268 posts • joined 9 Jan 2012
Re: PC-powered registers?
It's almost a 100% certainty it is Windows Embedded for Point of Service V1 or Windows Embedded POSReady 2009, both of which are types of Windows XP.
USA Freedom Act?
Maybe Google should read it. It just extends the Patriot Act & warrentless snooping. Oh yea, and shields folks like Google.
This has been going on for a very long time
I'm a little confused
The description of the error in the release notes is ambiguous.
" Even when marked to be encrypted, an email with only Bcc recipients is sent in plain text!"
Does this mean that the bug only shows up & sends mail unencrypted to the BCC recipients when the BCC field is used but the TO & CC fields are blank, or does this mean that the bug always sends mail unencrypted to the BCC recipients independent of the status of the TO & CC fields?
These are two very different behaviors with two very different probabilities of being triggered due to the way people often use BCC. My expedience with BCC both sending and receiving email is that the TO field is always filled with some address, sometimes a dummy address (such as the sender's). If the "only Bcc recipients" requirement is in fact strictly the case, then most instances of using BCC that I've seen would not trigger the bug.
This just underscores how describing bugs needs to be done with precision.
Business as usual
They are just following that age old pattern endemic to all professions which can be summed up in unvarnished form as "anything I don't understand must be trivial".
Re: Interesting times
Usually, when high energy physicists try to do optical measurements, it ends with erroneous results.
So doesn't this ruling mean that basically all movies & TV shows out of Hollywood are now copyright free?
The ONLY 9V batteries for use in unheated applications like parking meters are Li ion 9V batteries. Alkaline & carbon zinc don't work in winter. Same with 1.5V D, C, AA & AAA applications.
The most intelligent discusion of this so-called experiment
Re: At last
Real Scientists, when they get the same result with their null control as with the DUT, look for flaws in the measurement instruments.
The real issue is criminalizing journalists publishing classified info. Despite all its faults, and a number of Administrations wanting to lock up journalists, at least in the US, Courts have upheld the 1st Amendment even when the documents being published have "SECRET" stamped all over them. (e.g. New York Times Co. v. United States, 403 U.S. 713 (1971) US Supreme Court Decision )
Yea. My house needs more things in it for malware to perch.
Re: It's nothing to do with rural!
Agreed. As Michael Lewis pointed out at the end of "Flash Boys", his book on high frequency trading, for long hauls, microwave links replaced fiber for HFT in the last year or two, because it has lower latency between Chicago & New Jersey. With the added plus of being cheaper & faster to install.
My experience with NASes tells me that one with a Marvel ARM 1.2GHz processor and 512MB of RAM is vastly underpowered for even a network with one user. Marvell ARM 2.0GHz processor and 1GB of RAM is the bare minimum. A NAS with something like a Intel® Atom™ 2.13GHz Dual-core Processor & 3GB of RAM is about right.
These cars are a lawyers wet dream.
Re: For added irony, on the story's page
Eh? According to Ghostery, on The Registers story page, there are 21 trackers. On the brw.com.au page, there are 34. On the Registers comment page for this story, there are 49 trackers.
his Romanian competition.
FAIL The blowout technique was invented in 1913 by Karl T. Kinley. Kinley's son Myron took over the business and later trained Red Adair and many others in the technique.
I think not
Seems not. I just logged into eBay.com with my old password. Also, the claim that eBay has notified users is false as well. I've not received any email from them, nor any message on the eBay internal messaging system.
Brigitte Grouwels needs to understand that to Americans, being called a "cowboy" is a complement. To Americans, being called "European" is an insult.
Re: Steps in the right direction
Eh? The article did not say that PFS was becoming the standard. It simply said that Diffie-Hellman key exchange (DHE) and Elliptic Curve Diffie-Hellman key exchange (ECDHE) will be the two supported because they *support* Perfect Forward Secrecy (PFS). But DHE & ECDHE are not synonymous with PFS. DHE & ECDHE are simply schemes by which two entities with no prior knowledge of each other can generate a shared mutual key over an insecure channel. You can use DHE & ECDHE without PFS. So the real question is whether TLS 1.3 will *require* PFS, or at least have it turned on by default.
