They have already demonstrated the capability to destroy an old satellite, so it would appear that either this is not a treaty violation or they don't care: more likely the former I would say.
76 posts • joined 13 Sep 2007
Re: Microsoft hardware
> You would simply find that an Apple device is all but unusable if you deny it the chance to phone home with a far more comprehensive set of personal data.
No it isn't - that's exactly what I do, using Little Snitch. In any case, Macs don't do MITM attacks on HTTPS sessions. They are far from perfect, but on both Windows and Mac it's still usually possible to prevent sw phoning home.
However I do agree with you that a Mac will attempt to phone home much more than I am happy with.
> Wrestling a V10 down a motorway seems an utterly pointless exercise, and on a racetrack it would be doubly so due to bends.
The bike was build by Adam Millyard a few years back. As with all his bikes, it's a real road-going bike, not a design freak. I've seen him ride it down single track road to the West Hagbourne bike night. It's a lot more practical than the donor Viper car. The fact that it does 207mph is neither here not there.
You'd probably prefer his latest creation, the Flying Millyard, a 5L V-twin minimally based on a big aircraft radial. It's hard-tailed, has manual mixture and advance/retard, and requires kick-starting - which I've seen him do. Or is that removing too much complication and weight for your taste?
Re: We went from NCP to TCP/IP overnight.
NCP could only address 256 hosts. It's hardly a comparable problem to changing an Internet standard today.
Please take that phrase out and shoot it. And I'm not talking about "software defined".
The computer is a Mac (i.e. Macintosh) not a MAC. The company is Apple, not MAC. Given this level of knowledge, perhaps you'll understand if I ask for a source for your assertion that:
> thousands of users and administrators contacting MAC tech support asking for help with, what turned out to be .... a virus.
Are you perhaps thinking of other forms of malware, such as a Trojan?
Re: Whoa there
> Furthermore, Bitlocker requires TPM hardware
No it doesn't. It will use it if available, but it runs fine without it.
Re: Lawmakers and the law
As far as I know, RIPA was not justified on the basis of counter-terrorism. It's simply there to define which authorities can require interception, and what authorisation they require for it - and this has always included use for criminal investigation. A RIPA-type law was clearly needed as prior to that it was ambiguous who had the right to intercepts, which could lead to abuse. Of course it's possible to argue that it permits interception too easily (and I would agree with this), but that doesn't argue against the need to define the legal framework for interception.
Except that following DB Cooper, the planes have been designed to prevent parachuting out of them.
That sort of thing is what I'm worried about with this "authentication". While it's unlikely that they use RFID because the coins are metal, I'm concerned that they may give coins individual identification, which will make cash transactions trackable.
No local storage on Mac version
You have to use Microsoft's Skydrive on the Mac version - no way avoid your content going on to their servers. I can't use it for this reason. While I prefer OneNote on the PC to Evernote, at least Evernote allows local storage.
Mac OneNote also missing a significant amount of other stuff which I happen to use - for instance the "Print to OneNote" function has gone. On a PC I'm in the habit of printing large docs to OneNote, putting the image in the background, then writing notes over the top. This won't be used by everyone, but it was important to me.
Re: Once something become possible
> Basic nukes aren't hard. They require zero engineering experience (for a gun-type nuke.)
Ok, that means you need U235. Do you know of an easy way to get that?
Do you need an initiator for your design? What will you make it of, and how large is it?
What is your critical mass? What amount of explosive do you need in the gun to avoid a squib explosion? Is there any danger of the explosive shattering the uranium that it is propelling?
> everything on the iPhone (except the fingerprint, of course) is in the clouds
Speak for yourself. I don't use cloud storage, and I don't use Siri (because it would upload my contacts). You may be happy living in the panopticon, but you don't speak for everyone.
I work for a large international mobile phone company. I think this would probably work well for us: we can do cheap roaming on our own footprint anyway (and have some pretty good deals to encourage it). However it looks to me as though this will kill smaller companies: they will have to pay a roaming partner (perhaps at a reduced rate) while not being able to recover the costs. This is particularly true of MVNOs (mobile virtual network operators) who use the infrastructure of MNOs (the big companies). Some of them are tiny - a few thousand users. Basically this looks good for the big incumbents, bad for others.
A) Users don't have the manual; B) Users don't have the admin privileges to raise the scan resolution; C) A bug like this should be fixed, not documented as a "feature".
Why do you always refer to anyone living outside the Great Wen as a bumpkin? Were you frightened by a cow-pat at an impresionable age?
It turns out that running network protocols over USB is already used. Many 3G USB "modems" are actually routers, and also run a small web server on the device to control the router functionality. However I agree with the general point that replacing physical Ethernet cables with USB is not obviously a good idea.
