I still don't see
how they can sell the assets and ignore the debts.
685 posts • joined 29 May 2007
how they can sell the assets and ignore the debts.
is that they are all at it. It is probably reasonable to take their butter-does-not-melt-in-my-mouth statements that they are within ''rules'' as just more deception to the man in the street: either following rules that few know about or just bare faced lies.
The more interesting question is which of their political masters know the full extent of what they are up to. I doubt that none of the politicians know the full extent - just how many ?
if an ATM is not always in use, spray the keys lightly with a powder (talc would do) and when the mark has gone - see which ones have the powder rubbed off.
All sorts of variations. Interesting.
and organisation. Maybe their internal systems are so chaotic that they don't really know what has changed. Maybe they don't know all of the changes that have been supplied by: the large number of internal teams, the NSA, device drivers from hardware manufacturers, the lot in India that they outsourced something to, ...
The above might be wrong: but many will suspect that this is what is happening.
Well their source code is up on github, so if anyone wants to continue their work they can do so: https://github.com/lavab
A sensible idea to make is open source -- who would trust anything like this if it were not. However: they were going to run it as a service, I don't know how they were intending to demonstrate that the code that they were running was the same as the code on github.
And the *nix crowd actually think this is a better leadership/management than MSFT? Really, 1 person controls your destiny.
Most projects have one person (or a small team) who review the current state and decide if/when a release should happen. This is true for both commercial and Open Source projects; the difference is that with most commercial projects (eg MSFT ones) this review process remains hidden, so you don't get to see the hums and has although you might see a slippage from an announced schedule and not know why.
One of Linux's strengths is that the review process is open to public gaze; also Linus releases ''when it is ready'' and not when some marketing team or accountant says he must.
Please learn about the Open Source processes before criticising - don't flaunt your ignorance.
is, unfortunately, rapidly dying. Make money no matter how - who cares how?
One other story today is shops in airports telling customers that they needed to see their boarding passes ''for security reasons'' - when the true reason is that if the customer is flying out of the EU then the VAT does not need to be paid to the tax man and the shop pockets the difference.
Sales assistants were telling the customers fibs. While some of them might not have known the real reason someone did and was happy to have the customers lied to. This is a complete abomination. If they lie on things like this - what else will they lie about ?
is the message that Cyrus Vance Jr should be telling New York cops - ''get off your fat backsides and go and do real investigative work rather than sitting around''. The cops are getting lazy & fat: next up they will be complaining that criminals refuse to just hand themselves in.
Part of the remit/mission-statement for both of these organisations is to protect the communications of citizens of their countries from 'foreign adversaries'. Both of them have the skills & budget to properly design TLS (or replacement) to have fewer holes.
Unfortunately: another part of their remit is to break Johnny foreigner's communications - in part they use holes in TLS, etc, to achieve this. There is suspicion that they have weakened or made overly complex the various security protocols & procedures. This might make it easier for snoop on foreigners, but it also makes it easier for foreigners and various crooks to snoop on us.
There is a tension between these 2 different remits, they have settled this by focussing on breaking/weakening TLS. Why ? It is quite simple: they can be held accountable for missing a 'bomb plot', but if a hole in TLS is used to break into big business & syphon off millions they can deny any responsibility - conveniently forgetting that closing TLS, etc, holes is part of what they should be doing.
Our idiot politicians don't help, few of them have any real clue as to what is going on.
I tried to buy 2 new 'phones from carphone warehouse a few weeks ago, an outright purchase, not on contract, I have a connection only SIM with giffgaff. They asked for my name, address, ... I refused saying I was buying a 'phone & saw no reason to give them all of that. They said that it was company policy to insist on the information and refused to sell anything to me without that info. I left and bought what I wanted elsewhere.
I now feel quite happy that I did insist on preserving my privacy.
If IT managers do not want a cloud based product there will be a vendor who will sell that (non cloudy) product to them - it is called supply & demand.
The problem may be with large vendors (eg MS, Oracle, ...) who insist on going cloudy or jack up the non cloud prices. Also those who make it very hard to migrate away from their product. Organisations may need to do what the vendor wants.
This is why when buying into something you should always be clear how easy/expensive it will be to move away. Another reason for using Open Standards.
Where is El-Reg served from ?
Maybe Ballmer should have started selling a line of chairs ?
A rose by any other name would smell as sweet.
Let's get on with looking at the great pictures from New Horizons.
If you listen carefully when Theresa May (or similar) is trying to convince us that this surveillance is effective they say something like ''had found xx suspects'' - translation: ''our monitors went ping over xx people who we shall investigate''. They do NOT say how many people have been convicted (or the ping found to be true) as a result of Internet surveillance, presumably because this would be much less than xx and so less persuasive that letting snooping continue is a good idea.
Any experienced politician or press facing civil servant knows how to present numbers deceptively.
But since it was free in the first place, it is still free!
If they are going to force people to decrypt data I was pleased to note:
either by providing encryption keys or turning over decrypted data
Handing over a piece of plain text is, IMHO, much less bad than having to hand over keys. You know what the spooks have, something presumably itemised in a court order. Hand over the keys and a lot of other stuff is now readable by them as well.
Does that count towards one of the 200 porn videos that you watch every year ?
Time in seconds should be how computers see it.
Time broken up into minutes/hours/days is done for the convenience of humans - who cannot deal with large numbers - who knows that 2592000 seconds is a (30 day) month ? The time convertion routines will deal with leap seconds.
Slight complications with some applications, eg bank interest is computed in days - be they 86400 or 86401 or 86402 seconds long. Programmers will get used to this and will cope, it will become part of the 'tradition'.
