Test max int, test min int?
Is that too much to ask?
1050 posts • joined 23 Mar 2012
Test max int, test min int?
Is that too much to ask?
As per above. If local physical interaction is ruled out, then gravitational is suspected.
I guess it's like looking at a pool. If you see a boat causing a wake, then that is obviously not the tide. The wind can be seen separate from the ripples from a stone. But of cause a lot of checks need to be done to make sure it's not someone diving under and playing tricks. ;)
Gravity is an observation.
Newtonian is the law and General Relativity is the theory.
Check out the story and wiki article on "former chemical weapons dump" come school. The question above sadly is not one many seem to understand.
But you first must sign over your land, family and fortune. But the food is certainly free.
It's fine to offer a service. However, there are many people making fraudulent claims. For someone to first ask to check if it is really what is on offer is fine.
Better they check now, than risk failure later.
I'd just like the correct language on the Steam pages. It keeps thinking I'm in some other land (no, no VPN and no idea why it will not revert back permanently).
The routers name was Steve. He is now getting a very big telling off.
Yes. It is called 1 cable for power, 1 cable for data.
I'll get my coat. Because truth be damned to cost cutting and "progress" labelled over marketing.
I feel like they chose that because "Umbrella" was too obvious a give away if chosen.
Or worse, they were already using it!
My dear internet commenter.
Your worry is dreadfully uncalled for. Why this new age of entrepreneurs making things of the internet is to bring in great markets and wealth. We would never rush anything out into the market before testing or that would be unsafe. And if we did, it would be totally the other parties fault and not ours. No, we can do nothing but sell more stuff.
Oh, and while you're reading, would you like to buy one of our new Radium Blankets? It's the latest invention and perfectly safe, we assure you!
Meh. I install, scan and uninstall. Rinse and repeat when needed. I use other products for real time scanning. (It's malware, not a virus scanner)
What are the chances of something going wrong in that timeframe and not getting spotted and announced as a warning for me to wait until the next update?
Pretty soon with such coverage, the spooks will be able to tell you if Orwell is spinning or not...
Using smoke signals to get your emails?
Mine is the one with the mobile in the pocket and unlimited data...
Which is why I'll never migrate over to Linux fully. I make too many typos.
It's always the user at fault. There is only one user with Windows 10... Microsoft.
(What, you thought you got to decide what it was doing? ;) )
Thanks for the info. But your still making the mistake of speaking a foreign language to us Windows users/Linux newbies.
Saying "it's not a file on your HDD, it's a file with UEFI settings" is, read by a windows user as "It's not a file on your HDD, it's a file (on your HDD) with UEFI settings". Because to windows, all files reside on the HDD or RAM, and RAM is considered safe to clear (we do it when shutting down ;) ).
I think what you mean to say is that "It's not a file on your HDD, it's a file on your motherboards non-volatile memory [that is mounted by Linux in read/write mode] with UEFI settings". Or in the case where it's not the memory of the UEFI, but the live running command cue.
It's more long winded, but wow, Linux users make as many assumptions as us Windows users. Please help us migrate over, we know you have it better over there! (For most stuff. I'm still bitter over the file system. :D )
Thanks to Adam 52 for making it clear.
Sorry. "Everything is a file" is really really annoying for people like me. It's a mouse. It's a keyboard. No, there are not 4 lights.
Until MS roll an update to change the UEFI... oh, lost your Linux? MS will consider that an upgrade.
Great. Now you've just doomed all the tech support guys to scuba lessons!
Can you guarantee your mirrors are 100% non-bias?
As the antimatter-matter imbalance exists by some unknown method, we could still find bias. But it'll be close enough. :)
You joke, and I may get sternly corrected for this...
But some mathematical analyses is possible.
Say I try to zip a text document. I then try to zip some random data generated at the same bit length.
I would need to check the text document against quite a few random strings, but the text document should show its self to be more compressible than a random string <on average>.
This is of cause not true for other things, like video, as it may be compressed in a lossy method.
Data with redundancy in it, is different from true random data, however data with little redundancy is very similar, or arguably indistinguishable from random data.
Our language has a lot of redundant data in it, so we can use that to find patterns, and match it to other exiting patters (that is, unencrypted it). Random data, by it's definition, is suppose to have no real pattern. (For example, if your rng gives out four 1s, four zeros then repeats, on every result, it's not random and giving out a possible signal. See XKCD link above! :P ).
