers combined with the automatic behaviour of some client systems facilitated the attack.
As for "how the attacker was able to redirect a browser to the non-SSL login page" that I suggest is relatively trivial as I regularly see websites that cause my browse to either downgrade an https session to http or upgrade http to https.
Obviously, we need more clarity about the details of this attack vector, because it isn't always possible to deploy a WPA2-enterprise solution.
Re: "coast" for a decade, growing profits year over year by 15%
I think this statement sums up part of the problem. As a business MS has these last ten years or so been focused on increasing net profits rather than investing in a whole bunch of stuff like Amazon are doing and so declare a much smaller or negative net profit.
Re: A fine line between Vision and Arrogance @Sean Timarco Baggaley
>All the keyboard shortcuts – which everyone calling themselves a seasoned veteran or professional should know – are unchanged.
Obviously not a real fan and convert to the Windows GUI... If I remember correctly MS stopped promoting the keyboard shortcuts when it released Windows 95 et al. previously keyboard shortcut crib cards, they were intended to perch on the keyboard above the function keys, were included with Windows 3.n and the Office applications. The keyboard shortcuts were retained in Win95 to make it easier for Win3.n users to feel at home but MS didn't expect users in general to know about them. Hence in some respects it is a bit odd that Win8 retains this legacy UI feature, but not the more recent classic shell...
As for remembering all the shortcuts, well no. As a 'seasoned' professional (I've used 'Office' since the 80's), I found it easier to use the menu's because of constantly switching between differing (MS and non-MS) applications, plus when supporting end users, keyboard shortcuts are a bit 'magical' particularly when dealing with the ribbon interface, whereas directing them to use the menu's/ribbon helped them to find their way around.
Re: It isn't a wifi issue...
Suggest you read the references (specifically http://epfsug.eu/wws/arc/epfsug/2013-11/msg00051.html ): the public Wi-Fi of the Parliament (EP-EXT Network) wasn't encrypted, just like the vast majority of public hotspots... So a MiM attack is pretty straight-forward. It would seem the innovation in the attack was to mimic certain aspects of the EP IT systems so as to gain access credentials.
Also, like many quality deployments the EP Private Wi-Fi network (EP-PRIVATE) is secured through certificates.
The lesson to ALL is if you have a guest/public WiFi network and you permit access to corporate systems from this network then you are also potentially vulnerable to this style of attack.
Re: It was ever thus
Agree, we saw this user led departmental level procurement and deployment with PC's in the 80's and early 90's, before IS and the business finally got their collective heads together.
What is particularly interesting, is that I suspect it will be "the fools in HR, Marketing, Operations and Finance" who will be doing similar with third-party SaaS providers...
Naturally IS will know nothing about these procurements, because the SaaS vendors don't market to IS they target their marketing directly at HR, Marketing etc.
Re: Massive Graduate Unemployement
The article's author is obviously a failed graduate, with little experience of analysis.
Fundamentally, he needs to re-analyse his source data and divide it into: Russell Group, 1994-Group, Post-92 former Polytechnics, Post-92 former colleges.
Now in which of these groups are the graduates that are not being employed fall?
Re: PSMS scamming only exists in the US and Canada @AC Brazil
Does any one know how SMS subscriptions get cancelled in the UK when you stop using a phone?
As we can expect the operators won't keep track of the services a subscriber has signed up to, there must be some mechanism which blocks a service provider from sending or requesting payment for SMS's sent to a number that the operator has re-assigned.
Re: In other words...
>then our machines can be quiet too.
But then we would have to add a noise generator so that people could hear them coming...
Re: No User Manual, no software.
Good point, noting the illogic of my closing statement Ken!
What I really meant, before I just bashed away at the keyboard, was the high-level public documentation needed to make sense of many applications, which closed source products need (although many companies try and hide this information behind their "professional services" offer).
Re: All 4 feet high of them.
The laugh is that the original C++ language reference was a circa 60 page document that assumed you had a working knowledge of Kernighan and Ritchie, a centimetre thick book.
Re: No User Manual, no software.
"But U have not written ANY software if you have not written the USER Manual."
totally agree and would add:
But U have not designed ANY software if you have not written the Specification and High-Level Design Guide.
As a designer of IT systems, this the main reason why I've tended to avoid using open source - I don't have the time and my client's don't pay me, to mess around with the code.
Re: Telephone numbers too!
BT go one better with their ADSL checker:
If you do key in a number with a space, it will truncate the number string to 11 digits and then remove the space before attempting a number lookup which naturally will fail. Obviously only the observant will notice the missing end digit(s) from the returned number.
Re: Move in with the chicken shaggers...
I wonder if Hyperoptic and or other 1Gbps ISP's were invited to tender...
Certainly I can see the founders of Hpyeroptic being keen to sign up Alistair Dabbs buidling.