Re: after Lockheed and Northrop Grumman won the 17-year "partnership"
Perhaps because no-one in Government IT can write a contract worth it's salt.
175 posts • joined 17 May 2012
Perhaps because no-one in Government IT can write a contract worth it's salt.
.... to publish te wifi name and password.
Of the time of the Hurricane in '87. I was at hope wondering how to get the tree off my roof. Got a phone call from the office to tell me that one of the data centres was down (yeah, that's the one that had no electrical backup).
I told the lowly IT bod that I could not make it, and that he should go round the systems and turn all the power switches to off. And to only turn them on, one by one, when the power came back on. Of course, he was overruled because "when the power comes back we need all the systems back on line quickly".
Well, the power did come back on. Fortunately no-one was in the computer suite at the time. This was the time of Vax's, with those old disk systems that look like top loading washing machines. They all power up at the same time. About 40 of them. And there was a huge power surge that the power switch board really didn't like. So much so that it leapt three feet off the wall and fused the whole building.
It took us three weeks to get that lot wired up again!
I resigned shortly after this.
Video now says it's been removed.
That is all.
We want a play mobile recreation.
Ah, I see you have the old head-in-the-sand approach to security.
Everyone says that "this is a bad thing", but because you don;t understand how the M-I-T-M attack works and why a compromised root CA cert is not a good thing, then it can't be a problem.
Tell me, out of interest, are you related to the e Ravenous Bugblatter Beast of Traal (such a mind-bogglingly stupid animal, it assumes that if you can't see it, it can't see you — daft as a brush, but very very ravenous)?
Before you do, take the 1990's style blink tags off your web page. It's horrible.
You sir, owe me a new keyboard. Mine is covered in coffee.
You would expect that GCHQ would really want to build underground, thus avoiding any prying eyes, long lenses, or ARIEL photography.
All big spy organisations should have an underground lair
..... and a man with a monocle
..... and a white cat. Got to have a white cat.
Some time ago, got to be at about 20 years, I was involved in putting in an Energy Management System for the late lamented BNFL. Due to some incompetence of the prime contractor for Sizewell B that was being constructed at the time, we almost scrammed the reactor.
Said top-notch boffin saw that we had established connectivity to the mock-up test rig at Sisewell. We were behind schedule (way be hand schedule) and left the test rig our end running through a whole suite of automated tests overnight. This being the Nuclear industry, they could afford the very best VAX kit in a clustered environment, with a wonderful custom made teak and mahogany desks, but not a lock for the computer room.
Well, the Americal white coated to boffin thought that, as we had a connected pc, he could rip it apart and clone all the other PC's from the hard disk. Which he duly did. And then powered all 8 of them on. All with the same network address.
The protocol was designed to check and double check that the reactor unit was going to do what you told it. So there was multiple challenge/responses, designed to ensure that there were no mistakes.
Boffin issued his first command. "Show Status". Reactor mockup says "I think you asked me to show status". PC 1 says "YES". PCs 2-8 all respond "What? no.". Reactor "Are you sure, you asked me to show status". PC 1 says "Yes, get on with it". PCs 2-8 all respond, "Sorry Squire, not us. You are under attack". Reactor: "Ok, I am under attack SCRAMM"
And that was when I got paged as to why I my companies software had tried to shut down East Anglia.
You refer to " three & four letter agencies (TLAs & FLAs) ". You should note that FLA is a TLA. Talking about a four letter agency as TLA is confusing.
The accepted term is that they are an Extended Three Letter Agency, ie an ETLA.
Fixed that for you.
"The Met Office makes use of a state-of-the-art climate model to provide near term climate
We Guessed (but used a very expensive computer to do it).
All models are just that, an informed guess. They are NOT accurate predictions.
"As it was mentioned by Anonymous generaly is a very bad idea to use mail server on a broadband connection"
Rubbish. I have a mail server, very similar to what is being proposed in the article, running at home. It is also an FTP Server, Cloud Server, Media Server, Shared folder server, etc. It runs on Broadband, is behind a firewall, and has a dynamic IP.
