152 posts • joined 4 Aug 2011
Mustn't ever mention Windows ..
"A Microsoft-led operation resulted in the takedown of key servers associated with the infamous ZeuS and SpyEye banking Trojan botnets on Friday".
tastless article ..
But it's what we've come to expect from the REG ...
Crystal Meth and iPAD users
@bleh_meh: Really just because the plod found the ipad and then stumble on a big load of drugs it warrants (see that, I made a joke!) an article here????
It's so as the Reg can get Apple and crystal meth in the same headline. Once a long time ago Apple barred a Reg editor from Cupertino, and they've never forgotten it ...
What's in the Denialgate docs?
"The documents .. included .. a short memo summarising some proposed climate advocacy which Heartland intended to undertake", elREG
"We are concerned that schools are teaching climate change issues in a manner that is not consistent with sound science and that is designed to lead students to the erroneous belief that humans are causing a global warming crisis"
"Global Warming Curriculum for K-12 Classrooms"
"An Open Letter to the Heartland Institute"
Yea .. `warmist' ...
re: I hear Reg comments have a "reply" button now
> ITYM Young, of Cryptome, accused WikiLeaks of being a CIA front?
Yea .. a typo ...
I don't know about 'tinfoil haberdashery`, but I do know that it don't help your credibility one bit to go on Alex Jones. To save you the bother of visiting that site, all those leaked cables on Wikileaks are really a false-flag operation by Karl Roves Whitehouse to discredit Wikileaks .. :)
re: Like Assange with balls in place of a publicist
@Aaron Em: That's the Cryptome guy -- he's never made any particular effort to hide himself and he's never had any noticeable desire to be some kind of new media fondle-toy. (He also probably doesn't look like a Swedish club kid, which is also a plus.) ..
Actually Young accused Cryptome of being a CIA front which would be ironic if the reverse were true. If you were to try and Google on any of this what you would end up with is stories linking exiled Russian millionaires in London, Soris, NSA and Mossad to Wikipedia. All is missing is the secret Nazi bunkers in the Antarctic.
Sun headline ..
I sure figured out what the article was from that headline .. :)
"Blog blast births boffin boycott of publisher Elsevier"
Principal Nick Stephany is shocked
I don't think so, the principal should be sanctioned for allowing his computer system to be so easily hacked ..
Why downvote this?
"Why downvote this?"
There's a serial comment moderator on here, who's self appointed task is to tag unsound opinion. I guess it's some retired old f**t with too much time on his hands. The Reg should show who modded what and for what reason.
"What legal justification is there for censoring internet connections?"
To protect you from the terrorists, after all if you've done nothing wrong, then you've got nothing to hide <sarcasm>
Treaty is not balanced.
Regardless of what some UK government lawyer says, the treaty allows for the extradition of UK citizens to the US where the alleged offence occured in the UK and without the requirement of producing prima facie evidence - and there being no reciprocal right !
Is this Windows only?
I do know the hotfix won't install on Linux ..
"apply hotfix in TECH179526"
Who's going to pay for all the extra bandwidth?
Wasn't it recently that the telecoms were complaining that video streaming was taking too much bandwidth?
$500,000 damages ?
> No reference to Gary McKinnon? Come on Reg, his story used to feature regularly on these pages ..
$500,000 to replace the same passwordless Windows disk image that McKinnon 'hacked'
Linux not for the datacentre.
This is from Sep 2010, maybe they've fixed it since then.
"Linux In The Data Center: How Does It Fit?"
What's a 're-startable check-stop`?
In the case of: U.S. v. Zhang, 12-mag-00108, U.S. District Court, Southern District of New York (Manhattan).
> A New York Fed spokesperson told Reuters and others that the bank had investigated the breach as soon as it was uncovered and promptly referred the case to the authorities ..
>> The New York Fed detected the breach through its established security procedures and referred it to law enforcement officials, Jack Gutt, a spokesman, said in an e- mailed statement ..
Minority Report: Investigators discovered the breach after one of Zhang's colleagues told a supervisor Zang had been asking round the office about a missing harddrive. Zhang had previously told colleges that he was developing something "for private work", in the event that he would be dropped from his current perma-temp contractor employement. The complaint, stated that Zhang copied his own code onto the external drive.
