1340 posts • joined 7 Dec 2012
Re: A while back
Been used for thousands of years to treat diarrhea diseases, including cholera.
Bedouins were known to pop camel droppings to treat diarrhea, to good effect and such usage was documented and revived interest in the practice, way back in WWI.
Nuclear, just not uranium based
Thorium reactors would be less expensive, as thorium is less rare than uranium. Thorium reactors can also "burn" the waste of uranium reactors, further reducing long term storage.
There are now designs for intrinsically safe units, where complete loss of coolant wouldn't cause an issue.
Obesity is a medical term that has moved quite far from BMI nonsense
Moderate obesity has increased risk of diabetes and atherosclerosis. Severe to morbidly obesity have tremendous risks of both diseases and more.
So, how does this come into giving some credence to what was written in the pseudo-study?
Diabetes is expensive to treat and decline is either rapid or gradual, depending on glycemic control. Arterial disease is also expensive to treat and decline is equally variable, but metrics on efficacy are not especially great for various controls.
That all said, something will always kill us, something will always e expensive to treat. Well, at least until we develop some kind of post scarcity society. I predict one chance of three of that happening, slim chance, fat chance and no chance.
Well, my wife and daughters know my passwords
That came in handy in case I wasn't about to respond to an important e-mail and for the occasional file I may need from my computer and I was far away.
I also promised them to not tell my service providers when I pop off, so that they can access my accounts with ease.
That all said, I do believe that there will be a fine legal war between Google and Facebook upon my demise, for my data that they insist is theirs. ;)
More seriously, I imap my mail, so I then keep a copy on my local computer and back it up on a regular basis. I don't store important files online, they stay on my encrypted RAID arrays at home.
So, the worst that can happen if I pop off unexpectedly and prematurely is the vital signs failsafe monitor releases the laser sharks.
Re: A simpler solution?
When I need some privacy, I boot up Tails.
The downside is that TOR was cracked ages ago. Might gin my own up, based upon Tails, but using i2p.
Re: Isn't dark matter supposed to be mostly on the outer edge of the galaxy?
Naw, that's the evicted dark matter, as if failed to pay its galactic rent.
More seriously though, you're thinking of the dark matter halo around the galaxy. It's thought that dark matter may also be in clumps within the galaxy.
Of course, the entire lot is just a theory. It may be that the detected mass isn't dark matter in the form science thinks it is and that it's really Dalek invasion forces staging areas.
Re: Did you not get the memo?
I'll take mine in pieces, delivered to Mars.
Re: Dress code
Not the press, not feminists, the feminazis will be shrieking until the press arrives just to shut them up.
Re: The Leonid shower in full swing here
Well, it's cleared out where I am, but windy and below freezing.
Cold enough to say, screw that comet and its trail of rubbish.
Re: Information please
"The end of days finally arrives; the good are to be whisked off by angels whilst everyone else burns. So what do the most fervent religious types do? Commit a mortal sin."
Thereby removing the urine from the gene pool.
Re: Will not help you
"This is a classic big data problem, given a sufficient dataset you can nail pretty much any client if you can get a data sample near source and near entry."
Now, add in a nation state tossing tens of thousands of TOR nodes up and monitoring their traffic for analysis.
Re: earl grey remove battery
I'll be a bigger dick about it.
Want to prove I went to a tittie bar? So be it, you can also ask my wife, who was along with me. It keeps her unsuspecting and me honest.
Still want to play, Sonnie?
Re: Android has an answer
"My changing the IMEI had nothing to do with crime, just privacy."
I call bullshit.
Fuck with the IMEI, the cellular network rejects your attempts to join it, unless you forge it.
Of course, IMEI forgery was part and parcel of cellular telephone theft.
I am far from accusing you, only bringing an interesting and annoying legal fact to the forefront to remind all why IMEI is supposed to be not forged.
There are many, many legal reasons to do so.
Re: "What is done on US soil is completely legal"
"More seriously, how high up does a countries law cease to be? If you're in orbit you're outside of earthly jurisdictions, what about aircraft?"
Well, for a few ratified treaties, it's 90 miles for specialized things like space stations, GPS, etc.
For other ratified treaties, it's middle orbit, between geosynchronous orbit and low earth orbit.
For other ratified treaties, it's geosynchronous orbit.
