Re: Taste test?
Nonsense. Of course professional law enforcement taste strange white powders they find.
137 posts • joined 31 Oct 2007
And Telstra in Australia decided to route a good chunk of the domestic Internet to Melbourne and two very confused routers that sat there bouncing packets back and forward until their ttl ran out.
Halfed our servers traffic for an hour and Telstra doesn't handle any transit or peering for us at all!
Another happy Pebble user here too. Pebble Time, little scuffed and the battery isn't quite a week anymore but it's fantastic.
This is the first watch that makes me think about replacing it. Nothing short of a week battery will satisfy me - sleep tracking is occasionally useful no matter how much the Apple watch users say its not.
All that assumes that the underpaid staff at the stores with essentially root access follow that elaborate secure procedure.
How staff in stores can override a procedure like that I'll never know. It should be automated for them and if the user can't verify themselves then it should be escalated to a special department with tighter controls.
The argument about government CAs isn't a good one.
You can always verify who issued a particular certificate, so if you went to Google.com and you noticed their SSL certificate was issued by a Chinese CA it would be blatantly obvious.
For most potential targets various monitoring would pick it up so manually verifying it each certificates CA isn't needed - it'll be noticed by others.
Partial failures like that typically mean the connection can no longer reliably carry traffic, but it still thinks the link is online so it never enacts the fail over procedure.
So no prior failure is required, just the monitoring being told that something is up when it's actually down.
These extremely rare failures actually happen all the time. Earlier this year servers I manage were also knocked offline by a partial failure which prevented automatic fail over.
FTTP can (and does) still have congestion at many different points.
Firstly it's using GPON with a fibre running at 2.488gbps shared between up to 32 houses. If those 32 had 100mbit plans and decided to use them at the same time then you have a (small) problem.
Then you have POI congestion where the ISP doesn't buy enough bandwidth. This happens all the time and affects FTTP and FTTN equally.
And then you have ISP congestion from the cheap ISP's with garbage internal networks.
Fixed wireless has a fairly fixed max total speed per tower however and its shared with a lot more people so it's most susceptible after satellite.
Of course you automate it. You'd have to be crazy not to!
Every certificate I deal with (thousands) is fully automated these days except for specialty types like wildcard and I have them partially automated.
Anyone manually mucking around with certificates in this day and age either doesn't have many, has some very pedantic requirements or doesn't know any better.
I think the point is typically everyone's computer would put it in the exact same location making attacks against multiple computers trivial.
A buffer overrun or similar attack with ASLR means each computer is different from each other, so when attacking you have to first find your target addresses which makes it a lot harder.
It's not about having code jumping around constantly on a single PC.
But it doesn't have to go there. There are multiple routes via multiple providers.
Prior to Google's announcement, a Japanese ISP already had one or more routes to each destination. The new 'shorter' Google route got added in addition to the already existing ones.
With some sort of monitoring you could detect that routes via the new announcement are failing, then revert back to the longer pre-existing routes.
4gig tablets will very much gain benefit from 64bits - 32bits can not ever use all of 4gigs of memory.
Try it. Approx 0.5gig will magically vanish when you load a 32bit OS on a computer with 4gigs of ram.
Remember the bits are used for address space, RAM isn't the only thing in the address space.
Your graphics card's ram is automatically subtracted from the 4gig of RAM, plus various IO things take their share as well.
32bit address space doesn't equal 4gig of RAM.
And if you go for some nice deep cycle car or truck batteries instead of the much smaller UPS batteries you absolutely phenomenal capacity.
A lead acid battery rated at 300 amps (not continuous) equates to 3.6kW for a single battery. And at lower power levels you'd get incredible duration.
I've got a small car battery dedicated to a 1.5kW inverter for emergencies. A friend had a black out a couple of weeks ago and it kept their TV and Playstation going for about a day before they got power back. The voltage afterwards was still 12.5v which is roughly 50%.
Google "Nyquist" sometime. Essentially the jist is you can *flawlessly* reproduce any frequency, by sampling at double the rate.
So if you want a flawless 22khz signal (which you cannot hear), you sample at 44khz. Hence why most music is sampled at 44.khz.
It has absolutely zip to do with the smoothness of the output waveform. You will get a flawless sine with 2 points per cycle.
It could act like RAID 0 where some blocks for a request come from one disk, and other blocks from another, but its more useful if it can handle two unrelated read requests at once. The first scenario for spinning rust disks would actually be quite bad.
But yep RAID 1 does nothing for writes.
I've got 11 'free range' guinea pigs outdoors not even in a cage (just a 30cm tall fence around a large area).
This is in Australia as well where if you get bitten by a spider and it is just as bad as a wasp sting, you are lucky.
The pigs love it. They couldn't be happier.
And how deep can metadata be?
IP A connected to IP B on port 1234 at 12pm is Layer 3.
Thats pretty light and is a lot like telephones. A stupidly large amount of data though.
Email from User A was sent to User B at 12pm is somewhat deeper.
That actually means intercepting everything including the data and pulling the bits of interesting 'metadata' out.
User A is chatting to User B over IRC.
That goes really deep and isn't just a matter of listening to the headers. You need to listen to the entire connection for the entire duration that it exists and every fragment of data has to be analysed closely.
Its a lovely fluffy word to say but on a technical level it can mean any amount of deep packet inspection.
SPF is relatively new. Didn't exist 10 years ago.
The fact that every email has the same message id means its most likely someone who packet sniffed a android mobile sending a email from the app, and is duplicating the transmission with spam for the body.
Easy way to send email via Yahoo.
Message ids are unique for every email that is sent legitimately hence why its fairly obvious.
iPad with Wifi + 3G would be entirely acceptable by the ACCC I would imagine. The 3G part of it works correctly.
The ACCC should definately drive this point home because its not that there aren't any 4G networks it will work with at the moment, there will *never* be any 4G networks it works with in Australia.
Biting the hand that feeds IT © 1998–2019