What about J?
320 posts • joined 31 Jul 2006
Too bad you’re anonymous.
I wouldn’t turn up for an interview with someone stupid enough to trust LinkedIn and to rely on it.
Number of pixels.
Nice tip. I don’t use Google voluntarily for anything, and it’s unnerving to see what they have collected.
Bobby Tables notwithstanding, haven’t there been enough high profile incidents to highlight the risk of SQL Injection?
I don’t know what’s on the back end, but all modern databases support Prepared Statements. Three extra lines of code is all it takes to dramatically reduce the risk.
Was the developer called Rip Van Winkle?
Our software is broken. Please fix your computer …
Nice one, Flight Centre.
I have tried Flight Center a few times, and they never got it right. Now they can’t be bothered answering what I consider to be a critical question.
Happy to have dumped them long ago.
I have bought ebooks directly from O’Reilly for many years. I even bought my SitePoint and Wrox books from O’Reilly because they’re better organised and
have had a better approach to customer service.
I don’t like subscription services as a matter of principle, and I don’t like buying from Amazon because of how they have stuffed up the whole ebook thing.
I’m particularly cheesed off that this is the first I have heard of it.
Not sure where to go from here. Maybe re-read the Disc World series.
Unless, of course, you take the Microsoft approach and interpret Back as OK.
Who are these guys?
We’ve all know people who try to corner you at parties because nobody else will talk to them.
Eventually they stop getting invitations to parties.
This is Microsoft’s desperate attempt to increase statistics by forcing their products onto you and then pretending it’s a sign of popularity.
… as well as
Unfortunately, for people who just click on a link in an unsolicited email from an unknown source, poor grammar is probably the least of their problems.
That’s assuming they’re paying attention …
When talking to students about password security, I mention the LinkedIn Breach of a few years ago. 95% of the time, I find that they either don’t have an account, or never use it.
The students are all adults and work in the industry in some form — web development, database or some other related area.
All I ever get from LinkedIn is junk or invitations from people I don’t know.
The issue isn’t with the OS. The malware is looking for weak credentials.
I think Microsoft call this Telemetry.
To begin with, they were lizards …
Unless it’s to say “that bleeding Edge!”
Agreed. It’s hard to say the right words without sounding xenophobic, but the fact that support calls will now be sent to people with minimal training and barely passable English language skills will not do the company credit.
A typical support call to an out-sourced call centre involves repeating your questions and answers half a dozen times to people who are desperately trying to follow a script, being polite about the moronic questions which follow a misunderstanding of what you just said, and doing it all again for the next person.
I have found it is much easier to take my business elsewhere.
Did they all look like Muslims or Democrats?
How does it end? With a bullet in the back of the head?
Really, I can’t find any mention of it whatsoever on The Register.
I just thought it was everybody else’s imagination.
From those of us who did notice, RIP, Ms Fisher.
Why the Apple reference?
Because Apple were the first to make the technology a popular fixture, and that probably counts for something.
… two chaps repelled 400 meters down into the crater …
I think that’s rapelled, or, if you prefer, abseiled.
Unless, of course, they simply pushed each other all the way down …
There's a lot of shitty code being released
Not necessarily the point. Minor UI enhancements or improvements in functionality may simply suggest an ongoing process and possibly responsiveness to feedback.
I think there is a case to be made for not making small changes go through the the approval process and then yet another update, which, in some cases, means re-downloading a huge application.
The problem, of course, is where to draw the line safely.
So, does that mean that most web sites are not only bloated but also insecure?
Many developers are addicted to taking short cuts, even if that introduces overweight dependencies on too many third parties. Each third party is a potential weakness in the design, and if developers are not committed to maintaining the integrity of these dependencies then they should learn to do the job properly themselves.
It’s more work to begin with, but much less stress worrying about someone else’s code.
Will this fall afoul of DMCA?
OK, this is a sizeable breach, but, given the speculation on potential sources, it’s not quit as earth-shattering as might have been expected.
So why the dramatic wait for the announcement?
“I've always found entering passwords extremely difficult after I died.”
Really? I’ve never tried.
I only use Windows when I have to for teaching. I use a Mac for my own development work and Linux for my server.
Running Linux on Windows will only serve to make some small tasks easier, and will also remind me why I prefer a *nix environment wherever possible. It certainly won’t encourage me to actually like Windows, or to use it with any enthusiasm.