Does anyone know whether it will support SCTP (http://en.wikipedia.org/wiki/SCTP) transport in addition to TCP? SCTP is a protocol at the level of TCP or UDP which is intended for just this sort of message stream. It's extensively used in the telecoms world for signalling, but is not supported on Windows without a 3rd party driver.
Re: if it aint broke....
> BTW I believe DLR run a PDP11 in every single train.
I think it's an 8080 running Forth, from memory.
> After having carried a Hong Kong ID card for a few years now....I'm all for it, provided the cost isn't absurd. Very convenient.
Even more convenient *not* to carry an ID card.
> And yet strangely France is one of the countries where ID cards aren't compulsory.
Up to a point. You are not required to carry it, but if you don't, you can be held for up to three days while someone fetches it for you.
Bear in mind that most continental hotels will require a photocopy of your passport when you turn up, so that information is going to leak in any case if you're travelling in Europe.
DNSSEC itself relies on the DNS records being signed, and hence on the integrity of the CA chain. So no, it doesn't appear that verifying web certificates using information carried by DNS will help.
Re: History son, history!
> MS really need to sort out the backup problems with Outlook for Mac (effectively, you can't) , although we know they won't, don't we!
MS need to sort out Outlook backup, full stop. At some stage long ago, someone had the bright idea that everything should be in a database on Windows. Admittedly, that was the orthodoxy of computer science at the time, and Windows was supposed to be changing to a database file system (WinFS). That left us with gigabyte .PST and .OST files rather than small files that could be individually backed up: a problem for both MacOS and Windows.
Re: OneNote, Access and Publisher?
> And OneNote is ably replicated in the Word for Mac Notebook view.
Oh, rubbish. I use both. Notebook view is better than nothing, but it's missing about 95% of the functionality of OneNote. It's basically good for banging out indented pure text notes in linear sequence, with perhaps ten pages in a "notebook". Push it beyond that and it's very poor even for the features it is supposed to implement. It also has problems with its rendering, so that you can find that a chunk of text simply doesn't display: this is absolutely fundamental functionality which does not work reliably. A couple of weeks ago I even managed to corrupt a document by moving a notepad tab (i.e. a section), so that if I tried to display that section, Word would lock up. The only reason I use it is because the small number of things that it does do happen to correspond to one job I do on a Mac every 2-3 weeks, and I want to use Word to be able to read the documents a few years on. I'm not a great fan of Evernote compared to OneNote, but for most purposes it is a country mile better than notebook view.
Re video: a small point, but I wish the USAians wouldn't keep flagging up Lindbergh as the first to fly the Atlantic. The first non-stop heavier than air flight was by Alcock and Brown. Lindbergh did the first solo (and had a more elegant landing).
MS Word is not a copy of Word Perfect; Word Perfect is not a copy of Wordstar. Unless you consider the concept of a non-modal screen editor to be innovative
MS Excel is not a copy of Lotus123; Visicalc had some dependence on Visicalc, but was very different.
MS Access is not a copy of dBase. Did you ever use dBase?
> “Where do people go at 10pm after a movie? It’s about building up these kinds of connections.”
Nope. And to be clear, this is not just about what they do with the data, or which third parties have access to it.
This was in use at least 40 years ago for analysing Biblical texts. Other than it being open source, I don't see anything new.
Ad-hoc WiFi is used to offer a tethered 3G connection on iPhones - but that's the only use I can think of for it.
Re: I think the only solution here is DBANing the drives.
However, if you report CP on your disk, expect to see some repercussions if you ever need a CRB2 check, which is based on suspicion and rumour as well as criminal record.
Re: "Oldest Working Computer" - stop on exception
> Any of the elderly (*human*) "computers" still "working"?
Probably not, but I know one who is in her mid 70s.
Popn 2500 - only reason I know of it is because it's on the Kungsleden long distance path.
> Under UK law you are allowed to go by a pseudonym, as long as you maintain documentation of your real name.
As I understand it, legally it is (or was) the other way around. The name that you are known by is your "real" name. Changing your name by deed poll is a recognition that you are already known by that name, and allows you to update your official documentation.
Re: Hovering over China?
A way to get the effect of long dwell time over China is by using a Molniya orbit (http://en.wikipedia.org/wiki/Molniya_orbit). That's a highly elliptical, highly inclined orbit with the apogee (furthest away from Earth, and hence slowest moving) in the northern hemisphere. Although the orbits the Russians use for their Molniya satellites have a six hour period, you could use a one day orbit to put the satellite consistently within sight of China for most of its orbital period.