"In America CEOs still get pensions. The regular workers don't."
Sorry bucko, but that so far off, it can't even be elevated to the status of "wrong". And don't try to conflate a golden parachute with a pension.
Pension? At Apple? Are you joking?
Have you ever even been to America?
Re: Umm, not so sure.
Had Steve Jobs not been ousted from Apple, Apple would today be in the same place NeXT is - gone. I know a lot of people who spent 30+ year-long careers at Apple, starting in the early 80's. I also know people who were at NeXT. Jobs made mistake after mistake at NeXT, and those mistakes were fatal. While Apple ended up buying NeXT, that was really part of Job's return to Apple while NeXT was circling the drain. Had Jobs not been booted from Apple and founded NeXT, all of the lessons learned at NeXT, at NeXT's expense, would have been on Apple's dime (if they were learned at all), and Apple would have gone down the drain. I have no doubt that Apple would not be the company it is today had Job's not been booted and really broken his teeth on NeXT.
Re: Not so unlikely after all
It took 2.5M hits in the servers. I hope Cloudflare servers not noticing what is basically a DOS attack like that isn't indicative of Cloudflare's product effectiveness.
The Bloomberg report is probably NSA disinformation.
Some obvious points:
1. Running old versions of Windows or DOS within Virtual Box is pretty standard. My place of business has been doing it with Win 98 & Win 95 for years, due to legacy issues with needing to access old documents in discontinued file formats where the old applications will only run on Win 98 or earlier.
2. There's no need to run Virtual Box on a Linux machine, unless you like Linux. Running Virtual Box (and running your discontinued Windows versions on it) works just fine in Win 7 & 8, or even on a Mac.
3. If you are really paranoid, there are ways to allow the Virtual Box VM to access some things on the corporate network but not access the Internet.
4. Always keep an up-to-date backup of the VM's, in case they get hosed.
Re: Up the creek without paddle...
Agreed. There's a reason that French owned firms are building up their faculties outside of France.
This article conatins a major flaw
This article glosses over the issue that the buffer overflow returns RANDOM DATA, not specifically keys or passwords. An actual attack would require, generally, a whole lot of queries each returning 64K of RANDOM DATA. Such an ACTIVE attack might be noticed, for starters, and is not assured of ever returning useful data. Having said that, I certainly don't want to downplay this vulnerability. But even this article is, as it's first sentence shows, overly alarmist rather than rational.
Even if one agrees with the statement that "... Edward Snowden is "under the thumb" of the Russians and that his revelations about NSA spying tactics are assisting authoritarian government, including the government of Syria...", it is irrelevant.
Just because a revelation of lawbreaking by the NSA may help "the bad guys" does not mean that letting the lawbreaking continue is not creating worse damage to the people the NSA are supposed to be working for.
Irony - Linus Torvalds calling someone else a prima donna.
"All animals are equal, but some animals are more equal than others" is a two edge sword.
Mr. Worstall didn't read the book.
But I did.
@ A Non e-mouse
"It might not allow one country to control affairs outside its own borders, but surely it gives the country the right to decide who it sells to and at what price*?"
If I were your employer, I'd show you the door for a comment like that, because it says you don't understand, and are not likely to honor, any of that paper you signed as a condition of your employment, such as NDA's,
When a country joins the WTO, they give up a whole bunch of "rights", such as the one you describe, and they gain the reduction of tariffs into a whole bunch of other WTO member markets. And as the WTO ruling says, once you mine a material and remove it from the ground, it enters the WTO ruled international marketplace. That WTO ruled international marketplace basically says that if someone has the cash at the going price, you have to sell to them. You can't give preferential (or discriminatory) treatment or pricing based on things like whether they are a domestic customer vs WTO member customer. It really is that simple.