For still other ratified treaties, it's "parking orbit", when a spacecraft is dying/dead.
Then, there is the *entire* space treaty that makes everything in space common to humanity, not a nation.
Meanwhile, you ignored the shit out of national airspace, which is also a ratified treaty.
An hence, is guided by legislated and case law, which means that what is in the air is in the air for all, you, me, the US government.
Do you want to deprive us all of air? ;)
More seriously, do look up US law, international treaties (they're far from difficult to find), international space "law" (there is no international law, only ratified treaties that have the force of law (which the US Constitution clearly states is so, second only to the Constitution itself (so, for the paranoid gun nut, an arms treaty cannot prohibit him his gun)). The entirety of it is in common English, with much of it being American English (as many US citizens can barely comprehend *real* English (I'm conversant, barely)).
"Companies are sensitive to that mood, and are responding - hence encryption by Google, MS etc."
Says one who is the village idiot on protocols of cellular nature.
the IMEI is key to communicating on an initial basis on a cellular network. That is an international standard.
Fuck with that and your phone will work only within the US. Foreign phones won't work in the US.
Real world meets the road.
Learn how shit works before you make an ass of yourself.
Once upon a time, people actually comprehended networking that they used.
OK, if you plug into a wired network with your PC, is your MAC obfuscated? Nope.
Your mobile uses an IEMI. that can not be obfuscated.
Welcome to the real world.
Beyond that, things get *really* complicated, to to international agreements.
For those in the US, that means ratified treaties, which the Constitution proclaims are the law of the land, only second to the Constitution itself.
'".....it's logging location data for every phone within range....." And where in the article does it say it is logging every phone? Oh, it doesn't.'
Actually, it doesn't say what you think.
It's logged as interesting or not interesting.
Much of the time, not interesting goes into the bit bucket, however that is not always the case.
That said, I really don't have problems with it. As in, if I were caught up in the unintentional dragnet, I know quite well my activities would clear me.
The simple reality for many would be, they'd accidentally be given an examination that they were unaware of that would qualify them for a security clearance.
Re: Nothing to hide nothing to fear
"Until your phone imei is often coincidently found in these fishing expeditions & you'll suddenly find you're self under increased scrutiny from the security services for no good reason other than some bad guys happen to be doing business in your locality."
Here in the information world, of interest means a valid bit of data. Not of interest is bit bucket.
Now, if the bit bucket was examined and found to hold correlations of significance for a known felon who was dangerous, I'd most certainly and law enforcement would most certainly be interested.
That said, the fruit of the poisoned tree comes into play and a parallel investigation begins. One that uses none of the tainted information at all. If that plays true, it's rather likely that further criminal matters are present and one requires a court of law to examine the facts.
That *is* the case law and text of the US Constitution.
Now, as one who actually reviewed his own personal morale call home text file, dutifully recorded by an unnamed agency, after a certain soldier tried to kill his peers for religious reasons, I can say, I don't have that great a deal of problem with that. That isn't blind faith, that is due to the checks and balances in the US government.
They may fuck up on occasion, but usually they do work.
"If they had a warrant they could get the info from the phone company. So I'm guessing no, they are fishing."
In a way, yes. In the comparison of going to the fish market for your fish vs actually actively going after fish with a hook.
Warrants are served, the data is *not* in realtime. That is something I learned in the military.
If the guy is at the 711 yesterday at 11:23:43, whatinhell good is that today at 22:00:00?
Now, can it be abused? Absolutely. That is why we have a court system, a Congress and a POTUS. Each is checks and balances against the other two branches of government.
That all said, if the states get hold of this technology, the entire Constitution will become a regional clusterfuck that will take ages to untangle.
For those not from the US, our central government is relatively weak, with civil rights and federal rights defined in the Constitution. Anything not covered there devolves to the states, if not claimed by the state, devolves to the county, then to the town/city/township, then to the citizen.
Much isn't codified and is mixed US Constitution, some state Constitution and a *lot* of UK common law of 1776.
A rather bizarre thing occurs, as many states have not outlawed the judicial duel, such is legally possible in quite a few states. Don't see it happening, but it is technically possible.
Think of traveling in the US as a citizen as traveling in Europe with a Europass, but without having to present it at a border (travel papers are prohibited in the US Constitution).
