Why does samba need root?
816 posts • joined 7 May 2012
Re: I don't understand
It failed to check that an alternate browser was available.
Re: "...then reinstalled NIS..."
Don't be so harsh. People reset their computers back to factory image* from time to time.
* that is the only way these things get installed right @
Re: Going to ignore this until it has a catchy name.
Something like DEATHNEEDLE and I would be all on it. PRSSI just sounds like one of the cards on your motherboard.
Re: “the most significant advance since colour”
Also, it is just a stupid statement full stop. As we become capable of squeezing more pixels into an LED display, matching those additional pixels with more from the source rather than an upscale is at best an evolution rather than a revolution.
I mean if you want tangible improvements, look at increasing the effective frame rates of the broadcast.
Re: OEM encryption
My customers trust me with their data. In turn I do my bit to keep their data private in the event of a theft.
The data itself is worth orders of magnitude more than the hardware it sits upon BTW.
I hope he gave them 90 days....
Re: If you want to mess with them
Or, you know. Fire up curl and send random crap in the right structure.
The binary blob is likely to be one of the standard formats.
Re: One born every minute
Well I, for one, am definitely attracted* to these types of cable!
* with a force proportional to the product of our masses and inversely proportional to the square of the distance between us.
> to legal counsel
They will clearly need a crack defence team to argue their case for going 'round corners. I can't imagine a better place to source such counsel.
Re: We really need a reference Usain
That is quite a lot of him. Of they were all carrying a DVD it would leave gfast for dead.
Easy, there's a USB port in the dash. Open the door, plug it in and it will start to draw power. This should provide enough charge to fire up the phone. You can then launch the app, open the door, plug it in and it will start to draw power. This should provide enough charge to fire up the phone. You can then launch the app, open the door........ Stack overflow
What's the El Reg stance on https?
Problem is that they are mostly Queenslanders so it is a bit hard to tell.
Half term Tony trying desperately to get anything else on the front page.
Any backup must be considered as of unknown success until you have successfully restored it to another machine.
If you go 6 months without noticing your backups don't restore with the encryption keys you hold, your problems are deeper than ftp passwords.
A good point. This sort of authentication is not designed to be a primary authentication because you really couldn't tell whether to let them use the computer until after a length of time. Generally speaking, you want someone to authenticate before they start using it, so I see this more like a mechanism to protect workstations where the user has wandered off without locking it. As a secondary measure, it would most likely be quite forgiving to minimise the false positive rates, or could work with tertiary measures like activating the webcam for facial recognition when it has a doubt.
The point about the arc refers to the fact that it is very difficult to move your mouse in an absolutely straight fashion due to how people usually hold their mouse. The size of that arc would depend on a number of factors, such as how you grip the mouse, your usual posture and what part of your wrist is still in contact with the desk, the size of your hands etc. Also, the basic direction you move would influence the extremeness of the arc (which would go back to whether you hold it square on or at an angle).
As a result, (in answer to your question) a relatively simple calculation could create a believable profile for pressing minimise or close. The end point and clicks would be chosen by the attacker, but the mouse movements would not raise any alarms because they emulate the speed and direction such a user is likely to take. The easiest attack vector I can think of is to send some exec a "free mouse" and embed the attack code within it.
Wouldn't this be fooled by recording of mouse movements. I can imagine the following data points without specialist mouse hardware.
* the rate of acceleration and deceleration as you move from the original cursor point to the target.
* the angle of the arc of movement between the two points.
* the delay between movement ceasing and clicking
* double click profile (time between each click and how still you can keep the mouse)
OK, so plug those into some algorithm and give a score as to how likely it is the same user.
Now do all that again and imagine some malware software is recording your mouse movement profile (could even be embedded in a freebee mouse). A vnc style piece of software could after not too much time now allow you to perform an action but instead emulate the recorded profile in those actions.
Not as trivial as a rainbow table, but if these techniques take off you can bet such tools will become available.
Re: Much complication.
The creators of the transaction are not only the customer. Equally without the vendor, no such information would exist. The vendor will provide a receipt if you want your own record of the transaction.
More interesting, unless you opt out, Google will track your location via your android smartphone through location history. They would be in an amazing position to track the movements of customers over time through various businesses. If they play those cards right, they could well and truly beat the financial markets at their own games.
Re: It's KW
>I think even a tiny electric car might take a few days to charge at 3W
But on the bright side, at least it could use a standard USB charger.
Just because they provide updates doesn't mean you should install them. Some of the older models that scrape onto the list of compatible devices work so slow you will soon need an upgrade.