Things like stenography can be detected when comparing to original source (if available else where) etc.
I read one paper, where random strings were used to test against scientific theories. If the random string did a better prediction, your theory would officially be "worse than an absolute guess!". :D
The end user is often unaware of what a fake is or how to detect it. They may even believe the shop they buy from is providing real products. In some instances even the shops get bad supplies through supply chain problems.
So, should the user, shop or manufacturer be responsible?
Attacking the fakes, is down right an attack on the consumer. I've taken to avoiding most systems like this (game consoles, blu-ray drives etc). I've long ago avoided fakes since I was a kid, but I don't want the problems when I find out the device bricks its self through a failed DRM check. Because it will do so, with legit products, more often than the real "hackers" who can just mod/chip the device and be fine.
Most real counterfeit operations have no to zero problems with the DRM/checks. In this instance it'll be rather easy for the counterfeiters to just run a driver of one version less, and strip out the DRM checks.
1) Define your branded TV/Computer as only being "official non-counterfeit" if plugged into your own branded mouse/keyboard etc.
2) Fry anything it touches that is not wearing the brand, including users for breaking "T&C" and "EULA" and all your absolute control and rights!!!
3) Take in loads of new orders for components, as strangely the users own ones keep failing.
That is for insurance reasons. Credit cards insure the purchase. Cash, obviously, does not.
Credit cards if done right, give around 30 days interest free advances, can be much quicker than visiting bank, counting out 100s of notes, going to shop, counting again, and getting goods. Also allows for purchase over the phone/internet and saves the trip to the bank, as which driver wants to count £/$2500 for that new tv you bought at the door! :D Let alone take it back in a van marked "I'm carrying lots of cash and TVs".
But then again, debit cards can do a lot of that. It does not need to be a credit card. Just a trusted money transfer system. Which with banks is cards, and online is paypal... no wait, did I just say paypal is trusted? ;)
Coat, as mine is the one with a big wad of "iou" notes.
No offence, but if there is a raid on a physical bank, I'd expect similar. Safe, but some understandable interruption.
Just as it's somewhat impossible to stop all attempts at physical theft, it can be rather hard to stop all types of online attacks.
It's how you deal with the situation, how you try to prevent/reduce the impact and how honest you are to your customers.
trained dog not be a better option?
Thanks for the downvote, whomever did it. :P
But yes, is /should/ stay turned off. Things like the Avast app can turn it back on to check for anti-theft/lock requests
Previous versions of the OS "KitKat has a feature where, when Wi-Fi is turned off, it periodically scans for networks to allow Wi-Fi-based location detection to work."
Yet more network providers may add their own apps to turn wifi on when they want updates and/or check for voip etc or whatever they decide is in vogue this week.
You'd have to checkup AFAIK. Depends on OS and manufacture. Is it really an airplane mode? Can Apps override it? Does the OS override so as to check for updates etc?
Have you installed the app, and is it tracking offline via GPS and/or other means (though very rare and too hard to do outside of the spooks/University experiments).
IIRC your wifi is never "off" on modern phones. They have the ability to wake it up and check things. Depends on manufacture and OS I suppose. Google like their data collection too, and other times it's to check for updates. But it's not unheard of.
The other thing is external tracking is not the same as internal. Some stores were spoofing local wifi/telephone masts (I forget which) to get tracking data on shoppers without the need for an app internally on the device. They just used normal triangulation and signal strength etc.
I'd not think it too impossible that Anon can track an antenna within X distance even when unpowered. If though they are doing anything more untoward, then more fool them.
It's the low handing fruit.
The first place off attack is usually the weakest. In a split OS, you have APP->Kernal. An attack hits the app, then you hopefully, still have the Kernal as secure, or just an "arms race" ahead of the attack.
With no split, any and all attacks can hit the Kernal as well as the App. So now there is more chance of a larger "hack" at your system.
Though it may just be a moving of the walls, instead of an obliterating of them. :P
As simple as proving they can see their own backs.
I mean, they got eyes, right? They also have very flexible necks.
I'm not saying they have not done the maths. Just that it may be clutching at straws to not go for the obvious.
For example: https://www.newscientist.com/article/dn27574-octopus-has-automatic-camouflage-thanks-to-its-light-sensing-skin/
The only way to know if it is a learned method, is to check with some captive lizards. Though even then, animals can be quick learners and improvise on the fly.
