532 posts • joined Wednesday 1st February 2012 20:29 GMT
Google Apps for spies ©
What spy in his-or-her right mind uses Google for communication? I suspect all these Cyberscare stories are to prime us for yet even more surveillance - on us. The problem with the Internet is pretend democratic governments can no longer control the msg. As previously only the rich-and-connected could afford a newspaper or television network. Now anyone-and-his-dog can broadcast the msg. A most dangerous thing. Best demonize the populace and discredit activists ...
Dragons' Den digital entrepreneur?
I was always curious as to why they got rid of Richard Farleigh, I found him to be highly knowledgeable and constructive with advice to the contestants. Was it because he was stealing thunder from some of the other panellists?
Copying the Microsoft paradigm?
"Where rivals have tried to beat Office, they’ve only succeeded in copying the paradigm of apps, menus and screens".
"I have decided that we should not publish these extensions. We should wait until we have a way to do a high level of integration that will be harder for likee of Notes, Wordperfect to achieve, and which will give Office a real advantage" Oct 1994
"WordPerfect is impressive. The performance is pretty good as well (we'll test when they ship) .. This is from a product manager and has some of the basic information about their feature set" May 1997
"I am reading about the Gateway adoption of the Corel software. I am interested to understand what this means better and how it relates to any contracts we have with them" Feb 1999
The Register Jan 2008 ..
Re: Clifford Stoll was right
`Stoll .. made various predictions, e.g. about e-commerce (calling it nonviable due to a lack of personal contact and secure online funds transfers) and the future of printed news publications ("no online database will replace your daily newspaper")'. link
Computers Powerpoint and Wikipedia?
It's cogent that for a lot of people exposed to ICT, all computers mean is Powerpoint or a Wikipedia lookup ...
Computers and homework?
"Overall, these results suggest that increasing access to home computers among students who do not already have access is unlikely to greatly improve educational outcomes"
Presumably because the students were too busy assembling electronic kit and writing their own games in assembler, to be bothered to spend effort on passing exams, which is what modern education is mostly about. Access to the Raspberry Pi would do more for their education than all the proper curriculum on the planet.
FedRAMP certification, a bunch of forms you fill in, that contribute nothing what-so-ever to cybersecurity ..
Hawking plugging atheism?
Am I correct in assuming you are not of the atheist persuasion. If so you should take comfort in the notion that Mr. Deity put Hawking in a wheelchair the best part of five decades, no doubt in retaliation for not praising him enough.
Round Island One ...
Google on `Round Island One' + Ireland ...
I don't believe IT ..
A security company I never heard of says China is hacking US government infrastructure. This coinsides with neo-con propaganda currently being pushed in Washington. In all probability the security company is being financed by the self same neo-cons. A bit like the tea-baggers are a a genuine grass-roots movement and not a front for some billionaires.
"increasing information sharing" a eufinism for more spying - on us.
"Mandiant won't say exactly how much it charges, but it's estimated to average around $400 an hour"
How to protect kids from PORN?
PORN definition: The graphical depiction of sexual activity. Designed mostly to provide visual stimulation to the inadequate while they self stimulate. Is degrading both to the performers and the viewers. No amount of pseudo scientific sociological waffle is going to change that.
"The National Association of Head Teachers (NAHT) asked parents to suggest what schools should be doing to protect kids from smutty websites: nearly half (42 per cent) of 1,009 respondents believed children needed guidance as soon as they start using the internet"
Yea, if you mention PORN to kids that's exactly how you'll get them not to think about it, or be tempted to access it online.
"90 per cent believe all equipment that offers internet access should have a default block on pornographic websites. Users should be required to ‘opt in’ to view such material"
Have you considered switch off the computer, or at least not treating it like a baby-sitter. Similar to the idea that giving your teenage daughter a mobile phone is 'keeping an eye or her'.
"42 per cent felt that even children as young as five or six needed guidance as soon as they were old enough to access the internet"
Yea, you can never start too early poison kids minds ...
ps: Sir Humphrey could have drawn up that survey. First prime them with six loaded 'question` about porn, then get them to 'agree' to "At what age is it appropriate for schools to begin teaching about the dangers of pornography?"
key words: children, dangers, explicit, pornographic, sexual, violent, web, worried, worried, worried, worried ...
Bring bonking functionality to Android?