For fun, do read our Constitution. It's an easy read, it's relatively short and it's plainspoken. Then, research history of the UK in 1776 and remember the history and some abominations that occurred in UK history over religion and personal protection from harm from another and assorted other items.
Or read Justice Scalia's opinion in Washington, D.C. vs Heller for the history.
Justice Stevens attempted to engage upon historical revisionism, only the immediate victor may revise history, not the progeny. ;)
Personally, I'd put quite a few firearms under the National Firearms Act (do look that up).
Well, it's nearing 05:00 local time, I need to get some sleep. I'm midshift.
"It's a pity that they have to slurp the entire area and then mark which ones are of interest."
What happens is, the phone pretends to be a tower. Hence, it reads *all* phone ID's in range. Hence, it slurps all and discards that which is not of interest.
Before you comment, do learn how the technology works. To do otherwise actually does disrupt service.
Re: Dirtboxes being used by dirtbags!!
"Well, my respect for the Marshal's Service just dropped several notches."
Well, mine actually went up. I rather dislike fugitives, especially armed ones. Especially armed ones that seek to force themselves into my home and force me to expend ammunition to halt such harmful activities.
So, to be blunt, I'm glad the Marshal's Service is saving me ammunition and door fixtures.
Of course, I'm one that the government knows perfectly well where I am for 8 hours per day and is reasonably certain where I am the rest of the time. But then, I work in a government security operations center keeping their networks secure.
Earlier in my career, I literally had government agents follow me to ascertain who my associations were, beyond what was self-reported.
So, sod off, you paranoid delusional person, go seek professional mental health care guidance on finding balance between caution and paranoia.
For those outside of the US, please excuse my tirade against my countryman, however you should be made aware of one fact.
The United States of America has no real mental health care system. What previously existed was dismantled due to a handful of cases of abuse, with the promise of community based health care.
What that actually meant was mental patients were literally ejected from the closing mental hospitals, to become homeless. The community based mental heath care system was and remains underfunded to the point of being an embarrassment it it were in such a state in Somalia.
As for the ammunition bit, well, firearms *are* quite commonplace in the US. Most sane people only move about with them to and from the range or to hunt, when the game is in season. My firearms are in safes, with one special safe reserved in case of the not so vanishingly rare occurrence that someone breaks in and is armed. If they're unarmed and run away, oh well, I'll have to replace a window. If they're unarmed and remain, they'll get to meet the local police force, who will be advised that the suspect is peaceful.
I had quite enough of violence in the military and really don't want to see things military at home.
Re: 0.5% of a few billion is still quite a number
"...don't use IE, don't browse dodgy sites,..."
Sorry, doesn't hold true any longer. Malware is being served up in advertisements on otherwise honorable sites. Such as CNN, BBC, PRC government website...*
*OK, that last one is a joke, the first two are not. The get the malware ads tossed when they find them, but the malware folks now are quite well funded. I'll not even go into adrotator.*, I've got quite the number of entries in my hosts files, due to annoyance at my firewall griping at me.
And yeah, I do surf dodgy sites, but I wear a Computer Condom and have a rather expensive hardware IPS as well. My home network is a full enterprise environment. To the point where I receive thank you cards from my local electric company.
"Machines with deactivated security measures as prone to infection as those without security measures? No shit, Sherlock."
Does that mean that a broken lock is as bad as an unlocked lock? ;)
"User who don’t update their operating system away from Microsoft, may as well install virii themselves, according to infection rate statistics published by world + dog."
I've had *nix admins proclaim that Windows is a virus. I disagreed and defined a virus for them and they were forced to agree.
A virus does something.
Re: What are the infection rates for desktop linux users?
Geeze, I forgot to address the original question.
The rate is present, low to mild. Most people who know how to operate their Linux boxes know enough to avoid letting something be run as root. That leaves malware at the user's permission level only (save for some sploits).
If it has an OX, it can be compromised. Most often via the stupidity of the user and we've all had our moments.
These days, I'm at the point that when my firewall gripes about malvertisement from a particular site, I quickly sudo vi /etc/hosts and redirect them to 127.0.0.1.*
*The hosts file isn't big enough yet to merit the usage of emacs. :P
Re: What are the infection rates for desktop linux users?
