676 posts • joined 7 May 2012
>You're new here aren't you? Or at least don't visit much.
No, it appears that the poor chap kept a backup of his passwords in a photo in his iCloud account.
>At best, it would flag imbalance and cause seat reassignments shortly before departure (ie, chaos)
If only they were carrying hundreds of tonnes of some sort of liquid that could be pumped into tanks in different parts of the aircraft to rebalance the weight.
Still too frightened to go near the snakes and spiders in Australia though.
Re: So basically, MS says ...
>... clueless idiots running MS products are clueless?
That statement may be true *cough* TIFKAM *cough*, sorry had to clear my throat.
What was I saying? That's right, I think you missed the point. If say A! Company! Whose! Name! I! Will! Redact! So! As! Not! To! Embarrass! Them! stores your super duper unbreakable "wrong unicorn paperclip capacitor" password in clear text then it is compromised.
BTW, congratulations reg; nice click bait :)
> but what does Google get out of it?
I can't imagine any reason at all why Google would be interested in being paid to collect a continuous feed of low altitude high resolution images of populated areas....
>Could be talking about wine on Linux (or what the Chinese are planning for an "own" OS)
I believe that theory is credible.
>If you own both the OS and the application, it is possible to make the OS work for the application.
As a generalisation I agree, but this would hold more water if it was say windows media player being able to use hidden optimisations to improve framerates or reduce battery drain, or SQL server getting some unique filesystem priority levels not adhered to for other dbms, but we are taking about a productivity suite. If you think about its limited technical requirements, there isn't a whole lot of ways to cripple their APIs that would benefit Office without the commensurate disadvantage to other products Microsoft need to maintain a viable desktop ecosystem.
In terms of their Corel lawsuits that was quite a different story. The windows API was under active development and decisions could be made to drop or otherwise make specific calls suboptimal, and they could publicise them late in the development cycle for Corel for maximum interruptions and to give their own products an advantage. Completely unacceptable behaviour if true. But in 2014 I can easily write** an office competitor using Win API, .NET or Java and achieve a level of functionality and performance that Microsoft would prefer wasn't possible.
** actually, I couldn't, lacking the will, money, patience and expertise to undertake a project at that scale, but the point is that no magic API would ms office a measurable advantage.
I may be a bit slow, but as a developer I am struggling to think of any office feature that requires anything resembling a secret undocumented API call. The inputs are all keyboard, mouse and filesystem calls. The outputs are all canvases (screen/printer). The functionality whilst broad in reach with a feature set as long as your arm is not complex at any functional point that I can see.
It is fair enough to criticise their not so open document formats but this argument about hidden APIs doesn't seem to hold a lot of water.
Re: Kickstarter space shot
Too late. Half of them are already there.
Re: Something for the weekend?
^ what he said + on a mobile device.
And off to the patent office for me too.
Re: Dust removal
>As for wipers I suspect they didn't want to scratch the cell surfaces which is what wipers in a dry dusty environment will inevitably do.
Maybe it could just find some water then use that. Two birds and the rest.
Re: Seeing as Android is a (1) malware magnet (2) blatant iOS ripoff (3) fragmented mess…
It's a phone, dude.
Dual boot option? I would love to see a touch enabled version of grub.
Re: Fail. Fail. Fail.
So your saying there's a chance.
BUT, er Team Australia!
> dubs it "Revision 3" of the B – rather than an updated version.
I think I will wait for Revision 3.14 myself.
Re: That's not how it works
For what purpose was he granted security access other than his employment contract defining his responsibilities in such a way that he is permitted?
That is not to say they need to delete his identity records or confiscate his cards but a process wasn't followed. In this case it appears benign but they need to look at how this happened to avoid future cases where it is not 5 days and the contract is not being renewed.
Re: Alternative story if it worked
Or ASIS reports best ever productivity figures after management unable to interrupt for a week.
Seriously though, it would be entirely appropriate to deny access under such a case and failure to reject access should be seen for the security lapse it could have been. Who else "can't access" their systems?
Any suggestion about what this does to the repair costs if they get busted in an accident? (Even if you don't plan on having one, it is one of the factors that goes into the spreadsheet to figure out your insurance premiums so it still matters)
Re: New user interface ...
I have no clue what you guys are saying.
Re: I'm a Nespresso fan
I love a fresh ground coffee too, but I always found myself in a bit of a dilemma*. There is frankly too much faffing about to grind, warm the machine, clean all the tampers, filters, jugs and steam wands to make it worthwhile before work. So it used to be a weekend treat for me to make it. The problem is that anything pre ground would go stale well before it was used and I wasn't as happy with the el cheapo grinder which was too course for my preference.
