255 posts • joined 9 Jan 2012
Re: It's nothing to do with rural!
Agreed. As Michael Lewis pointed out at the end of "Flash Boys", his book on high frequency trading, for long hauls, microwave links replaced fiber for HFT in the last year or two, because it has lower latency between Chicago & New Jersey. With the added plus of being cheaper & faster to install.
My experience with NASes tells me that one with a Marvel ARM 1.2GHz processor and 512MB of RAM is vastly underpowered for even a network with one user. Marvell ARM 2.0GHz processor and 1GB of RAM is the bare minimum. A NAS with something like a Intel® Atom™ 2.13GHz Dual-core Processor & 3GB of RAM is about right.
These cars are a lawyers wet dream.
Re: For added irony, on the story's page
Eh? According to Ghostery, on The Registers story page, there are 21 trackers. On the brw.com.au page, there are 34. On the Registers comment page for this story, there are 49 trackers.
his Romanian competition.
FAIL The blowout technique was invented in 1913 by Karl T. Kinley. Kinley's son Myron took over the business and later trained Red Adair and many others in the technique.
I think not
Seems not. I just logged into eBay.com with my old password. Also, the claim that eBay has notified users is false as well. I've not received any email from them, nor any message on the eBay internal messaging system.
Brigitte Grouwels needs to understand that to Americans, being called a "cowboy" is a complement. To Americans, being called "European" is an insult.
Re: Steps in the right direction
Eh? The article did not say that PFS was becoming the standard. It simply said that Diffie-Hellman key exchange (DHE) and Elliptic Curve Diffie-Hellman key exchange (ECDHE) will be the two supported because they *support* Perfect Forward Secrecy (PFS). But DHE & ECDHE are not synonymous with PFS. DHE & ECDHE are simply schemes by which two entities with no prior knowledge of each other can generate a shared mutual key over an insecure channel. You can use DHE & ECDHE without PFS. So the real question is whether TLS 1.3 will *require* PFS, or at least have it turned on by default.
"In America CEOs still get pensions. The regular workers don't."
Sorry bucko, but that so far off, it can't even be elevated to the status of "wrong". And don't try to conflate a golden parachute with a pension.
Pension? At Apple? Are you joking?
Have you ever even been to America?
Re: Umm, not so sure.
Had Steve Jobs not been ousted from Apple, Apple would today be in the same place NeXT is - gone. I know a lot of people who spent 30+ year-long careers at Apple, starting in the early 80's. I also know people who were at NeXT. Jobs made mistake after mistake at NeXT, and those mistakes were fatal. While Apple ended up buying NeXT, that was really part of Job's return to Apple while NeXT was circling the drain. Had Jobs not been booted from Apple and founded NeXT, all of the lessons learned at NeXT, at NeXT's expense, would have been on Apple's dime (if they were learned at all), and Apple would have gone down the drain. I have no doubt that Apple would not be the company it is today had Job's not been booted and really broken his teeth on NeXT.
Re: Not so unlikely after all
It took 2.5M hits in the servers. I hope Cloudflare servers not noticing what is basically a DOS attack like that isn't indicative of Cloudflare's product effectiveness.
The Bloomberg report is probably NSA disinformation.
Some obvious points:
1. Running old versions of Windows or DOS within Virtual Box is pretty standard. My place of business has been doing it with Win 98 & Win 95 for years, due to legacy issues with needing to access old documents in discontinued file formats where the old applications will only run on Win 98 or earlier.
2. There's no need to run Virtual Box on a Linux machine, unless you like Linux. Running Virtual Box (and running your discontinued Windows versions on it) works just fine in Win 7 & 8, or even on a Mac.
3. If you are really paranoid, there are ways to allow the Virtual Box VM to access some things on the corporate network but not access the Internet.
4. Always keep an up-to-date backup of the VM's, in case they get hosed.
Re: Up the creek without paddle...
Agreed. There's a reason that French owned firms are building up their faculties outside of France.
This article conatins a major flaw
This article glosses over the issue that the buffer overflow returns RANDOM DATA, not specifically keys or passwords. An actual attack would require, generally, a whole lot of queries each returning 64K of RANDOM DATA. Such an ACTIVE attack might be noticed, for starters, and is not assured of ever returning useful data. Having said that, I certainly don't want to downplay this vulnerability. But even this article is, as it's first sentence shows, overly alarmist rather than rational.
Even if one agrees with the statement that "... Edward Snowden is "under the thumb" of the Russians and that his revelations about NSA spying tactics are assisting authoritarian government, including the government of Syria...", it is irrelevant.