Fiddle the issue now and we will just end up being hated in generations to come when they have a big problem to deal with - and their computers will not deal with them since that is not the way things will be done.
They would need to set up a subsidiary over which they only owned shares but had no executive control and which was guaranteed to not employ any USA citizens. Then: when the USA court comes sniffing the USA based company could show its requests and the two fingered replies that the European company was giving it.
Even then: I am not convinced that this scheme would be good enough.
If you want to take pictures in a public park and use them commercially you need to pay:
Extradite Gary McKinnon. Sorted
More or less what I was going to write. Gary only got in because of hopeless sysadmin practices in the USA (eg not changing default passwords). Have these clowns learned nothing in the decade since then?
It seems not - the hunt is now on for scapegoats and then not bother to smarten up their act.
TWTA = Traveling Wave Tube Amplifiers, see: https://en.wikipedia.org/wiki/Traveling-wave_tube
The secret trade deal will, by all accounts, let facebook abuse everyone's personal data. Big business seems to know what is going into this while those affected by it (ie us) will be kept in the dark until it is too late and the politicians can retire on various 'contributions'.
How much has all this collection cost ? Would we have saved more lives giving that money to the NHS?
has anyone made one to google to see what it has about them - and got a reply ?
to someone else. I doubt that they really believe that the other will stop trying to crack them, this is just for show.
I dislike WP intensely largely for this reason. I want to install the programs/scripts read only - preferably using the OS installer (eg: yum/rpm or apt-get). It is also hard to have one copy of the scripts and use them in several sites. WP makes this very hard, they entire mindset of the developers seem to have little clue about large scale system admin and want WP to do everything.
Also: they seem to favour features over security -- get something working quickly, worry about good coding later.
These are the ones that really concern me. The police are given special privileges to find things out about us - ANY abuse MUST be met by a high profile dismissal and loss of pension.
I could not see how many of these were caught, but I suspect that the numbers reflect no more than the top of an iceberg.
The problem here is that many manufacturers of phones, etc, lose all interest in some hardware once it is more than about a year old. However a lot of us buy a phone and expect to use it for many years - why throw out something that still works ?
to include those of the French president and all members of the national assembly.
What do you mean ... some should be excluded ... why ... is it not really safe then ?
What now ? Forks and distros ?
Yes - I have my own copy, slightly different from yours, and I have given versions, free of charge, to my kids.
Sue me if you don't like what I have done!
have made her dishy ?
Ah, so that is the hole that the bankers were trying to fill - I always suspected that they weren't quite as bad and selfish as they had been portrayed!
Adblock Plus should countersue for theft of bandwidth.
No, it is you & I who should sue for use of bandwidth - unless Adblock plus coordinated some sort of class action.
I can see the admen trying technological mechanisms to stop me viewing their content unless I viewed ads - but what they don't understand (or refuse to) is what I don't like:
* ads that start autoplay of video or sound
* ads that use up a lot of screen space
* ads that pop up/under
* ads that download a lot or slow my browser
* intrusive ads
Nice, small, discrete ads I can put up with. Anything else - piss off!
You don't need one IP address per site if you use SNI (Server Name Indication). The main problem is that this is not supported by MS Windows XP - which although down to about 17% ... is still some time before web site owners consider it unimportant.
HTTPS is not secure if you can 'own' certificate authorities and/or DNS - neither of which is hard for governments -- so it comes down to who you want to protect against ?
People forget that what he was talking about was that excessive use of goto is harmful. It harks back to a day when many programs had a goto every 3-5 lines -- that is spaghetti code. A small number of goto and corresponding labels can make the code cleaner by avoiding the use of ThereIsAnError type variables that are continually tested until the error handling code at the bottom of the function is reached.
Here is a nice article on the subject: http://david.tribble.com/text/goto.html
Quite possibly: good encryption is hard; but just because one group got it wrong does not mean that they all will.
The findings are analogous to sampling a selection of 100-watt light bulbs at the hardware store and discovering that they vary in brightness
I always knew that these low energy bulbs were not what they were cracked up to be. Don't last as long as claimed either.
So if they want a copy of your passport so that you can see what information they hold about you, does that not suggest that they did not do enough to assert who you were when you signed up on their web site in the first place ?
Surely: give the exact same information (be that true or false) should be enough.
Sending the list by (presumably unencrypted) email is a bigger problem. Sending email is like putting a post card into a letter box, it can be read by anyone who handles it. So: this email has potentially been read by all sorts of people.
This is the REAL cluelessness - it seems that el-reg's journalists have also forgotten this problem with email.
OK: in this case the NSA has already got this information, but who knows who else has tapped into the Internet routers that the email went through ?
who are defending them in court over their GPL infringement: https://sfconservancy.org/linux-compliance/vmware-lawsuit-faq.html
They will need even more money after they have lost to rewrite their code so that it does not rely on them just grabbing someone else's code and ignoring the license.
They would be very upset if others did that and used their product without paying them ... thinking about it - since it is based on GPL code, it must be licensed under the GPL, so you can do that - just take a copy and use it where you want to.
Will it be legal to rip it out of your car ?
That is all the MEP delegates will get from the US...
Not true - Monica Lewinsky no longer works for the gov't of the USA.
the lying toads will not lose any sleep by living up to the promise. The NSA will just continue to slurp up whatever it wants citing Four Horsemen of the Infocalypse: terrorists, drug dealers, pedophiles, and organized crime.
The definition of debugged software is: software in which the bugs have yet to be found.
Ie all non trivial code contains defects.
There is a relief for breach of GPL that is written into the GPL: release the offending code. VMware could become GPL compliant by releasing its code under the GPL.
Quite simple really.
That would be very interesting - especially in banking circles!