MAC filtering, all that does is create trouble for legit users.
Actually MAC filtering just creates trouble for new users. Which include potential abusers, hence the WPA2-AES.
82 posts • joined 24 May 2010
Actually MAC filtering just creates trouble for new users. Which include potential abusers, hence the WPA2-AES.
You need to found your own business, mate. Because every other workplace will have people doing things, thinking things, and having opinions and interests that you disagree with.
Per summary item 9, the highest leverage that any 'rules' will have is to orgs "under a statutory duty to have regard to the SC Code". Have a regard to. Whoopie-do.
CCTV records what's going on, but hardly prevents it happening.
Ah, but does your 'puter have to have a b&w monitor?
"If there is a street with 1001 front doors with all the same make and model of lock fitted then somewhere one key will fit two doors."
That's the most secure possibility. The other end case is that all 1001 take the same key.
Since you're in the lock trade, what's happening with those loverley 10 pin Ingersoll SC71 locks now they are owned by Assa Abloy? AFAIK, it's the only really secure lock available to Jill Public. AT least in UK.
...I upvoted you for your courtesy. Call it an untroll point :)
I would happily let my aggregate stats be shared if the law mandates that if/when the data leaks, the CIO of NHS goes to prison to 2 years (1 after good behaviour) as absolute minimum sentence.
The referendum happened. But the invocation of Art.50 to start the Brexit clock ticking is similar to non-free Windows 10 upgrades: it's talked about for the future, but will never quite happen.
There are more than two names on the ballot.
Lastpass for the non-finance, non-reputation damaging sites.
Keepass for the others.
Brexit is not a done deal.
If it was, Article 50 would have invoked already and started the 2 year negotiation window.
The main hurdle, which the polititions are pretending doesn't exist, is that UK cannot negotiate post-EU treaties whilst it is in the EU. Thtat's EU law - all treaty negotion must be done under the UK umbrealla. UK is trying to get special treatment, but Germany for sure will not allow that, to stop others following.
Give it six months to a year, enough time for May to completely lock down the UK with snooper's charter etc, and she'll say that Brexit ain't happenin' old bean, and she'll call a general election. Probably win it too, if the media is handled right between now and then.
"The refusal to include data privacy advocates in the case".
EPIC is a privacy advocate.
It's not that getting a warrant is much of a nuisance, but more that if a warrant is shown to be legally required to use hoovered up traffic, then historical cell traffic can't be admitted as evidence. So we will get more cases involving reconstruction of evidence.
The interesting issue will be if whether a case can be thrown out because the only hook that got the case investigated in the first place was an 'incidental intercept', i.e. without a warrant with the relevant reason and/or defendant's name on it.
...if you look at the word choice, " personal confidential data" is not what is being shared with world+dog for research anyway. So NDG is defending a straw man.
The two (unaddressed) issues are:
1. The metadata from the aggregate data can be de-anomomised (how many people have colon cancer stage 3 diagnosed at stage 2, 50-55 age range, married, smoke, don't drink, live in Gt. Manchester area, service/technician work level, obese, poor diet)
2. The personal confidential data will of course be shared with 'strategic partners', 5 eyes for a start
Wonder if those of us without an MS a/c will be forced to get one to continue with linkedin?
They don't. If you 'delete' data, you simply become the only person who can't see it. I expect people with an HR account for vetting candidates look at what has been editted and deleted.
Grab the popcorn girls and boys. It would be so amusing if LandG were using GPL code and can be forced to open the whole source.
It's amazing that the police demand almost infinited storage duration for anything on the PNC, including illegally maintained biometrics on those arrested but innocent, yet they can only argue to store their own directly obtained evidence for a month. Talk about wanting to control the data.
And don't tell me that, despite the 31 day nonsense, the stuff isn't backed up by Cheltenham independently. Since 5 eyes want everything, why would they let this go?
That may give you a small amount of happiness, but won't stem the flow.
An underpaid human being opens the envelope, and you need to persuade that person to bother to mark you off the mailing list. It's worth doing, because there actually aren't that many financial institutions.
If addressed to me, I return the form in the prepaid envelope with the application bit crossed out with a felt pen, and the words "Kindly remove me from your mailing list". I that found kindly works better than please.
If addressed to A N Other, I return the form in the prepaid envelope with the application bit crossed out with a felt pen, and the words "No such person at this address - possible fraud attempt". Works well.
"...you are bombarded with motorbike insurance advertising on every platform you go to."
You are 'bombarded with' exactly the same amount of advertising as before. The content is just targetted.
The announcement "The free upgrade offer to Windows 10 was a first for Microsoft, helping people upgrade faster than ever before. And time is running out. The free upgrade offer will end on July 29 and we want to make sure you don’t miss out. After July 29th, you’ll be able to continue to get Windows 10 on a new device, or purchase a full version of Windows 10 Home for $119." doesn't mention a price for upgrades, just for outright. So more games will be afoot...
That is an impressive name for a single stage FET amplifier.
Been Lubuntu-ing for a few years, and like the simplicity, but random stuff just stops working until re-install, and PCManFM crashes about 1 in 10 times after copying files. Maybe try X.
...and the lawsuit has just settled
It's not about privacy, it's about money.
MS, FB, Google would like the law to be clear that Gov doesn't have a right to this data. Passing the data becomes a commercial transaction, with contracts, not a obligation, with subpoenas.
MS, FB, Google have businesses selling their scrutiny of you to other businesses. They want to sell it to Gov too, not be forced to give it away, and not for Gov to accumulate it independently.
You privacy will still be up to you to maintain. Sorry.