Just because a revelation of lawbreaking by the NSA may help "the bad guys" does not mean that letting the lawbreaking continue is not creating worse damage to the people the NSA are supposed to be working for.
Irony - Linus Torvalds calling someone else a prima donna.
"All animals are equal, but some animals are more equal than others" is a two edge sword.
Mr. Worstall didn't read the book.
But I did.
@ A Non e-mouse
"It might not allow one country to control affairs outside its own borders, but surely it gives the country the right to decide who it sells to and at what price*?"
If I were your employer, I'd show you the door for a comment like that, because it says you don't understand, and are not likely to honor, any of that paper you signed as a condition of your employment, such as NDA's,
When a country joins the WTO, they give up a whole bunch of "rights", such as the one you describe, and they gain the reduction of tariffs into a whole bunch of other WTO member markets. And as the WTO ruling says, once you mine a material and remove it from the ground, it enters the WTO ruled international marketplace. That WTO ruled international marketplace basically says that if someone has the cash at the going price, you have to sell to them. You can't give preferential (or discriminatory) treatment or pricing based on things like whether they are a domestic customer vs WTO member customer. It really is that simple.
Jobs was a genius
At figuring out how to get Kool-Aid drinkers to overpay for hardware, software & services. It should not be a surprise that he'd not look kindly on TV. As he said, the hardware does not turn over, and the services had been crowded for years by the likes of Tivo, Roku, etc.
More to the point
It won't distract folks from United's horrible service and outrageous baggage fees.
Kind of like a cannibal rallying against slaughterhouses as cruel.
Re: Come on IBM..
The fact that what Twitter does is considered to have ANYTHING to do with intellectual property just underscores how broken the US Patent system is.
Whether a settlement is taxable depends on the details. Which is why if you are ever suing (in the US) for a significant amount of money, it's a good idea to talk to a tax attorney before settling or before the court awards you anything. Even if the settlement or award is taxable, there can sometimes be ways to structure it to lower the taxes. For example, if the award or settlement covers your legal fees, often that can be structured so that you do not have to pay taxes on the money going to your legal team. But it has to be structured properly BEFORE the award or settlement is made. You can't play around with the paperwork after the check(s) is cut.
Re: Not sure what to think
"I wonder if her father made it clear that they couldn't tell others about the settlement?"
Typical "computer geek who knows zero about the law" statement.
The father violated the agreement the second he told his family. The daughter's post on Facebook simply provided irrefutable proof of his violation. The settlement's confidentiality requirement is no different than your employer's confidentiality requirement or a defense department confidentiality requirement. Disclosing to your family, even your spouse, is a violation.
Wow, a Maginot Line-like thing at sea. Looks great in calm waters. My money is that it won't fare so well in a North Atlantic storm.
Propeller needs a cage, like an airboat's. The tires are too narrow for any real use on sand.
Probably the best take on this deal
Re: It should be blocked by the anti-trust authorities
That, in a nutshell, just underscores the lack of competition in the US cable marketplace.
Re: Few CIOs or VP ITs can code
I've been with a number of startups in my career, as well as a couple of mature companies. In both environments, most of the people at all levels have mindsets that can be summed up as follows:
"Any job I don't understand & have no experience with is easy."
which is often seen in it's other form,
"No job is as difficult as mine."
The bottom line is that good companies require different talents for the different jobs, and they are all important. (Unless there are redundancies, in which case the place is over staffed.)
Re: A page from Google they can keep
No doubt that is the reason Mozilla abandoned Thunderbird without offering a viable alternative email client, thus screwing Thunderbird users.
Re: It doesn't matter anymore "Sieg Heil" NSA!!!!
"I'm quite sure that they have the worst dirt they have on everyone at the top of their respective folders and will threaten anyone that starts to be a real threat to the NSA's ability to crack any crypto."
All the more reason that when the Standards Bodies meet, all members should be required to wear these: http://www.thedailybeast.com/articles/2014/01/07/the-secret-world-of-men-who-dress-like-dolls.html
Then, it would be impossible for any intelligence agency to have worse dirt on them which could embarrass them any further.
The enemy you can see
Isn't as dangerous as the enemy you don't see. The bottom line is that all processes should be open and transparent so that "trust" in any participant isn't a factor. In other words, the processes should be designed as if every participant is untrustworthy.
The real issue with the Dodd-Frank Method
Is that it's trivial to fake the documentation as there is nothing objective to back up the paperwork. The refiner method, being a filter based on chemical analysis, would require the refiner to fake the results to cheat, and that is easy for a third party to monitor.
Dodd-Frank was written by NGO's to provide a revenue stream for the NGO's by providing source certifcations. It's also why the NGO's lied about costs to implement.
