Re: Worth 1,000 Words
pr0n + "nuclear option" just has to be goatse-related.
323 posts • joined 9 Sep 2010
pr0n + "nuclear option" just has to be goatse-related.
Presumably #1 he saw it coming, and #2 after well over a decade there, I'm sure he learned plenty of service account passwords and colleagues' account logins, to say nothing of knowing where the unpatched vulnerabilities, weak spots, and security checks were. The greatest hacker in the world generally doesn't hold a candle to the individual that starts with familiarity and access and then gets (inadequately) locked out.
Indeed. Similar to why I won't install an IM client on my work mobile. If it is important enough to wake me up, it's important enough for you to actually call me.
I wonder if he's also snagged the TLD 'dickli'? If the goal is to 'secure intellectual property rights of the Chairman's name', it seems appropriate. And it seems appropriate for other reasons, too.
Time to go meta with an air-traveler portable hotspot named "Only an idiot would think this is a bomb".
Yep, it's delivery to Mars. Doesn't say anything about a landing so either leave it in orbit (and wait for the occupants to come out and retrieve it), or just let Martian gravity reel it in and see if they're packaged well enough to survive a 50km drop off the truck.
"Wait until Amazon adds Mars to their "Prime" free shipping list - then you'll know that Mars has really arrived."
Till then, if I was Jeff Bezos, I'd offer delivery to Mars using SpaceX's shipping rates with a small 5% handling fee markup.
Truly if they're worried about people spending too long in the toilet, they should start by tracking executives, whose time costs the company more than anyone else's? And in the spirit of leadership and transparency, make that tracking data accessible by all company employees?
I think I just figured out my next suggestion box submission...
I assumed the Home Office was covered by the 'secure mental health unit' reference.
I assumed the SPB was referring to the Reg version as well, once they started talking about converted units and especially cricket pitches.
Now Wikipedia will have to have an SPB disambiguation page?
Or you could get like Australia, that has made warrant canaries themselves illegal.
Still there may be an advantage to the GoogleAI: it constantly checks for texting and call behavior from all nearby cars and via comparison with registration information identifies vehicles with smartphone-distracted drivers so as to maintain increased separation.
Or at any rate, that's why Google says they want all that data, right?
It depends on the architecture, I think. Frequently the big networks optimize the retail/public APN's speeds via sharing among GGSNs/SGSNs (or whatever the LTE terms are), and the MVNOs might only be using one or two GGSNs for their own APNs. My sense is that the MVNO is (or should be) offering some network customization options in lieu of pure speed, where data is concerned. For voice, it's typically identical between them.
One wonders how soon the announcement about the impending departure of newly-redundant staff will appear.
Perhaps a bit like calling a "transportation support" agency. Sure there may be a series of mistaken assumptions about whether you're calling about a problem with your car, but when the support person asks you to engage the ignition, "I don't have a car" is considerably less unhelpful than "It's not there" even though both are technically correct responses.
Not necessarily - the top 25 passwords are ALWAYS going to be this collection of mindmeltingly simple passwords, even if the percentage of users using them is .01%. Good passwords are not going to be commonly used. So even if there's only a handful of people worldwide using 123456 because educating users on best security practices has been successful beyond anyone's wildest fantasies, this article can still be trotted out annually nearly verbatim.
"secretly or surreptitiously uses" - but drones flying close enough to viably peer in windows are (currently) loud enough to be definitively not-surreptitious, making the Peeping Tom law inapplicable. Although at that point perhaps harassment or neighborhood noise ordinances could come into play instead.
Regardless, if the FAA thinks it is going to somehow protect drones flying within birdshot range of suburban or rural houses, it has mistakenly doubled down on its absurd drone registration idea and the bureaucratic reversal will only come sooner rather than later.
For what definition of "IoT"? If it's the bit formerly known as M2M, you're probably interacting or brushing elbows with it on a daily basis already - parking meters, ATMs, vehicle tracking, security cameras, etc etc etc.
Files in American Standard Code for Information Interchange format? It is clearly a Stuxnet-esque plot, and is properly regarded as malware within RedStarOS with re-education penalties for those who would persist in using "ASCII".
Or if they're going to be on the internet, at least they could be behind a separate-box firewall and connected to the central station via IPsec tunnel.
But is the problem to be solved really that of drones crashing into people on the ground? From watching the news, they're mostly upset pilots that are having near-misses with drones, there's a bit of a privacy issue in the airborne camera around one's neighbors bit, and a vibe (or maybe it's just me and my own anarchist cookbook mentality) of fitting a drone with some explosive and turning it into a guided missile (albeit a rather slow one).
That's a great idea! I think I'm going to start putting a Win95-emulation wallpaper on my Mint desktops and see who reacts (and how).
aka "M2M" but now more commonly referred to as the "Internet of Things", presumably as distinct from the "Internet of Meatbags" that we all know and love.
In the US Navy, it is (or was, 15yrs ago) red-tagging all relevant controls and logging them. Since each bit of work got its own round of red tags, and it's helpful to combine different maintenance into a single window (work aloft on the masts, when any ships nearby would ALSO have to tag out their radar/HF emitters), you could sometimes get a piece of equipment with over a dozen red tags on it, and woe be to the sailor who left their tag up after their maintenance was completed.
