Google vs. Microsoft. Consumer Grade product vs. Commercial Grade product.
280 posts • joined 11 Sep 2007
Welcome to the Google's new clothes, get used to seeing wedding tackle flopping about.
Re: This is probably very bad..
And that Sherman superiority in numbers had an acknowledged really bad history, such that tank crews nicknamed them "Ronsons, guaranteed to light on the first strike". Their popgun was a joke as they were out-gunned by the Panzers in range and striking power. You didn't just run a Sherman out to do head-to-head battle, you tried to get a group of Shermans positioned to exploit the weaknesses that Panzers exhibited.
Thankfully, as shown in Operation Barbarossa against the Russians, the German army had superior technology supported by inferior tactics and logistics.
Re: This is probably very bad..
Hmm, wonder were all that Apple product comes from? Don't worry, Japan got accused of the same thing before their automobile industry ate the US car manufacturer's lunch.
Borrowed engine designs modified for easier manufacture and field repairability
Mazda 626/Ford Courier = BMW 1600-2002 4 cyl
Toyota 4M = SOHC Mercedes 6 cyl
Toyota Landcruiser = Chevy 235 6 cyl
Datsun 1600-2000 = SOHC Mercedes 4 cyl
And then they came up with their own designs and the rest is history.
Heh, that beautiful CMS environment strikes again.
Maybe we need Microsoft to buy out WordPress and rework the security. While I'm not a particular fan of Internet Explorer, it would be nice for WP to at least be as good as or better at not serving as an infection vector.
Sounds like a designed in single point of failure. Time to eat the dogfood and make it distributed, like it should have been done in the first place. We been bein' dazzled by all those onion layers and multipath jiggery-pokery, only to have it vulnerable to this?
OMG, I'm all TORn up, my TORnography habit may be exposed...
Nice to know there's always an end run around this stuff. Get them to come in flocks, identify and flag the paranoid as some of them might be criminal... Sounds like a honeytrap to me.
Death by Powerpoint - heh, hehheh, hehh...
From all of us who've dealt with zombification by bullet point slide and an uninspired reader of said slides who purports to be giving an informational presentation.
Re: And yet...
Heh, my millwright uncle had no problems with the magstripe technology, he says a day at work around any heavy motors degausses them pretty effectively. His maximum life on card readability was about two weeks once.
We'll have to see how chip & pin and NFC fare under that environment.
Re: My golden rule since my card was cloned at a Texaco petrol station
"The Wife" doesn't seem to mind as she's also "The Better Half" and thinks "The Husband" is reasonably adequate to being a companion.
And what a thread hijack this whole discussion turned into... Worries of cloning Chip&Pin cards (soon to be standard in the US latecomer market as a platinum answer to all our woes) all swept aside in a flurry of pedantic semantics.
"The Better Half" tends to look after the bills and finds the discussion a waste of time as card security worries and dealing with credit card companies eats up real time unlike the gust of hot air and insignificance that has been the topic here.
Re: Never ever trusted TOR enough to use it
Too much stench of the G-Man on it...
One of the first of many firsts...
Which will be repeated many times in the future.
Your TORnograpy isn't safe, your criminal activity isn't safe, your underground political activity isn't safe, your wish for anonymity isn't safe.
It's becoming increasingly easy to trap the paranoid, spread news that they can be paranoid in total anonymity and they will come sucking at the honeypot in droves.
Re: Interesting times ahead
The average Bitcoin user doesn't understand runs on banks and not being able to cover lender's balances... Otherwise no regulation wouldn't be such a "feature".
Re: Goon Show moment
To complete that, it would be funny if any attorneys involved were required to take their payment solely in Bitcoin.
Freedom from backdooring
Belongs to them what owns their own aerospace program with launch facilities, their own chip fabbers, electronics manufacturers and satellite manufacturing.
Outsourcing is the first step in losing national security.
The world needs more...
Free standing towers of data security.
Hardened against backdoor penetration by the NSA et. al.
May the Schwartz be with you!
Get it on!!!
The A-Nutty-Mess wars against something will pass on to mean pretty much nothing...
Honk if you love Jesus and all that rot.
Re: so far so good
You baggin' on Notwork Pollutions who keeps spamming me to have a free website built to better my business? Yep, they're still highly automated and deaf as they've always been.
Re: VMs are your friend
Reduce your threat surface, don't follow the Silk Road.
Re: About damm time
Java is a system where compiled bytecode runs under a runtime environment.
The Java browser plugin hands off the execution to the Java runtime environment installed on your computer
ECMAScript runs within the browser
State it for what it really is, increased WAGS as to what on earth is happening. Welcome to faith based explanations over increase in traffic on a faith based TORnogrpahy network.
Re: Great Idea...
Simplicity by Complexity - or it takes another right Charlie to Foxtrot the system.
NSA HAS SERIOUS ISSUES
First thing, lock down sysadmin access to only what's necessary for the sysadmin to do his job. Shouldn't be a global account that has access outside his well define access level and job scope.
This is one reason to not trust the NSA. If he had GOD level status just because he was a puny SysAdmin, how do we know that Putin also doesn't have access... due to high level incompetence and the data leaks this enables.
Or they intentionally wished that the information be leaked so they can build a strawman.
New NSA Security Bundle
Keeps you from being spied on by offering Privoxy and TOR for anonymously accessing your pedobear stash. First proxy/TOR node is your friendly local strongarm looking for marks to extort. Wubba wubba wubba.
But its so darn convenient!
Re: Thank god for the war on Terror
Welcome over for tea, the Spandaus are warmed up, and the Jenny is dead.
In the haystack that is Linux, there is room for many needles to hide.