It simply works. Has done for years. It got fried by a power spike and took less than a day to recover from the encrypted backups on Amazon S3.
It doesn't get any problems with Google, Amazon, Hotmail etc. It gets tested once a week to ensure it is not an open relay.
And it hosts multiple mail domains easily.
Why do this? Because its my data, in my hands. If any three letter agency wants access, they have to come to me to get it, so I will know.
Just because you couldn't set it up yourself is not a reason to tell others not to try.
OK, I modelled so you could get in to el Reg again. So where's my fee?
After searching on a judicious typo, I came across Wind River, who sell a version of their Linux Kernel with an embedded GRSecurity module.
Where did that name pop up from? Or was it the standard "evil company" that is used as a general go to?
It's a cray super computer, as any fule nose
from 1996 - Now that was visionary:
"The Net interprets censorship as damage and routes around it".
Not sure if there is one, but I propose the micro-fortnight
If it is late, over budget and not fit for purpose, presumably the contract will allow the client to demand all money paid to be primary contractor (ATOS) to be repaid.
Wait - I forget that this is a government IT system and they don't do that sort of thing. They just ask the tax payer for more money.
A company I know has to keep ALL email, regardless of whether it is relevant, useful, incriminating or porn. This is done so that they can go in to court and say, truthfully, that all legal discovery is complete and comprehensive. This is a requirement for their business. It takes a lot of work (compliance, legal, operations, IT) to actually get an email deleted (like the one where bonus numbers were stored in a public store not a private one) and the culprit WILL get a disciplinary for needing this.
Yes, it would be a lot of data, but storage is cheap.
Nice to know the government that enforced this lives by the same rules.
Anonymous, because whilst I don;t work for the company, I don;t want my contact there fired.
My thoughts exactly. We only have their word that they do not store the key anywhere. So, when I encrypt an object and store it in Ireland, whats to say that my key is not unofficially backed up in, say, US?
As I have to manage the key, I may as well do the encryption phase before I send the object to Amazon.
To all you nay sayers, I have upgraded my system to LUbuntu 15.04 this weekend. I can't stand the Unity interface, but Ubuntu + XFCE is nice and clean.
No problems during the upgrade at all. It boots of SSD much faster than it did before. No major shakes. No wobbles.
Dual screen - working
LVM - working
Boot from SSD - working
UEFI boot - working
USB Speakers - working
Firefox - working very fast
Chrome - working
NASA SPICE - working
JDK - working
inet.d RPC - working
The ONLY issue I have is that my second screen, on VGA, does not go to sleep nicely. And I can live with that (because, be definition, I am not in the room to see it flicker).
As for SYSTMD, well, it is coming. I think it is better to get experience at the start rather the moan that its not like SysV.
NASA JPL has a suite of programs that go under the name of SPICE. Once you have all the space craft orbits (and manoeuvres) defined as a data files, it is relatively easy to to compute proximity at any point in advance. What would be needed is to refine these data files (known as kernels) on a regular basis,
Yes, a good, detailed, explanation. Worth the read.
Just finished one project where I did manage to get the hardware we needed without any fuss. Part of the justification was when I told the sponsor that the best hardware in the world would still be cheaper than the cost over run when he changed his mind because he hadn't understood the spec for the application (even though it had been explained, endlessly, as to what it did and did not do).
Project that is just about to go live we have outsourced to AWS. Best idea with hardware is to make it SEP.
Total Integration Test of System Uninterruptable Power
Kudos. Have a pint on me.
Where can I send my order?
He already has 8 year in chokey. The extra 4 are on top of that. The dont run in parallel.
Plus he faces deportation as soon as he comes out.
Before eMail, facebook, twitter, etc, there were other ways of terrorists communicating: face to face, letter, phone.
Phone's they could tap, but they needed a court order. IE, there was oversight;
People they could follow, but it required having those things call spies. But we all know that they can (and did) bug rooms, meetings, etc.
Letters they could steam open and read, but only if the tangos had not used some for of encryption or coding.