New stealthy botnet Trojan holds Windows users hostage
re: The last line says all you need to know
Just read the adverts, you commie freeloader .. :)
re: Apple taking flak for it
> Fair point, but perhaps they're the only company addressing it precisely because they're the one taking flak for it.
And also because Apple don't spend money on such 'research` directed at its competitors ...
use the Robots.txt file
"Murdoch, who is currently under investigation in the UK over phone hacking by his newspapers, is a longtime critic of what he sees as Google's role in enabling piracy"
If he don't want to show up on Google, then why don't he just use the robots.txt file on his sites?
streaming cloud Windows 7
> Tablet fondlers can finally get some work done thanks to streaming cloud supplier OnLive, which now pipes the full Windows 7 experience from its data centres to punters' palms ..
Which would rely on a decent Internet connection, something my "broadband" provider seems to be unable to provide ...
Data deletion Device
Extradition treaty is not symatrical
> In her ruling District Judge Quentin Purdy rejected the defense arguments that extradition would be disproportionate to the crime, or that too long had passed since it had occurred, and said that there was sufficient criminal law on both sides of the Atlantic to have him shipped off to the US
Except the extradition treaty is not symatrical, as in on the the same grounds, an American citizen could not be extradited to the UK. But then again we're not an independent country ever since WW2 ...
big hauls of credit card numbers, Linux is the way to go
@Bumpy Cat: 65% of major sites run on Linux, as opposed to 15% on Windows ..
Except 99.9999999999999 of clients run on WINDOWS ...
iDNS spoofing ..
> programme will also enable organisations to apply for gTLDs in non-Latin, non-ASCII scripts ..
What happens when a non-Latin URL shares similar looking characters with a Latin URL?
"The internationalized domain name (IDN) homograph attack is a way a malicious party may deceive computer users about what remote system they are communicating with, by exploiting the fact that many different characters look alike"
computing tutorial websiteWiBit.net is a video tutorial web site offering cutting edge programming and computer tutorials. http://www.wibit.net/
teach them the Eclipse IDEEclipse IDE for Java Developers -- http://www.eclipse.org/downloads/moreinfo/java.php
petty spite on NASA's part
> This is nothing more than petty spite on NASA's part, Nick Gisburne
If they didn't do this, then every former NASA employee would be chopping bits off the infrastructure and selling them on eBAY ...
A linux powered telly
@madra: "A linux powered telly. I can just see it now"
Mythbuntu 7.10 Demo
Mark Shuttleworth and stubble
> Mark Shuttleworth has long sought to beat Steve Jobs’ Apple on the look and features of the desktop with his Linux distro; at times, with his cropped hair and stubble ..
I don't think he's actually trying to channel Saint Jobs. People grow facial hair when they start to go thin on top ..
Choose a Private Cloud Solution from Microsoft.
TiVo invented the digital video recorder?
> TiVo has .. proven that it holds valid patents which not only resulted in the invention of the digital video recorder, but which also have developed .. search and recommendation, video metadata usage and new formats for advertising, as well as the collection of audience viewing data.
If could be argured that TiVo were first to file patent on the DVR not that they originally invented the concept or that such should even be patented. But we are talking about the US patent system which is patently broken. Any revenue accuring to TiVo in the AT&T legal action will most probably be provided by Microsoft as they had to imdemnify AT&T in the case. This may also impact on Microsofts' downstream users of its 'technology`. Microsoft is also claiming patents on 'technology related to program schedules and selection`. These claims are so broad that anyone implimenting timed recording on any digital device would be in violation.
As far as I am concerned I don't see how adding a tuner card to a PC and then sticking the letters 'DVR` on the front constitutes inventing the digital video recorder. The same goes for program listings, timed recordings etc. If I can paraphrase Jim Royle .. patented 'technology` my arse ..
re: Damn commie water!! #
In the future everyone is going to get their history from fictional satirical movie characters ..
Self-censorship or edicts from corporate masters?
No, it's edicts from corporate masters and self-censorship ...
Not bringing enough paper rolls?
John Arthur: "I did note in the newspaper article that she made a habit of not bringing enough paper rolls with her to work"
And we can believe this because an officer of the Court would never knowingly tell a lie. Who's idea was it to put the stenographer in charge of the only known record. What was supposed to happen if the defence requested a transcript of the previous days proceeds?
@Leyden: "The PC subsequently became infected by an unidentified virus"
What was the name of this unidentified Operating System that this unidentified virus ran on?