Jobs was a genius
At figuring out how to get Kool-Aid drinkers to overpay for hardware, software & services. It should not be a surprise that he'd not look kindly on TV. As he said, the hardware does not turn over, and the services had been crowded for years by the likes of Tivo, Roku, etc.
More to the point
It won't distract folks from United's horrible service and outrageous baggage fees.
Kind of like a cannibal rallying against slaughterhouses as cruel.
Re: Come on IBM..
The fact that what Twitter does is considered to have ANYTHING to do with intellectual property just underscores how broken the US Patent system is.
Whether a settlement is taxable depends on the details. Which is why if you are ever suing (in the US) for a significant amount of money, it's a good idea to talk to a tax attorney before settling or before the court awards you anything. Even if the settlement or award is taxable, there can sometimes be ways to structure it to lower the taxes. For example, if the award or settlement covers your legal fees, often that can be structured so that you do not have to pay taxes on the money going to your legal team. But it has to be structured properly BEFORE the award or settlement is made. You can't play around with the paperwork after the check(s) is cut.
Re: Not sure what to think
"I wonder if her father made it clear that they couldn't tell others about the settlement?"
Typical "computer geek who knows zero about the law" statement.
The father violated the agreement the second he told his family. The daughter's post on Facebook simply provided irrefutable proof of his violation. The settlement's confidentiality requirement is no different than your employer's confidentiality requirement or a defense department confidentiality requirement. Disclosing to your family, even your spouse, is a violation.
Wow, a Maginot Line-like thing at sea. Looks great in calm waters. My money is that it won't fare so well in a North Atlantic storm.
Propeller needs a cage, like an airboat's. The tires are too narrow for any real use on sand.
Probably the best take on this deal
Re: It should be blocked by the anti-trust authorities
That, in a nutshell, just underscores the lack of competition in the US cable marketplace.
Re: Few CIOs or VP ITs can code
I've been with a number of startups in my career, as well as a couple of mature companies. In both environments, most of the people at all levels have mindsets that can be summed up as follows:
"Any job I don't understand & have no experience with is easy."
which is often seen in it's other form,
"No job is as difficult as mine."
The bottom line is that good companies require different talents for the different jobs, and they are all important. (Unless there are redundancies, in which case the place is over staffed.)
Re: A page from Google they can keep
No doubt that is the reason Mozilla abandoned Thunderbird without offering a viable alternative email client, thus screwing Thunderbird users.
Re: It doesn't matter anymore "Sieg Heil" NSA!!!!
"I'm quite sure that they have the worst dirt they have on everyone at the top of their respective folders and will threaten anyone that starts to be a real threat to the NSA's ability to crack any crypto."
All the more reason that when the Standards Bodies meet, all members should be required to wear these: http://www.thedailybeast.com/articles/2014/01/07/the-secret-world-of-men-who-dress-like-dolls.html
Then, it would be impossible for any intelligence agency to have worse dirt on them which could embarrass them any further.
The enemy you can see
Isn't as dangerous as the enemy you don't see. The bottom line is that all processes should be open and transparent so that "trust" in any participant isn't a factor. In other words, the processes should be designed as if every participant is untrustworthy.
The real issue with the Dodd-Frank Method
Is that it's trivial to fake the documentation as there is nothing objective to back up the paperwork. The refiner method, being a filter based on chemical analysis, would require the refiner to fake the results to cheat, and that is easy for a third party to monitor.
Dodd-Frank was written by NGO's to provide a revenue stream for the NGO's by providing source certifcations. It's also why the NGO's lied about costs to implement.
- Analysis iPhone 6: The final straw for Android makers eaten alive by the data parasite?
- Stephen Pie iPhone 6: Most exquisite MOBILE? No. It is the Most Exquisite THING. EVER
- First Crack Bloke buys iPHONE 6 and DROPS IT to SMASH on PURPOSE
- Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
- First Fondle Register journo battles Sydney iPHONE queue, FONDLES BIG 'UN