"Geeks, nerds and fanbois run Linux. Ordinary people run Windows or OSX."
You mean sub-ordinary people. Power users and network types use Linux, *BSD or OS X.
Oh well, at least this OS X machine comes with Apples built-in antivirus.*
Microsoft has their own free offering, it's not the best, but it beats a stick in the eye or a rootkit on the machine.**
*Yeah, there really is built-in antivirus on OS X, though it's indistinguishable from having no antivirus software, it's so efficient.
**OK, I've manually killed rootkits as too. Still, some can be annoying, having watchdog processes that have to be hunted down one by one, then simultaneously terminated.
You know, the fun ones. ;)
Late yesterday evening
I saw a neat, new attack coming out of one of the vulnerability scanners, null string logon attempts.
"Not enough people are employing full time (researcher) cryptographers. I know Google and Apple do, anyone know about MS?"
Yeah, but the NSA stole them all away.
Re: Supposed to be internal testing.
It never ceases to amaze me, I take a few days away from monitoring the security news and all hell breaks loose.
I was wondering about those odd attacks coming from our vulnerability scanners. Now, I have to update the IPS and assorted other sensors with these vulnerabilities.
Oh well, it sure beats reading pcaps all day.
"And all those asteroids will sprout baobabs?"
Sorry, but as one that was part of the advanced planning commission on life, the universe and everything, regrettably, the asteroids will sprout okra, in plentiful quantities far exceeding the total possible production capability of the Earth. The oversight and QA committees totally screwed the pooch on that one.
"Fingers are crossed for a monster CME that hits us, here at Ledswinger Towers. "
I've long had the habit to track space weather activities, as my life did, quite literally, rely upon decent satellite communications for fire support and evacuation support.
Much later, I still track space weather, somewhat out of habit, somewhat to consider disconnecting certain expensive electronics if a CME is inbound and, erm, interesting.
Still, one ponders about the US, where substantial parts of the energy grid dates to the 1920's, with the majority being 1950's technology.*
*Note to self: Do pick up a proper generator for the house, along with an upgrade on fuel storage. I suspect 5000 gallons will be insufficient.
But then, I inherited a petrol tank under the property, courtesy of my deceased father, who had trivial access to such underground tanks and installed one during the US energy crisis. He subsequently added fuel to it, gradually, as petrol stations required repair and the remaining fuel was pumped out to be discarded.
There *is* a benefit for inheriting something from someone who lived through the Great Depression. Most of it is hoarding, some hoarding is beneficial today.
Re: Yeah but, this is a RE-hacking
The first lesson in network security is this; they *will* get in. Period, end of story.
One can only try to delay actions on objectives long enough to catch them before data is exfiltrated.
This is true for government networks, it's equally true for commercial networks.
What is critical is proper incident response, with a knowledgeable team.
Re: These can't be DoSed, right?
"Well if one side has guns, and the other has guns, drones, jets and tanks? I know which side i want to be on."
Not to mention AC130 gunships, MLRS, artillery and precision guided bombs...
Re: These can't be DoSed, right?
"Death row for anti-gun nutters. anyone?"
Save for the fact that some of us anti-gun nutter types also own firearms and are highly proficient with them.
I personally own a full dozen, after inheriting my father's firearms and my own combined, with mine being either competition class firearms or regular hunting rifles. His ranged from hunting rifles to Saturday night specials (no clue why, he never carried a concealed firearm in his life).
Every one of those firearms are in safes.
Re: LiLo is in "Speed the Plow"?
Really, if that is the best you can do...
I quite enjoyed seeing a *lot* of her in The Canyons.
I'll give due that she did a good job in that production, especially considering the challenging environment.*
We'll see if she rises to stardom again or falls into substance abuse again.
*The Canyons had the male lead that is a porn star in the real world. Needless to say, she freaked out on a couple of scenes and had a director with an extremely firm hand. Said director explained it to her quite kindly, "If you screw *this* one up, you are done forever in this town."
He was speaking the rather unpleasant truth to the young woman.
Still, nice body, good acting. Not my type though, my type is largely in museums and labeled various dinosaurian names. ;)
Re: about to GIVE BIRTH
The star isn't about to give birth to anything.