PS, yes I know they tested and found out it "cannot see". Call me sceptical. :P
Just Amazon and Paypal? How hard is it to rinse and repeat on burned accounts through Paypal if they get caught? If it's a grey enough trade, how long before customer complain, if ever?
Who gets caught? Lots of people. Many people just either don't understand the meaning or difference or risk of counterfeit goods (fake Windows DVDs) or just don't care (fake handbags).
Some will have no effect on the customer, except possibly a lower quality (fake handbag). But some could turn out to be a total scam (Fake Windows key, that just returns "not valid").
I've had the conversations, and it requires helping people to learn. Just because something is on the internet, and cheap, does not mean it's "real". But the temptation for a deal or a cheap purchase is so high.
They'd certainly get caught linking their laptop up to a TV, banned for "playing games on work equipment" and told to get the IT department to link up and Powerpoint slideshows for them.
Then while being walked out, asked "can you did give your password back to the IT debt so they can get those business docs out of your work PC?"
Most phones can work for over a week when turned off.
It's more worrying that water damage would get them in a real disaster situation.
But turning it on, then off, ever hour or so may be enough. Or a "endurance" mode and not using Facebook should be fine for receiving emergency communications.
And by "emergency" I mean the life and death type. The business call can wait...
The idea is bananas.
In a few weeks the security on that might be a bit stale.
With all the multiple users it has a high risk of catching some bugs.
They may have taken "code monkeys" too literally.
Finally, his project was never "Finnished"... it was "Danished".
"Any landing you walk..." um, "roll around the barge and explode from" is a success in my book.
Depending on the quality of the scan/text could you not drop the colour bit depth to 2? Should remove anything within the black squares. If it does not, it would be obvious and could be redone.
OCR is sometimes possible for the recreation if your printing to a hard copy.
Or as I posted above, is copy/paste to a notepad then redacting, then back to PDF a solution? You loose some of the formatting, but retain all the content and it does a similar job to the paper and scissors.
Funny you mention cut and paste in notepad to recover redactions... it would also work for making them and proof checking.
Copy to notepad, redact, paste to new PDF (to remove any possible "tracked changes" and other malarkey software can be "automatically" helping you with).
It's really filmed in a giant swimming pool!
(No, not the black helicopters icon!)
I prefer NCIS https://youtu.be/1Y2zo0JN2HE
It's probably par for the course.
It's just a communications method, and it gets the programmers/publishers out of a legal loop should someone accidentally post their credit card number, home address or last nights fling in the chat.
I think batteries win on this scale.
Larger scales a fuel cell would.
But petroleum wins every time. (Not sure in this case they can make the engines if it's not a helicopter design)
Did they not show a video of it flying with a passenger?
I agree it's still a concept. But a very good proof. Though as further up, some other designs are competing and arguably better in safety (parachute for total power failures).
I agree with the above, that presumably, the correct way to do it would be with a form of public key.
So both you and the trusted other need to generate keys and encrypt the passwords. You have a private master key, that decrypts by it's self. You also have a public key.
Your trusted other has their own private key. You also give them your public key. Via some clever maths, the vault can be locked with your two keys, and unlocked with their two keys. They only ever have their private and your public key, and always need those two (so MitM attacks are harder).
Though they will have complete access to your passwords/vault as the only thing preventing their keys from working everytime is the service provider checking back with you. Generally when you give someone an access to something using private/public keys it's because you want them to access it. :P
In an out of character defence, they did start on the right footing. The caching system only caches non-critical customer details. Those are always put through the proper channels.
However, some pages can be cached as they don't supply full/private details. This was the grey area that got hit with the wrong switch by a third party on one day of the year.
So a mistake and a fumble, but a good catch after it all. (I hope, for the sake of the customers)
Never. They already have the cash from marketing and data collection*.
*Not the private stuff, as I assume legally they have to not rifle through your files. But the non-private services, apps and websites they introduce will have FaceBook style data profiling.
(British plug and why!)
There was also the flash portal that loaded a full screen browser window and a working (simplistic) GUI of Mac OS.
Load that up in IE on a windows PC to see someone get rather confused.
Anything under a Grahams number is small really.
Oh, and if it's not over 50% of the customer, it's "most of our customers are well served".
Finally, if you sell one product, and sold one of it, it's the "biggest seller we have". ;)
Beer, because then I don't need my coat.