I ended up buying a nespresso because it gave me something quite tolerable with the convenience of instant. I won't pretend it is the best drop that I have ever had but it is better than more than a couple of "baristas" have given me over the years.
*first world problem, I know
> Why on God's green Earth does someone, anyone, actually want to run _iTunes_ on a _Windows device_?
Apple must think that their customers are too stupid to get music and video onto their iThings using copy paste like the rest of the world.
Re: Hello pot, this is kettle...
> There is one and is called "Windows Installer"
Windows installer is not the best by any stretch, but that is largely irrelevant to this discussion because we are taking about repositories not installers. An installer is not fundamentally much more than a way to check for prerequisites, stop services and to copy a few files around.
An uninstaller is just another application which in theory reverses the process*
There are some important features of an app store not covered by windows installer.
- locating an application for a given purpose.
- visibility of user ratings and popularity
- being sure of the legitimacy of the download link
- buying it.
- knowing about and receiving updates, service packs or hot fixes.
As it stands in the windows world, you get each vendor coming up with their own half baked update mechanisms. Half the time they don't work (HP/Intel), and the others are a mixture of annoying popups every few days (Java), trying to sneak other software in during a supposed update (anything Apple). There are a couple of not to bad ones (notepad++) but they are few and far between. It just doesn't make a lot of sense to compare a store with an installation mechanism.
*unless you are Symantec where it is purely cosmetic.
Re: Hello pot, this is kettle...
>It means you can go to a single place to get all your updates,
Is that like how you can upgrade from windows 8 to 8.1 by going to the store and pressing download, and how you don't need to go to windows update to download all the windows 8 patches first? Oh wait...
Re: I do not install anything asking for this permission
>The noble idea of app permissions is flawed by not being able to revoke them individually at install time or afterwards.
It would be a good start to be able to eliminate search results in play store by requested permissions.
Tassie has a small population and a struggling economy. Hydro everywhere which would be a plus. SA has a lot of wind power and is a much bigger market.
Between Sydney and Melbourne would give pretty close to half the country's population, the main downside is that Victoria has some of the dirtiest power generators around so any Tesla sold down there would be worse than a large SUV for CO2. Plus a large amount of that capacity will be sold off cheap now some smelters have closed down.
Re: Legality ?
>When there is no password set, VNC simply connects and shows the desktop. It is therefore available to the general public in exactly the same way that a public website is.
An unlocked car whilst foolish is not an invitation to hop in. An open front door is not an invitation to wander in and take a photo.
I suspect that the researchers are probably (in the IANAL sort of way) OK to establish a connection to these computers, but taking a screenshot is both unnecessary from their research point of view and moves well into privacy violation territory.
Re: Ooohhhh! A terrible attack is available in the lab !
Whilst it can be defeated by HTTPS, that isn't really the ideal technology to transfer large files because it limits proxy servers' ability to serve those downloads. The server is also then encrypting each packet in the file with the session key which is even more overhead. Publishing the sha256 hash of the download is much more efficient. The main problem is that if you can intercept the file download it is trivial to intercept and change the page with the expected hash. That page could be delivered over https.
Apple are terrific at many aspects of industrial design. The mouse is not one of those aspects. I am sorry but how long did it take before there was a right click option; and even then it was the right click when you are not having a right click, like someone philosophically opposed to such buttons saying well if you make me put one on then fine but there is no way my mighty mouse will have any visual cue to show where that button is.
And finally, the puck mouse! Not only the worst design of anything in the history of the world but it had a cord; meaning that the poor soul who had just been driven mad trying to use it was at high risk of using it to strangle someone.
Re: Standard Windows timings
>Windows 8.x seems to improve this though, grabbing and applying updates post-install seems to be much improved
Funny thing is that my memory of installing 8.1 involved first applying about 1GB of update patches before it would let me download the upgrader itself (only available via their windows store BTW) which then proceeded to basically blow away and replace with new versions all of those files it had just demanded be installed.
Incidentally, I don't remember win 7 taking as long as OP suggests. Maybe I spent too long many years ago fighting each machine that was loaded with either 2k or 98 where upon install you had to find another machine with net access to find your network drivers before you could find your video drivers so you could get out of 640*480 mode... fun days (and at the time Linux wasn't much better; the initial install was seamless in comparison but there was always something that would take days to get working.)
Re: Possible solution?
>The Server could encrypt pages using a user-provided Public Key.
Sure could. How do you validate that the server you sent the public key to is the right one? A malicious server could substitute your public key with its own, talk to the real server, decrypt the website, then re encrypt it with your public key and you are none the wiser.
>nmapping the internet is a fast way of attracting attention, no matter how stealthy you might think you are.