The molecular cloud gave birth to a stellar system. *Whyinhell* does any astronomer think that the forces that caused collection of matter sufficient to "build" a star is insufficient to also generate eddies sufficient to build plants (and protostellar winds adding to the effects)?
Hell, enough matter collecting to form a protostar is more than sufficient to cause further eddies in the local gravitational environment and help the planet formation process along.
Re: This is what happens
"(For those who find this excessively feeble, a Conservative MP announced just a week or so ago that sex education led to teenage pregnancies. Ignoring the fact that the numbers are actually dropping)"
This gives me some consolation across the pond. It proves that the US does not hold a monopoly on moronic conservatives, we only hold the current largest market share.
I found one thing fascinating.
I never entered my e-mail address in the store register system. Ever.
I did have it entered a few years ago, in the order fulfillment system and in the online ordering system. I'm on their mailing list for new specials.
Yet, I received an e-mail from Home Depot telling me that my e-mail address was part of the lost data from their systems.
So, what does that tell me?
Far more than their POS systems were compromised.
Home Depot, you sell hammers? Let me buy one of them, for use on your leadership's fingers.
After I'm done, I'll return it. Something that would be a first for me with Home Depot (not that much of the products there are of high quality (don't let me go on about the cheap copper plumbing joints, suffice it to say they resemble aluminum foil more than what I could get at a proper plumbing supply house)).
Re: Add more technology - solved
As was suggested, rather obliquely above, putting vendor crap onto their own DMZ is trivial.
Enforcing password complexity within one's enclave is best practices (as is putting foreign things not related to one's day to day business operations on their own DMZ(s)).
So, what does each instance of breach tell us? Not a damned one of those organizations passed a proper audit.
Hence, are legally culpable for any damages suffered by consumers injured by their lousy practices.
Back when I was a system and network administrator, I followed best practices. I did so not for some altruistic reason, I did it simply because I'm lazy and didn't want to have to work recovering from a breach.
Re: wtf is a boilerplate response?
"Apple takes security very seriously"
Whilst relying upon *BSD to fix the flaw, then washing the fix through 37973 departments...
Re: Boilerplate reply
Meanwhile, at least in the US, that boilerplate response *opens* them to liability, as they've been informed and appear to have ignored the warning. Any client using their OS and experiencing damage now can claim harm caused by negligence on the part of crApple.*
*Full disclosure, I'm typing this on my favorite notebook, a MacBook Pro, which I am amazingly frustrated as to have had to compile and replace my ShellShock vulnerable computer *long* before crApple got around to it. I expect a *lot* better than that, lest I begin to think that crApple is taking lessons from Microsoft.
Re: When can we see the apologies?
"And perhaps we should ban all speculation until the NTSB publish their report - but that's against human nature."
I'd not ban it, only discourage speculations that don't conform with current news conference releases from the NTSB. I happened to watch video of said news conference, but seem to have missed the mention of the boom assembly moving after being unlocked.
When going trans-sonic, things get *really* ugly, as highly significant stresses are induced down the line of travel of the aircraft/spacecraft.
Things get uglier when the press/public gets involved, as mach 1 is relative in that arena, mach 1 for an operational craft is when *all* components are well and truly outside of the shockwave.
As the attitude assembly was at the trailing edge, it very may well be that the shockwave induced unintended movement, secondary to mechanical locks being disengaged.
The real question is *why* the locks were disengaged. Procedural flaw (not supported by current documents, as reported in press conference by the NTSB)? Operational friendliness design flaw (control is near a very similar appearing control that *is* on a checklist)? Informal test procedure practiced by a test pilot (unlikely, from personal experience with test pilots)? A case of intra-cranial flatulence on the part of the copilot (something quite well in the realm of possibility, on error, goto human)? Around 100000 things not considered from this highly sparse information?
Based upon what is *known*, which is an astonishing amount of information parsed by the investigators due to the craft being highly experimental, for all that we know, based upon this sparse information, it very well could have been a Decepticon moving the copilot's arm and hand.
The latter being the most, erm, improbable of events, as Transformers are either an electronic device or a fictitious character from a rather well earning toy line and entertainment franchise.
Re: More details needed
I can't think of any pathogen that can be easily passed from an amphibian to a human.
History has repeatedly shown us though, when a novel pathogen is introduced into a naive ecosystem, mass extinction will occur.