I use both Evernote and OneNote, and I develop enterprise products. I'd say that OneNote is much more enterprise friendly in that it is trivial to host shared notebooks on companies' existing MS infrastructure - no need to use a cloud-based solution, which is often a blocker.
Having said that, I've yet to meet someone who uses shared notebooks. Are they a solution in search of a problem?
> A variable constant? That's revolutionary maths right there!!
No, it's cromulent.
The cosmological constant arises as a "constant of integration", i.e. there's an equation, and Einstein integrated both sides of it by some variable (sorry, I don't remember which off hand). When you do this, you get a new equation where you introduce a "constant". This means it's a value which doesn't depend on the variable you are integrating by. It may well depend on some other variable, or it could be a fixed number, but in this context you call it a constant of integration. The interesting point is that the process gives you no information at all about the value of that constant.
Re: Note that *accuracy* prized over speed
> This is a a *true* decimal computer with counting by 10's built (literally) into the hardware.
Still true of modern PCs and Macs! Some 8-bit BCD instructions are buried in the 8086 instruction layer of Intel-family processors.
> I'm surprised no one as yet has tried introducing code via an infected smart card
Although smartcards do have something analogous to files and directories, PC/SC smartcard drivers won't allow you to mount the file systems on a PC. More importantly, there is an ornate privilege mechanism which would usually stop you creating or writing to files without provisioning keys specific to that particular smartcard. Also smartcards generally have only a tiny amount of unused storage, of the order of 2-4kB.
Re: Wrong solution
Don't assume that a service provider doesn't hold your keys unless you have a means of proving that they never had them.
SI is great if you have to do any conversions between units as you do in engineering, but in daily life we don't do that. I don't need to know the mass of five pints of beer in pounds, or to determine how much its temperature will rise in Fahrenheit if I apply 5BTU of heat. It's a pint: all I need to know is how much it costs.
Definition of HTML version?
Successive HTML versions are almost entirely supersets of the earlier versions, and if you are writing a simple page, you may have no reason to use the more advanced facilities of the later versions. So are the server test pages I put up last week obsolete HTML 2.0 because I use nothing more advanced than posting to a CGI script? Surely not: this has nothing to tell us about information loss and is unrelated to any discussion of old word processor file formats.
The idea is not bad, but there's no way I'd give my credit card number to Google. I'm not worried about false charges (well actually I would be worried, given their lack of customer care services, and that you'd probably have to give then "continuous payment authority" which is a devil to cancel). No, the problem is that they will immediately do the same thing as in the web space: use that number to track a unique and identified purchaser and build a profile. They would probably offer some service analagous to Google Analytics as well whereby third parties would send information about credit card transactions to them for analysis. No thanks, I have no wish to live in a goldfish bowl.
You say more wars have been fought over religion than any other form of dispute. Prove it.
Re: Oh, you have it wrong ..
Perhaps I'm missing something, but I couldn't find a way to add a generic IMAP account into the TIFKAM email app which came with WinRT on the Samsung device I've being looking at. I don't have it with me at the moment, but from memory I thought you could only add in accounts from one or two providers like Google.
Can this be disabled?
I don't allow my personal information on to cloud services, with the exception of Kindle reading position sync. I don't sync photos, I don't use Siri, I don't use cloud document storage. Facebook is the last company I want anything to do with. I'm quite concerned that the "off switches" for some of these activites will disappear.
Re: Stupidity is a luxury
SMS is a reasonably secure transport, but it relies on the handset being trustworthy. In the past two important phones (Nokia 6210i and Ericsson T610, I think) had Bluetooth bugs such that it was possible to pair with them without authentication, then read and delete an SMS without the user's knowledge. These days there may be other vulnerabilities introduced by Smartphones with malware installed, which could allow receiving and manipulating SMS from a distance.
I don't want to give the impression that SMS authentication is a bad method: it isn't, particularly if it is part of two-factor authentication. However as with most methods, it cannot be seen as a silver bullet.
Re: Not exactly enterprise
Theoretically, block-level dedupe could be useful for individual users for backing up things like Outlook PST files - large files for which small areas change, perhaps on a daily basis. And before anyone jumps down my throat with "PST files are eeevil! Do the backups on the server!", I'm not necessarily talking about an enterprise environment.
Re: What did they expect?
> Can you imagine the Abwehr or Wehrmacht telling all how enigma worked?
How Enigma worked was not a secret. Three-rotor machines were sold for commercial use prior to the war.
Thinking as a user rather than an IT manager: how far would you trust it? Often the reason that users keep their own copy of documents is because they don't trust that central copies will remain present and unchanged. I suspect that this technology has the unintended side effect of users moving stuff into local storage. I've seen this happen with centralised automatic email archiving.