Re: Well I'm convinced.
"...the Everett many worlds interpretation is the correct one..."
You are making a distinction without a difference. The Everett many worlds interpretation is "the correct one", as it is entirely equivalent in all ways to the conventional collapsing wavefunction "correct" interpretation. Any competent Physicist could tell you that.
Re: Well I'm convinced.
I know this just proves that social media has no future.
None of this would be a problem if it was done right the first time
TOR suffers from the same fundamental flaw that SSL does, namely the fact that it's a single-path system. While multi-path isn't fool proof, it certainly makes the interception and tracking a lot harder. For a lot of purposes, the added latency is quite acceptable, and with a little thought, protocols can be envisioned that prioritize information so the less important goes the lower-latency pathways to increase the apparent responsiveness while the "important stuff" goes the tougher to intercept multi-pathways.
In a similar way, cloud services can be made more secure by having clients utilize liner functions. (i.e. Instead of encapsulating a complex function with a simple to call wrapper function, you "line" a complex storage functionality by lining it to make it appear simple.) For example, a locally encrypted virtual drive has its container file hosted on cloud(s) drives. If the cloud vendor proves untrustworthy by backdooring their services to others, the "other" gets the container file, and still has to compromise that to get its contents. (e.g. Something like Truthcrypt with the container file RAID 2 stripped, with part of the container file striped on Dropbox and part striped on Google Drive, yet looking like one Truecrypt drive to the user.) Tougher to get the "whole enchilada" container file, and then even if you did get it, you still have the fact that it's encrypted, and you have to deal with that.
1) It is true that diamonds are not rare, and that the jewelry "value" is completely artificial due to the De Beers diamond cartel. The cartel had to operate outside of the US until 2001 due to it's violating US antitrust laws. Former CIA chief, Admiral Stansfield Turner, claimed that De Beers restricted US access to industrial diamonds needed for the country's war effort during World War II. As Turner's statement indicates, diamonds have considerable industrial uses as polishing grits. Diamond grit is slightly harder than silicon carbide grit and much harder than alumina (aluminum oxide) grit.
2) True, that was part of Cecil Rhodes (who founded De Beers in the late 1800's) marketing campaign.
3) Most diamonds mined are used for industrial purposes, not jewelery. Since diamond is a rather common gem stone with an industrial use, the fact that most diamonds mined are not "gem quality" does not matter much. Remember, the whole reason the cartels limit the number of diamonds on the market is because even though gem quality diamonds are rare compared to non-gem quality, diamond is so common a mineral that not restricting the gem quality ones would cause their value to plummet to a fraction of their present value.
One little problem...
Who's going to teach the "Genius Bar" kiddies how to program, so they can teach the classes?
Re: Who the hell cares what any Iranian News Agency has to say?
You know the story is fake because of the Dr. Evil-like "$1M". Only an ignorant Iranian propaganda hack would think $1M is enough money to develop a cyberweapon.
Re: Excellent Article
I'd rather see an iBeacon app or gizmo that I can take into the store and flood their system with misleading data.
Yes. As bad as Outlook is (and it is really bad), Yahoo mail is one of the few mail systems that is worse. I've yet to see any webmail service that was as good as using a mail client like Thunderbird.
Re: How long...?
To sue the US govrrnment for damages in a US court, the government has to agree to be sued. Under normal circumstances, this is granted. But often in National Security cases, it's not. In addition, the US hss been holding billions of dollars of seized Iranian assets since the Iranian revolution due to damage claims by US entities from the Iranians seizing property during their revolution. The bottom line is that the Iranians can't do squat in US courts until they decide to normalize relations with the US. And to do that, they need to start behaving in regards to nukes, terrorism, etc.
Re: The first selfie? Really?
Actually, the oldest selfies are about 40,000 years old.
AWS and Google will throw GreatFire and others under the bus in a heartbeat.
It's basically the EM equivalent of noise cancelation
Noise cancellation does the acoustic equivalent of this. It's amazingly simple, as you can see by reading the Physical Review X article.
Re: Plenty of standards...
Encryption should be thought of in the same way as for physical containment systems, namely as barriers that take time to breach or errode, not as impenetrable shields. As such, it is false logic to claim that you should do nothing because what you can do isn't perfect.
- Pic Mars rover 2020: Oxygen generation and 6 more amazing experiments
- Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
- Plug and PREY: Hackers reprogram USB drives to silently infect PCs
- Review Fiat Panda Cross: 'Interesting-looking' Multipla spawn hits UK
- Analysis PEAK LANDFILL: Why tablet gloom is good news for Windows users