Locally, I watched corvidae disappear, dying off from West Nile infection. It took around 20 years before survivors could manage to survive that virus and proliferate.
What is a rocket, exactly?
Take a great big bloody bomb.
Make it explode in one direction, at a slower than immediate rate, make it continue to do so until one is at one's destination point or needs to replace that one direction bomb.
As a practical example, I know of one intermediate range tactical missile that uses thermate as its propellent, with some modifying binders mixed in.
A second example would be all manned NASA rockets, which use hydrogen and oxygen.
Now, take that bomb, assemble it with loads of moving parts and electrical circuits, well, it gets complicated.
Rocket science isn't as much science as it's partially an art.
An example from early and even current rocketry, liquid fueled engines can suffer from pogo oscillation, due to structural components moving due to acceleration. That results in slowing fuel/oxidizer rates, then normal rates. That has destroyed quite a few rockets.
Now, who wants to design a rocket to personally fly up into space?
If I'm using a public access point, I really don't care about sniffing seeing what I'm looking at. I don't Conduct sensitive transactions over an open wireless network.
If I were to read my e-mail, it'd either be over SSL or IMAP, with TLS carrying the encryption.
My company e-mail is via a VPN connection, so again, not a problem.
Sorry, as one that uses Linux to death, Windows when forced and all...
I'll stick with my MacBook Pro, due to its hardware capabilities.
*Each* OS has its strengths and weaknesses, depending upon usage.
Windows is, essentially, king, due to ease of use/misuse by the average village idiot and regrettably, all to often maintained by other village idiots.
*BSD is nice, but it is a lot stodgy in admitting to new interfaces/technology. As in taking two years to admit a beta USB system and three years to get the damned thing to actually work properly.
Linux is nice, if you like rough edges. I use it daily at home and frequently at work.
Linux is nice, but it's unpolished in may areas, when compared on a desktop level with Windows or OS X.
From that standpoint, I've eliminated all Windows desktops at home. I still maintain a Windows server, due to certain commonalities issues.
All desktops are Linux, my singular exception is this MacBook Pro, where I am typing from now.
Now, from a security standpoint, I condemn all.
Linux for partially adopting SELinux, *BSD for not bothering to seek NSA input in a far more merciful time, Microsoft was totally out of that program. Said program was to teach how to build a Trusted Operating System.
Still leaving Solaris, in certain special configurations, as the *only* trusted operating system for the US.
"Doesn't everyone get that girl from BumBay Microsoft Support "
Nope. Not since that NSA crack.
Though, my calls were from "Microsoft Office", which is as bogus as can be. *Everyone* knows that Microsoft Office is supported by a shitty paperclip character. ;)
Re: Think i am due a phone call soon
I kept them going for about a half hour.
They *eventually* caught on and disconnected.
They didn't catch on when I said that one of my systems is a Sun Microsystems machine and does not have windows on it (well, that is true on both counts) and my other computer is a Cray.
They didn't even catch on when I mentioned Unix.
I think that they caught on when I mentioned that "our security systems at the National Security Agency are the best in the world".*
*No, I don't work for the NSA. I know a handful of people who do, but we don't talk about work.
Though, I'm fairly certain that they already know what kind of day I had at work.
Largely because we do the same general job, information assurance.
Re: "hints that there are probably thousands of dinosaurs that we still do not know about"
Not at all surprising. Keep looking and the darnedest things come up.
Frankly, I've thought of flogging a book on a dinosaur culture that was similar to ours, but died off and the concrete, steel and even plastics broke down and left the cemeteries dissolved over the millions of years since their passing.
If anyone wishes to take that notion up, good luck. Do badly, I'll cite this as copyright and institute legal action that leaves you homeless. Do a grand job, I'll be eternally thankful and own you a major favor.
The favor system has worked out quite well for me and participants of said system.
I just get a lot vindictive over those who turns a sows ear into a pigs breakfast.
- Vid Antarctic ice THICKER than first feared – penguin-bot boffins
- Antique Code Show World of Warcraft then and now: From Orcs and Humans to Warlords of Draenor
- iPhone sales set to PLUMMET: Bleak times ahead for Apple
- Regin: The super-spyware the security industry has been silent about
- Review Amazon Fire Phone: What's MISSING... and why it WON'T set the world alight