>The nature of a circle means that adding 1cm to a 2m turbine blade increases the catchable wind by almost half (4.52sq m compared to 3.14), while removing 1cm reduces the harvested wind by half a square metre
Not the circles I am picturing...
So firing up fiddler and, um "doing research for your story" eh?
Re: Some wierd assumptions
Plus the assumption that you run a data centre but would have to call a guy in to replace the drive?
Re: So is Firefox safe or what?
The problem isn't so much the browser (or they would just update it in Google play or advise you to use another browser). The problem is that the WebKit rendering engine is used by apps to integrate web content into a regular app. Most commonly, this is how the ad supported apps show those ads, but there are also things like phonegap which lets you wrap an html5 website and deploy it to the various app stores in what appears to the user to be a regular app on their platform.
We are in a state where a dodgy advertisement on a free game is a relatively easy attack vector but Google won't fix it.
Not good enough Google!
(Posted from my Nexus 5 running lollipop)
Re: Wait 90 days and publish the exploit?
Came in here to find this comment. Was not disappointed.
Re: Wouldn't this problem take care of itself?
You have to keep an eye on the drop bear with a selfie stick. That never ends well.
>That said, 8EiB is about a couple orders of magnitude or so higher than even today's high-end RAM usage.
And the fart of a flea is also a couple of orders of magnitude quieter than a jumbo jet at take off.
The 64 bit address space is really big .
The Titan supercomputer at oak ridge is the current largest by RAM. If you decided that you needed you needed a million times more RAM to play the latest version of Crysis, you are still an order of magnitude from running out.
>Because 64 bit software support is only going to last so long.
May I make a bold prediction;
16EiB ought to be enough for anybody.
Re: Apple Worried, more like happy!
Not all android is Java.
Re: People still buy travel insurance?
Mostly to get you first world (or as close as available nearby) hospital cover if you fall ill or get injured abroad. Some injuries have long recovery times and prevent you travelling home on your cattle class tickets.
Shirley they could have used more understandable units of measure. I mean we all know that hair driers need a lot of energy  so saying that could mean anything.
Why not just state the number in terms of how it compares to the power used by a London bus to drive one beard second.
Re: Lacking history
I just learnt something today from a cat on the internet.
Re: Acronym fun
Seems a good candidate for Total Inability To Support Usual Performance...
Re: Microsoft FAIL
Re: Necessary sacrifices
I, for one, welcome our new <noun> <adverb> overlords.
Already happening I'm afraid. Some well known technical news sites based in the UK don't even use https in their comments section.
you miss one important differentiating feature
With a Mondeo, you need to find a marked car spot at B. With the others you can just use the dual purpose indicator stalk and stop your vehicle somewhere you find convenient.
I just hope they have the good sense to check the el reg forums before they waste any more money.
Re: So its more efficient in the use of fuel
Yes. Methane is a particularly potent greenhouse gas.
.... where his pennies were spent?
Re: How come...
If the alternative is FireWire then USB is definitely more secure (can't bypass OS and read all RAM directly)
Hey, I am not defending them, just pointing out the real world problem. I am sure the newer machines have some sort of counter measures (like how server class machines have alarms that record when the case is open, wouldn't be too hard to do the same when the service door was opened).
My guess is that the bean counters figured that the countermeasures would cost more to retrofit than they will lose to these sort of scams.
No, but the level of protection around the section housing the computer innards is nowhere near the safe/cash drawer.
Search on YouTube for Barnaby jack. He demonstrates a walkup attack.
It would be more convincing if their submission explicitly stated that they only sought permission to jam APs that purported to be associated with the hotel but that were not.
>Yep. I guess 'Woman Made To Prove Laptop Worked At Airport' wouldn't be as interesting a headline
Why does it matter if it works? What if it broke whist travelling? Let's say or wonderfully reliable SSD just gave up without warning and now you just see some text about missing boot devices? Are you supposed to their away your otherwise fine laptop? Are you supposed to fart around trying to sort out warranty claims whilst abroad?
Officialdom gone mad is the kindest way to put it. Time for hidden volumes when travelling to France I suppose...
Probably because you can reallocate that partition back if you were inclined to do so (just pray that you never need to reformat)
It is also because in one of those cases that is over 50% of the advertised space. A reasonable consumer expects a degree of space used by OS paraphernalia but not in that magnitude. They also expect that a 32GB device from manufacturer A holds roughly the same amount of their stuff as a 32GB device from manufacturer B.