I suggest that for anyone aged 45+, the MCU arch that they go used to the most is the one they'll try their hardest to stick to, because they like to mix assembler and C. For the C++ generation, they care less. Wot's assembler?
N'article on HDDs, and no comments about how you'd never buy this brand because **insert horror story from 10 years ago**? Are you all still recovering from 2016?
Except in the USofA the solicitor gets served with an NSL with gag order to hand it over, and you are none the wiser.
"If the authorities can persuade a judge to grant them lawful access to your data, then they have the right to access it. If you decline to co-operate and open your devices, then you can stay in jail until you abide by the warrant."
Sorry, too many compliant judges, too many warrant issued without genuine PC. You need to have the right to challenge the warrant before cooperating.
Asian - here's the exec summary you'd like. No trouble, mate. Happy to help
1. By 2011 "GCHQ, with the knowledge and apparent cooperation of the NSA, acquired the capability to covertly exploit security vulnerabilities in 13 different models of firewalls made by Juniper Networks" <url>https://theintercept.com/2015/12/23/juniper-firewalls-successfully-targeted-by-nsa-and-gchq</url>
2. An external researcher or internal engineer found the security flaws. "The company said it discovered the backdoors during an internal code review, but it didn’t say if this was a routine review or if it had examined the code specifically after receiving a tip that something suspicious was in it." <url>http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors</url>
3. Juniper sat on it until the discoverer was at the point of going public.
4. Juniper's CTO made the "During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen devices and to decrypt VPN connections" announcement to own the discovery <url>http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors</url>
5. Juniper issues fixes that don't fix all the security issues <url>http://www.wired.com/2016/01/new-discovery-around-juniper-backdoor-raises-more-questions-about-the-company</url>
A damning piece of circumstantial evidence is that Juniper won't be explicit about who/how/when the security flaws came to light. It would be to their credit to claim that they found it, but being caught lying (as opposed to evasive) would make their situation and trustworthiness so much worse. That implies that Juniper's hand was forced by the discoverer who was not under their control.
So, Cisco, got anything you need to need to do? Like go to court to get any NSA instructions to you judged illegal before you get caught?
SO 'will run' is a lie.
Dell: "A software update process will run from November 24 that will remove the certificate automatically from machines"
Really? Dell has some software running on my machine that can unilaterally alter the system without any decision on my part?
Per the removal instructions below, the fact I disabled the Dell Update and Dell Foundations services very soon in the setup procedure might mean it is coming in as an update through that route...?
I have heard layoffs called "lifestyle adjustments" by a VP.
But the streaming catalog from such as Netflix varies by their agreements. So you may be able to watch Delicatessen today, but perhaps not next year.
When CDs were released, copy protection was unecessary. When DVDs came out, people backed up to one or two SVCDs or single layer DVD. With 8TB drives available, it will be a race for the studios to render home media unavailable by popularising streaming, before people start building up movie collections on HDDs.
Per Dr Alan McOwan, Chelsea and Westminster hospital NHS trust’s director for sexual health: "We recalled/deleted the email as soon as we realised what had happened."
Recall is only possible for in-house clients on the same server. So IT was not involved before this inadvised reaction, cos they'd have told him that. It's called compounding stupidity.
Since we don't have access to the source of "most commercial software", your assertion seems tough to justify.
I agree with you in general, but I am far more productive with O2003 than LOffice or Ooffice, and can't stand the ribbon of O2007+. Which means VB in seamless mode, which is ok, but I'd prefer a Win which is TweakUiable and non-invasive like the good ol' days, that runs early apps fine line Win7 does.
I've always understood that the main security issue with XP/2000 is that Internet Explorer's default settings leave it wide open. XP is fairly safe if you can use Firefox or other browser, because you just lock down IE to be safe. Go into Internet Options under Control Panel. Select Security tab, then Custom Level and set the options to "don't". And update your hosts file with something like Peter Lowe's list at http://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&showintro=1.
Most other security issues are escaped by not opening attachments that you are not expecting. People don't analyse these things with any common sense. A friend got an email purportedly from UPS saying they had a delivery for her (sender not named), and she had to fill in the attached form before they could deliver. Luckily I had beaten the friend up to call me FIRST before succumbing to temptation. Are you expecting a delivery? No. When has a delivery agent ever had an email address as opposed to a phone number? When ever has a recipient had to fill in paperwork conditional on delivery for domestic mail? People see something official looking and don't analyse before twitching that mouse finger to have a look... and won't do a gOogle search first with a clip of text from the email to check whether it comes up as a known nasty.
FreeBSD has ZFS
Classic Shell is your friend.
So is there a patch for WinX to stop the BIOS being tested and executed?
Then could install Win with the machine internet-free, patch it, then connect and do the post-install upgrades.
Also, the law needs to reduce cover-ups by management. Perhaps have a central reporting station where possible leaks must be reported too ("I can't find that USB stick, but it may be at home") with in 24 hrs or suspected loss.
No, it is yours to sell. It's also theirs to sell. That's what non-exclusive means.
Sure you want a company have to full rights to your security stream?
3.1 The User Generated Content (the 'UGC') is all types of information and material... includes all data transmitted by your Netatmo Product.
3.2 ... you hereby grant to Netatmo a perpetual, irrevocable, non-exclusive, worldwide, royalty-free license, with the right to sublicense, ... on any of your UGC, in any media now existing or hereafter developed... You hereby waive any rights of publicity and privacy with respect to the UGC.
1. The Innocence Project https://en.wikipedia.org/wiki/Innocence_project shows otherwise
2. Khow any suspect, who happens to be a law enforcement officer, who tells all rather than shuts up and demands a lawyer?