Or worse, in bed with her husband.
Meanwhile, the actual installer/administrator has declined to answer questions on the grounds that the answers may tend to incriminate him.
Every couple weeks, usually associated with some major chunk of automation going down, I sit back and just think that my job might be occasionally suckacious, but at least I haven't gotten a few hundred flights grounded (or some similar newsworthy level of impact). Having to go in front of a Congressional committee and answer questions (or worse, NOT answer questions) about a mail server install is pretty freaking high on that "I'm happy I don't have THAT job" list.
Reminds me of the commonly heard line in Alaska, where the ratio of men to women is also tilted: "The odds are good, but the goods are odd."
"Be honest, you're on pay as you go for both, aren't you?"
Suddenly the EverythingEverywhere brand sounds much more appealing...
Excellent judgement, rather, from the perspective of avoiding scrutiny of her email, official or otherwise.
But the claim that one can read any of her emails anyway because "anything official she sent to other Federal employees is on their .gov mail server" (unless it was sent to Lois Lerner, natch) suddenly breaks down as it turns out that other people also had accounts on the private Clinton mail server, and at least one of them is claiming rather vehemently to have been a State Dept employee at the time.
Brilliant work by the boffinry I'm sure, but I must confess that I'm exceedingly disappointed that the laser IS the bacon, rather than being used ON the bacon.
I once encountered a forum where they prompted for a custom secret question. Great idea, I thought, and put in a properly clever one. And some lengthy time later, had to do a password recovery, and it started with asking me a fill-in-the-blank "What is your secret question?" At which point I abandoned the site, never to return.
Yep, yep and yep. Sticking a device out there with a public IP and nary a clue about how to lock it down (or even that it should be locked down in the first place) is inviting disaster. That's why my company sells cellular connectivity with decent network options - like assigning private static IPs, and routing all the cellular traffic to the customer's datacenter - effectively pulling the device behind the customer's corporate firewall, no matter how the device is configured.
Of course, they should still be DMZing the devices within their WAN, but at least some schmoe on the internet can't root the device with a portscan and two minutes of websearching for a setup manual. Not that there's anything new about that: http://www.theregister.co.uk/2011/05/03/cop_car_hacking/
Well done that man!!
Well, she's been after the firearms and ammunition for quite a while, and has gotten nowhere at all with that.
Yeah, 2G (and sometimes 3G) latency is a big consideration in some corners of the machine2machine space, too. Mostly you get the pushing of tiny config or data files back and forth, and don't much care if it is measured in minutes vice seconds, but you sometimes run across folks trying to replace ethernet with 2G for their not-particularly-well-tuned client/DB app and then insisting that the cellular network is broken.
Many a pint will be hoisted in Sir Terry's memory, for all the brilliant writing he's given us over the years.
I always assumed it was because they were trying to make sure there were no bombs or drugs in the electronic device, neverminding that someone could rig a laptop to show a boot screen and even a generic Windows desktop with little trouble (as always, security is there to catch the stupid ones).
But aside from the hidden truecrypt partitions etc, how about a login or PIN that while showing inocuous data also automatically/silently activates audio/video recording until owner-stopped or device powered off? It'd make me actually eager to turn it on and provide a login for the nice officer folk.
Tthe State Dept email administrator is a BOFH. 'Nuff said?
Every fifth or sixth BOFH, there's a timely one that I can simply forward to certain individuals because it saves me from actually issuing relevant threats or looking like a... ummm... BOFH. This one is one of the most timely and helpful in recent memory.
Going back to... the first television show? The first AM radio broadcast?
They're just getting more clever and insidious (and one might add, annoying) about how they do that, but sending out interesting content in order to advertise stuff has been around for quite a while.
Well, there goes the FCC's perfect record this millenium of being completely useless.
And for goodness' sake, make sure the patch/upgrade doesn't gack the SSH service on the box.
Sure, but wouldn't her next step before connecting to the internet unprotected (and in a place where her keystrokes assuredly would NOT be recorded) be to change her now-potentially-exposed login password?
It would be for me, and I'm probably not half as security-conscious as her.
“The odds of success are not great – perhaps 50 per cent at best,” the firm said in a statement.
How refreshingly blunt and honest.
Here's to a dry and stable landing.
Sorry, wait - wasn't this sorta what Sony did with audio CDs a while back?
Yeah, but they embedded DRM in it and so no one would touch it.
Unless "the damned door" was an airlock, I don't see how firing them does much good - they would then have zero disincentive to take/leak it to the media, right? To say nothing of potentially exacerbating the security issue - they'd then have external entities inside their network, and unhappy former-internal entities able to exploit that situation and make it substantially worse. Well, worse according to what they knew at the time, anyway - right now "worse" is where they're very definitely at.
I'm not sure what you think it means, but unless you're Captain Cyborg, then it's probably not for you.
I'm glad the air traffic control isn't considered a critical system, or it'd be a bit embarassing not having this kit wired up with emergency generator backup power.