Bank account-raiding Facebook worm?
Facebook is mentioned eleven times, Twitter is mentioned once and Windows is mentioned no times.
Comet 'selling' Microsoft copyright product
> I'm guessing the issue is Comet 'selling' Microsoft copyright product - ie making money and not sharing any with the owners.
It don't say they were selling the disks seperatly. If so, bump up the price of laptop and 'give away' the recovery CD.
"The allegedly counterfeit recovery discs were then sold to customers who had bought desktops and laptops running Windows"
I don't think this is the real issue. MS moved from full recovery disks some time ago. What you got was a reduced version that restored from a hidden partition on the harddrive. This presumably to reduce 'piracy'. If you replaced the HD the the restore CD didn't work. Tough luck on the enduser I guess. I figure Comet were providing full recovery CDs ...
re: fake Western Digital USB hard drive
What branch did this happen. Why open the box before returning when that would have voided the warrenty. What hapened when you reported this to fake Western Digital?
re: I'm not understanding something
I see you've been attacked by the phantom modder :)
Afghanistan weapons testing facility
How lucky for Afghanistan that their country has beeen chosen by the US miletary to test out their next generation weapons systems ..
re: "open APIs"
> If the last decade was all about open source, the next decade will be about open APIs
Only if you are Microsoft and are desperately tring to kill OPEN SOURCE. He who controls the open APIs controls the monoculture .. er .. ecosystem :)
What you can do to enforce endpoint security?
Put the authentication and security bits in a hardware dongle ..
ps: In that whole article the only system you managed to mention in relation to malware was Android .. :)
religious figure identified by initials A.Z
> Thursday's ruling .. dismissed criminal charges against William Lawrence Cassidy, who used multiple Twitter accounts to sharply criticize a religious figure identified only by the initials A.Z.
Would that be Buddhist leader Alyce Zeoli?
The unnamed suspect has been named ..
How to negative spin this story
"the company has plonked just over 0.1 per cent of this cash on the philanthropic pile"
Yea, as well as that they've patented the concept and are licensing 'slavery` under Reasonable and nondiscriminatory (RAND) © terms.
The short version
One master image and feed it out to a number of local sub-servers and lots of RAM on the desktop and the apps designed to run with intermittent/slow network I/O ..
Software crash nearly caused car crash
Instead of designing the traction control and ABS in software how about doing it as a 'finite-state machine`
re: Novell and something innovative
@P.Lee: "Once Novell were in a situation where people were buying MS licenses and getting MS file-serving by default they should have seen the writing on the wall and come up with something innovative"
Begs the question as to why MS had to expend so much energy in slaughtering Novell ..
re: it wasn't NT what killed Netware
No it was MS yet again obfuscating the API calls to wrong-foot their partners, I mean competitors, same thing really :)
"We need to slaughter Novell before they get stronger", Microsoft Sep 1991
"the way to shut out novell in the base is to either ship a full client or make it so there is no network connectivity", Microsoft Jan 1994
"Microsoft would like cooperative product testing, access to Novell’s SuperLab for Win95 testing", Novell Jan 1996
Benefits of the Virtual Desktop.
That was very well written, Barry, but it's meaning here may be lost as it's (mostly?) techies that hang round here. Any Virtual Desktop I've seen, if at all to be usable, required masses of bandwidth (as you say in your piece) and I was not that impressed ! Unlike the old-fashioned method of the app running locally and the data being accessed remotely. And there are currently various methods of the one copy of Windows and the one copy of the application to the desktop.
One method I've seen, having a local image server that reimaged a PC once the NIC cable was transferred to a special socket in the switch room and the machine rebooted. Apps were standard MSI packages wrapped up in some "unattended-installer-app" that delivered them to the PC on reboot. Hardly unattended remote backup, but it did the job.
So to conclude: The main benefit of Desktop Virtualization is it totally eliminates the need of a technician to visit the PC, reduces the number of on-the-site people required and saves money. Management always like to hear about ways to save money.
ps: You use too many acronyms in that piece ..
Understanding Carrier IQ Technology
"Understanding Carrier IQ Technology"
- Just TWO climate committee MPs contradict IPCC: The two with SCIENCE degrees
- 14 antivirus apps found to have security problems
- Feature Scotland's BIG question: Will independence cost me my broadband?
- Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
- FTC to mobile carriers: If you could stop text scammers being jerks that'd be just great