Now they are complaining because it is all too hard. This sounds less like a complaint and more of request for the latest and greatest super computer to crack encryption.
My fix was to replace the HH5A with a TP-LINK TD-W9980 N600. It was a £66 pound fix, but the reduction of grief from the family made it worth it.
It was simple to install and get going. I took all the documentation and the provided CD mini disk and through them away. Install the hub, navigate to the suggested URL (http://tplink.local I think) and turned on the network. You need a username and password. The username is firstname.lastname@example.org and any password will do. Add a password for the 2.6G and 5G wifi networks and your done.
This plugs directly in to the wall socket, mines next to the master socket.
And now, for the first time, I can have DHCP with a set of DNS resolvers that I choose, not which BT force on me. I wish I had this hub years ago,
He was lucky. In the 87 Hurricane I was stuck at home, but still had a phone working. I called the office, and yes, they had lost power. I talked to the data centre manager and told him, very clearly, to flick the power switches on the disk packs to off. Then, when the power came back, switch them on one-by-one.
He ignored me. When the power came back on, 40+ disk packs all tried to power up at once. The mains switch gear objected to the sudden surge in current demand and decided to leap two foot from the wall with what I am told is the loudest bang anyone could remember.
They were out for two months before they could get a new set of switch gear.
Oh, I don't know. I work in a trading company. One of our key decision making tools, that lets the trader know what is going to happen, was down. At 11:30 AM the lead DBA decided to go to the gym. When he got back an hour later, we were still struggling with the database. At 4:30pm, with the system still not running he decides to reboot the database server and go home.
I went off like a rocket when I found out. Unfortunately I was not given permission to apply the firing, or even severe boll***ing he deserved. Got to love management.
"It is enough to make you believe in retroactive abortion."
You owe me a clean shirt for that one!
At least its doing something useful.
And if you find that doing evil is profitable, then use the law to tell the DA that you can't release documents showing you did evil.
That's the beauty of standards. There are so many to choose from.
Imagine the uproar you would get if you said every man, woman and child must carry a tracking device by which the powers that be can know where you are at every moment of the day or night. Unthinkable.
Invent the mobile phone, make it sexy, in pink and an "i" in front of its name. What's that, you want two?
Oh, but that's all right, you can track children when they go missing. And we will only ever use it when it's necessary. Yeah, Right.
It always was so, I have seen MI5 enter a telephone exchange to bug a terrorist in the 70's. I worked in a telco in the 90's, where one of my jobs was to store all the call records of who called whom and when and for how long
Facebook goes down and won't update news stories.
BBC: STOP THE PRESS, HOLD THE FRONT PAGE! This is a TOP NEW STORY.
Oh dear, overreaction anyone?
Mines the one with "YouTwitFace for Dummies" in the pocket.
That is all.
Lets not restrict this to the USA.
I seem to recollect one A. Blair and the 45 minute Dodge Dossier.
Politicians Lie - no shit sherlock
You make rum by the milk barrel full? That is impressive. Can't wait for my son to get the wrong one when making coffee on his way to work!
In my first job, as a programmer on a VAX11/780 we had the first purpose built computer room in the Old Trafford part of the company, along with its very own AirCon system. I was there early, went in to the machine room to change something and immediately noticed that rather than being icy cold, if was damn hot. Cue call to the guy responsible for building the room and project managing the full install, who rushed in, diagnosed the problem instantly, It was the desiccators that has locked the wrong way, and instead of pumping cool dry air in, they were pumping warm wet air.
He fixed the problem straight away, reversed what ever was going wrong, and cool air flooded the room. Only problem was it crated a fog in the room! The picture of the room through the glass windows, full of fog, with us two unable to see a foot in front of our faces must have been wonderful.
"Say something againt Google, and you get a lot of downvotes", And hey, you got a down vote. Presumably by someone who had to google "avidity".
So have an upvote to balance it out
"I'd be willing to bet that the big scale stuff is disguised as company purchases for intangibles (IP payments perhaps) and looks like any other sales ledger unless a forensic accountant gets her hands on the books."
The correct phrase is non-broker commission.