With all those lines of code, Detective Lecoq would be looking for the rumpled envelope in the letter basket.
In other words, it may have actually been a partner trying to expedite getting the job done.
Easiest way, hack QinetiQ.
Re: what about the ssh keys ? lol
It gets in the way of Agility, Extreme Programming, BYOD and whatever other latest Management Fad that hits the fan.
We are truly fortunate...
It is with greatest humility and admiration that we find our patch systems to be highly useful at doing much more than just making our computers run slower and inevitably need to be replaced as they start crashing from the continuous stream of CYA patch code.
Our computers become ever more needful of having multi-core systems with appreciable memory to run security software in the hopes that at least 5% of their processing power be left for doing other mundane activities, usually the tasks for which we purchased them in the first place despite the reality that the systems are probably already secretly compromised despite the 95% devotion of processing power for the prevention thereof.
Let the patches freely flow!
And also really useful as a buffing wheel compound for producing a really high polish on metal!
Re: The process is tiresome
Oracle Sievemaster Sisyphus, just keep rolling that stone!
One day it may stay up there at the top of the hill, somewhere around the heat death of the universe.
Re: Every Android sold
All these Oracle Sievemaster Java fans like to make noise by pointing out that Android phones supposedly run Java applications.
Android uses the Java programming language and the Android API. Java source code is compiled to run on Dalvic. They had the good sense to boot the Java API and Java Virtual Machine to the curb.
Re: RedKit Exploit Kit ..
So basically one Adobe PDF Reader vulnerability that was patched two years ago and one Smoking Piece o'Java that was patched last year.
Despite Oracle Slagware being a torture hole of demonic spew, if you'd kept it patched to the latest vulnerable version, you would still have missed out on joining the trojanfest. Nice to know that keeping the patches up had some little use and wasn't totally a Sisyphean task heading towards Pyrrhic Victory.
Re: Zero Day
Based on "Tora, Tora, Tora", involves a lot of Mitsubishi A6Ms swarming your battleship to draw off the fire from the low flying Aichi D3As delivering torpedos for the kill.
Re: and they want to do business with the rest of the world?!
It works in their interest to transparently proxy your VPN communications for a reason. You only thing you have free access through. They have your lunch.
Re: Numpties, you picked the wrong points.
The Immoral Minority wins the election, the Moral Majority is flabbergasted.
Conclusion: Maybe your name is wrong and you're really the Moral Minority
Running their own fab
Apple has squat for experience creating hardware in a fab.
The first year's production will be up to the quality of Apple Maps.
By the time they get up to speed, they'll be the greying dry dust of history.
Re: Linux = Insecure.
More likely that Right Wing resistance to learning anything new and to paying enough wages to get someone knowledgeable had set in and they weren't going to pay anyone smart enough to secure the site, no matter what OS and web server the site's being run on.
Re: "The Trojan features Windows 8 compatibility..."
Sweet Metrosexualness and all that... Plays well with others...
Re: 'Speak softly and carry a big stick' (Churchill)
And a phrase used long before by TR "Bullmoose" Roosevelt during the era of William Randolph "You provide the pictures and I'll provide the war" Hearst.
Re: "Physical Infrastructure" shouldn't be connected to the Internet in the first place.
Heh, since that's the way the Iranians got hit so mightily. Never underestimate the danger of a USB stick.
In the words...
Of the greatest president of all time, "Bring it on!"
Yabba Dabba Doo on the loose...
So Bummer Harris prattled on a publicly accessible broadcast medium where anyone archiving the feed could have decided there was incitement and sent it in and we have our knickers in a twist over a Subpoena under duly constituted process of law...
Re: virus vs trojan
Preaching to the choir doesn't take care of the problem
To the common user viruses = all the above, to the common Mac user, Macs don't get viruses, so by continuing this logic, Mac users don't have to worry about any of this silly junk.
I work in a community of Mac, iPad, iPhone users and keep trying to get the word out that Mac Malware exists, but the most literate give me the, "It runs on OS X which is Unix and Unix doesn't get viruses like Windows does". routine which makes them sound smart but makes for an environment ripe for digital ambush of the willfully unwary.
The most vulnerable and exploitable portion of the internet, identified as CVE-0 has been shown to be easily overcome by well crafted attacks. The more over-confident and power-conscious the target, the easier it is to socially stroke it to the point of climax where it spews forth the information the attacker wishes. This is best enabled by an entire forensics surveillance directed at lower level entities taking advantage of their wish to be helpful, to identify CVE-0's contacts within the company, contacts external to the company, captured emails to analyze the writing style of CVE-0's contacts and various outside interests. Identifying communications for events and projects can help prepare CVE-0 for communications that contain desirable attachments which when activated, further root in to produce better information streams to the attacker.
I got the "Macs don't get viruses" comment as late as last week. Since most of the Mac users I know include all malware as viruses, it's no great reach for them to include clicking on links or running dmg installers.
Re: Why don't you get it already?
Heh, about 1,000 computers in countries that aren't very trusting of Western Technology and afraid already of being spied on? How could it go undetected for very long? Very easily...
If the Iranian government was eating less of the stupid sauce, there'd be normal business relationships between commerce within Iran and the companies that produce anti-malware. There isn't, so you have a breeding ground for this stuff to be sent to.
And to keep it all in perspective...
Stuxnet = 2010 Bugatti Veyron
Flame = 1976 Cadillac Fleetwood
Luxury cars both, one lean, fast and tight to the road, built with custom parts
the other huge, soft, padded and drives like a fishing boat on the ocean, built from repriced Chevrolet parts.
The All New "Flame FPGA"
It knows all, controls all, reports all. Brought to you by Stuxnet's White Box Line.