You are right, but I highly doubt that the port scan is happening directly. They would already have a botnet which would do their dirty work.
/applies tin foil
I am sure when they managed to take over the cryptolocker C&C servers they just shut them down without pushing their own malware into hundreds of thousands of machines.
Re: Pop goes Samsung's glossy image.
A fair comment. My recent experience was the opposite. Bought a new HP ultra book which refused to activate. Went through the reset my PC (that is the new lingo for reloading the original image) to no avail so I connected to their web support portal thing. They* were utterly useless and just kept advising to reset the PC to see if it fixed it. The third technician to get involved even offered to "generously" post out a recovery DVD (all I needed to do was buy an external drive).
It wasn't until the local outsourced repair company got involved that the problem was fixed (and they actually turned up when they said and returned phone calls). The difference was night and day. So I guess YMMV.
*Yes I know the web support is also an outsourced company.
Re: Fiddler2 is a useful tool
It is very useful, but now it is owned by teleric it is only a matter of time before it is EA-ified.
These guys owe me a joystick after the control schemes they came up with.
You must be new here. Hi, I am Adam 1.
Re: We're gonna need a bigger hard drive...
>how is that kind of bandwidth possibly handled?
I imagine frame to frame compression would be amazingly effective at that frame rate.
Re: We're gonna need a bigger hard drive...
How long before this technology is used to film cats?
Re: Pete 2 One Tip...
>Once the sender and/or recipient are identified they can simply move to either a warranted search
I have no problems with Spook's executing warranted searches with proper oversight (like a judge). It is the wide scale untargetted fishing expeditions that grossly invade the privacy of everyone where I disagree. If we are going to start (continue?) to track everything about everyone then we put in place the key infrastructure needed by a police state. You had better make sure that the risks and substantial costs are worth it...
Re: It was inevitable.
>Cracked, hacked, decrypted, recovered keys, i dont give a monkeys HOW it was done. But it was..
Thief 1: We managed to crack the uber secure super vault.
Thief 2: Awesome! But how? We have been trying for years without success. Even the cops and even three letter agencies haven't been able to get in! That is a game changer. Can you describe how you did it?
Thief 1: We found a spare set of keys in the wife's handbag.
Re: Abbott is a complete and utter incompetent
explained his plan to attack the youth unemployment issue on regional centres by funding training and apprenticeship programmes as well as university scholarships and business incentives to come on board, financed by phasing out tax concessions to superannuation income over $200000.
(No, he didn't suggest this, but I surely proved you could be surprised by the end of that sentence)
I laughed out loud literally after watching that interview with David Speers. Then I remembered that this is our AG so now I am just depressed.
I didn't but that's OK because someone else did.
Or to be able to use the phone while overseas without the extortionate roaming charges (especially for data).
Even if they do want to root their phone, why is that a problem? The vendor can refuse a warranty claim if the problem can be shown to be caused by the rooting process. Piracy is a problem with or without this law. The piracy problem was not solved for the 18 months when it was banned so why would it be solved if the ban remained in place.
Re: I always figured the plan was:
I think that was the original thinking but they discovered they didn't need to do steps 1,2 or 3
Re: re:- " Brits don't like us because we don't use the letter U in every second word..."
> Admittedly the US did turn up - late both times - but only after agreements which effectively neutered the resolve of the "Brit's", and then only to protect US economic expansion.
Hmmm. Normally it is the residents of the land of the free that I seem to encounter who don't seem to know their own history but love to point out the failures of others.
While yes, the US took a long time to realise that an isolationist position was untenable, I suspect that a certain nation behaving like dicks in the Ukraine at the moment might offer a slightly different viewpoint about the length of time taken to open up the western front. The alliance with Stalin was never more than that of a common enemy and from a British point of view it was preferable for the Nazi and communists to be killing each other than to become another Spain.
If only there was an operating system that could run on commodity hardware where the source code and complete build chain were open source....
>And Apple with their Itunes and Ipod with integral hard drive that has a facility to store a complete CD in a lossless format from my home collections of CD's are not included in the law suit because?
Simples! Those record companies are just waiting to be sued. Have you not seen the round corners on the typical CD? Has a CD never stopped working because you were holding it wrong? Apple have them over a barrel!
- Review This is why we CAN have nice things: Samsung Galaxy Alpha
- MEN: For pity's sake SLEEP with LOTS of WOMEN - and avoid Prostate Cancer
- Ex-Soviet engines fingered after Antares ROCKET launch BLAST
- Hate the BlackBerry Z10 and Passport? How about this dusty old flashback instead?
- Apple spent just ONE DOLLAR beefing up the latest iPad Air 2