4 posts • joined Friday 15th April 2011 15:52 GMT
it can hardly be a surprise to the Security Services that the leaks have come from Trusted SysAdmins. It is the same in many companies, in my experience, ordinary users don't always have access to thumb drives or writable drives, but the 'techies' swan in and around with copies of the OS on a burnt drive or a pen drive. We assume they are doing something proper, but what if they are just using our accounts to swipe data? It would be easy enough to do. But then again, it is easy enough to stop too, the problem is, it is the SysAdmins that would have to implement the blocks, and I guess most of them are not motivated? At a recent place I worked, pen drives were locked away, issued only for special jobs, and had to be returned at the end of the day. Unencrypted non registered pendrives did not work on the system. Seems quite safe to me :-) http://www.theregister.co.uk/Design/graphics/icons/comment/angel_32.png
so, silly question, why can't the wand be seen and the plants can be seen? I suspect the invisibility shield is actually a photograph. An easy demo to make for anyone with a camera, photo printer and a you tube account. I look forward to a plethora of invisible fauna with visible flora.
we are on O2 via Tesco, and no one here has had any problems.
The Shockwave Rider
Jon Brunner - The Shockwave Rider, as far as I know never made it to film ,but predicted life on the internet, worms, viruses and trojans decades before the existed. Oh, there is a Panther and a girl in it too :)
Failing that, I would Go with Asimov's Foundation series. Big Up to Hari Seldon
- Nuke plants to rely on PDP-11 code UNTIL 2050!
- Spin doctors brazenly fiddle with tiny bits in front of the neighbours
- Game Theory Out with a bang: The Last of Us lets PS3 exit with head held high
- That Microsoft-Nokia merger you've been predicting? It's no go
- Microsoft breaks bug-bounty virginity in $100,000 contest