"Within days Larry Page had apparently killed off the physical card which was intended to bring bonking functionality to those lacking the latest Android hardware"
Excuse me for asking, but what has sexual intercourse got to do with online electronic financial transactions?
Reason for Sinofsky's sudden exit?
"Nobody officially knows the reason for Sinofsky's sudden exit; perhaps the man tipped as a future Microsoft CEO was involved in a power struggle at the very summit of the corporation. My theory is that it was obvious before Windows 8 launched that the software wasn't working well enough, but the countdown to liftoff could not be stopped - and Sinofsky wouldn't or couldn't brook any changes."
It was the other way round, Sinofsky wanted to cancel the Windows 8 launch but was overruled by Ballmer.
re: Steve Jobs beyond the grave ..
Enough with the dead Steve Jobs trope ..
Foxconn Apple's preferred source?
"The Fair Labor Association's (FLA's) latest report on workers at Chinese manufacturer Foxconn, Apple's preferred source for many iThings"
As well as many others including Microsoft and Intel ..
No mention of Windows?
Where does Microsoft Windows come into the equation?
How to generate revenue from social media?
`Rupert Murdoch had a Gerald Ratner moment on Twitter earlier today when .. he labelled MySpace .. as "crappy"'.
I could have told him that before he bought it. The recurring question about `social network' sites is how to make revenue out of them. They're like last-years-fashion, huge while they're popular and then forgotten while the fans move on to the next-big-thing. If you want to stay relevent, what you have to do is continually reinvent the business, always a tough thing to do. If I was in the business, what I would do is try and [re] invent the walled-garden, as in provide a lot of content and usability on the one platform, and charge a subscription, but that's still a tough sell. IOL had that opportunity and totally squandered it.
re: the art of charitable giving...
Hiding your big-bucks from the tax-man in a private foundation is not really being charitable...
Anonymous recommends Windows ..
Windows 7/8 are by far the best looking OSes on the market right now, and Windows Phone 8 looks great."
It's understandable why you would want to remain anonymous ..
Can't create documents on iPAD ..
“A lot of those users are frustrated because they can't type, they can't create documents"
The wrath of Apple?
"our reader - who works in the IT industry and does not want to incur the fruity firm's wrath by revealing her name"
`There's an old Italian saying: you fuck up once, you lose two teeth', Steve J0bs
SSH brute force attacks ..
"The speculation among security researchers is something quite simple: ssh brute force attacks against the root account"
"DarkLeech .. infected the servers with an SSHD backdoor"
Not surprising Apache hacked?
"Given that Apache, Lighttpd, and Nginx are all open source software, it's not surprising that the attackers behind Cdorked were able to insert their backdoor code into all three."
I don't understand, are you suggesting that the Apache source repositories were compromised?
"What is curious, however, is how they managed to smuggle their Trojanized versions onto active servers"
They didn't, they hacked Cpanel-based servers ..
"not to mention what they hope to achieve by it".
Redirecting users to porn and gambling sites to generate hits ..
Fake technology ..
Why would anyone with the slighess knowledge of the technology involved, even believe it this. The technology as depicted on Star Trek isn't real !
A friend of mine in the banking sector once described how management wanted a recording system that could take minutes of a meeting only utilising microphones. They couldn't understand how a speech-to-text system wouldn't be able to understand the context or meaning of the stuff.
Easier access through illegal file-sharing sites
`“fans of Game of Thrones who have used illegal file-sharing sites … say it was much easier to access through these sites, or that they got frustrated by the delay in the first season'
Exactly, the content owners don't seem to realise that fast home broadband is a game changer. People are prepared to pay reasonably for content but it's still difficult to legitimately access online. Micropayments done through the ISP would do the job. So come on, get on with it, there's money to be made from it.
<Insert scaremongering Sun headline here>
'We intentionally left the device unlocked', Neil McAllister April 29 2013
"Easy root access opens spyware floodgates", Neil McAllister May 01 2013
What's different between now and last monday to cause such a change of opinion. Where did Google ever claim that the device was unhackable with physical access.
re: Google and Microsoft have already done this
"Google and Microsoft have both issued debt in recent years"
Except when Microsoft does it, it doesn't get a whole article written about it ...
Women fear Open Source?
"In working with women in open source, the Ada Initiative found that many women are reluctant to post their code publicly when they are first getting started in open source software. This reluctance has good reasons behind it: fear of being told they are bad programmers, fear of being publicly mocked or harassed, and even fear of losing job opportunities. All of these are greater risks for women on average than men", Ada Initiative Blog
Ban this UNIX malware !
The solution is obvious, immediately ban all this UNIX malware !
Witness the creation of an Internet meme ..
Nov 07 2012: "I think Apple has peaked and the story of the next few years will be one of a slow but real decline", Dan Crow
It is true that the desktop market is in decline and Apple (and Microsoft) will decline if it sticks to selling desktop computers. A wiser solution for management is to invest in content (movies, television and games) and delivery systems (very broadband), a bit like Microsoft is doing with the X-Box. The difference being that Apple isn't leaving the Intels, the OEMs and the reseller channel behind ...
Standard essential patents are crucial in technology?
Far be it for me to defend the Microsoft legal department, but is there anything in the X-Box that MS engineers stole from Motorola. If not, then what the heck are MS paying for their FRAND license?
`Standard essential patents are crucial in technology. They are maintained by standards-setting organisations, who seek commitments from companies to supply technology fitting these standards at "fair, realistic and non-discriminatory rates" (FRAND)'.
Would you please not parrot wholesale, publications from the Microsoft legal department ...
"The court case started in 2010, when Microsoft claimed Motorola had breached its FRAND obligations"
Actually the case started whem Microsoft sued Motorola over breaching Microsofts' Android patents ...
'Who was it who ran away from the Circus to become an accountant`
33,000 pieces of malicious email a day
"The UK government is hit by more than 33,000 pieces of malicious email a day, ranging from casual phishing to targeted espionage attacks."
Who is is going to protect us from this UNIX malware?
Unity Dash ..
Is it possible to permanently disable Unity Dash, personally I'm on Lubuntu 12.10 ..
Re: the lefties at the BBC won't like it
Open Source isn't leftie, it's righty, it's right of libertarian ..
High-frequency trading ..
High-frequency trading, the devils tea ...
Re: As a microsoft stockholder.....
"As a microsoft stockholder.....With serious numbers of shares"
As a stockholder you should be concerned that Microsoft generates more revenue from its competitors mobile OS than they do from their own Windows phone ...
Insert Android malware FUD ..
Who does one sue if this malware results in loss of confidential data?
What is the process whereby *.APK files get executed from email attachments?
Microsoft Android claims ..
"Redmond has successfully argued that Google's Android OS is full of Microsoft-owned technology and has bagged cash from major fandroid firms including Samsung, LG and HTC"
Microsofts patent claims against Google have never been successfully tested in a court of law. Who knows one day there maybe an undisclosed balance-sheet liability in relation to the Android 'revenue'. There's a wiff of desperation about that whole strategy.
Re: What big teeth you have grandma
Lets hope he's better at security than email archiving, considering all those incriminating emails that went "missing" on the way to India ...
ps: for f**k* sake, this is 2013 and we're *still* warning people about email attachments ..
You can't just say don't open PDFs?
But you can say don't open PDFs under Windows ...
`One of the firms providing technical tools in the area, PhishMe, will be talking about how what organisations can do to train their staff on how to recognise phishing scams and how to prevent them"'
Buy a computer that don't execute native code from opening an email attachment or clicking on a URL ..
mod-down quick :)
Strain of stockbroking malware ..
Who is is going to protect us from all this trojan UNIX spyware ..
Microsoft Guarantee ..
10. LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. You can recover from Microsoft and its suppliers only direct damages up to U.S. $5.00. You cannot recover any other damages, including consequential, lost profits, special, indirect or incidental damages ..
Magic unknown protocol malware ..
Who is is going to protect us from UNIX protocol malware?
The fragmented nature of Android?
"the fragmented nature of Android along with withdrawal of Adobe's mobile flash support appears to have made development difficult"
I'm confused, since the difference between different Androids are mostly cosmetic, how would this negatively impact the developer lifecycle?
- FLABBER-JASTED: It's 'jif', NOT '.gif', says man who should know
- Analysis Spam and the Byzantine Empire: How Bitcoin tech REALLY works
- VIDEO Herschel Space Observatory spots galaxies merging
- Apple cored: Samsung sells 10 million Galaxy S4 in a month
- Geek's Guide to Britain INSIDE GCHQ: Welcome to Cheltenham's cottage industry