With complete betrayal of trust in the while Windows 10 disaster, they are slowly providing a reason to prefer Windows 10 to, say Windows 8. Better still, they are clearly helping technical users to prefer *nix.
I’m not sure that’s what Microsoft had in mind, though …
Got it … this is where the famous Oxford Comma would have been handy:
Big three clouds, Apple, and Facebook …
Could someone please explain the title:
Big three clouds, Apple, Facebook …
… get acquired by one of five companies …
As far as I can tell the Big three either refers to Apple & Facebook, or the five companies mentioned in the article. I thought we had gone past the New Math … ?
“… course prices may have increased due to currency fluctuation”.
Do they know what fluctuation means? It could go up or down. Or have Cisco invented a one-way fluctuation?
You know, it’s really hard not to squeeze in a joke I heard about Asians …
I know that Britain is leaving the EU fold, but isn’t about time to look at legislating a more responsible approach to storing user data?
The EU has the Cookie Law, which requires user consent for using cookies or any other form of local storage on a web site. Why can’t governments understand that insecure handling of user data is much more serious than storing cookies, and require organisations to conform to a minimal standard which includes better handling of user data?
Remember that Adobe subscriptions are automatically renewed, and if you attempt to cancel before the next renewal you get hit for half the remaining fees.
I had to cancel my credit card to stop them from ripping me off further.
That Microsoft were able to adapt Git to suit their own needs is largely due to the fact that Git is not itself a Microsoft product.
So many of The Register’s headlines defy understand let alone verification. This poses a real problem for humans, as well as machines.
Every news item about Cassini is just better than the last. Stunning images and tremendously valuable new information.
Even the swan dive will be amazing: we’ll finally get a better look at the surface of Saturn, and maybe even work out the length of a Saturn day.
I signed up for GitLab just a few days ago, and haven’t started using it actively yet.
Would that be why I haven’t received any notification about this incident?
Could it be that the Dump also denies Leap Seconds … ?
I think it might go beyond the security services. It could also mean that US based companies might promise not to share the data of US citizens with third parties, while not necessarily extending the same promise to dangerous foreign types like me.
“This app I pretty benign to what could have been done.”
Speaking of Chinese, is this something caught up in translation or is it supposed to make sense?
Actually, one thing about Apple that they know how spell the name.
The styling was
Apple ][ at first, then
Apple //e when that came out.
Remember the move “Ransom” (1956, remade in 1977). The twist is when the father of the kidnapped child goes on television to announce that the money won’t be paid as ransom, but as a reward to whomever turns in the kidnapper.
I think that if enough agencies get together, this might be an alternative strategy to tracking down these bastards. I can’t imagine they spend their time entirley in the company of wholesome and upright humans, and sooner or later someone will value the reward more than their association with them.
or hippopotomonstrosesquipedaliophobia for that matter …
Would something like this be acceptable:
The policy proposes we may drive a bulldozer through your house, not will drive one through.
It is also a trial so don’t worry about it. Just relax and enjoy being taken for a ride.
I think NSW commuters have definitely been misled.
The real problem with Microsoft Security is that it’s just shifting the blame. If you disable macros, it won’t work. If you enable them, it’s your fault when things fall apart.
I haven’t worked with Microsoft products for some years now, which is why my sanity is slowly returning to me.
When Microsoft first released VBA for their applications, they enabled the first cross-platform viruses (Mac & Windows running the same evil code). Their solution was not to fix the problem, but simply to ask your permission to run the code.
One thing Microsoft has never understood is the concept of sandboxing macros. The majority of VBA I have developed is solely to enhance functionality within the document, and has no need to gain access outside of it. With Microsoft security, if you write a macro to automate adding a new worksheet, you need to grant permissions to interact with the whole operating system.
I mean, what were these guys snorting when they implemented this and called it Security? The correct solution is to enable two levels of enabling macros: sandboxed and superuser.
“It is not however wrong for someone to become a president despite winning less votes than the losing candidate?”
It’s happened a few times in Australia, when the party with the smaller popular vote got the majority of seats. It’s a fundamental flaw with a system laughingly called “democratic”: you don’t actually vote for the policies or the leader, you vote for a party who has voted for a candidate who has voted for a leader who has bolted together some policies to make the whole thing look as if they’re doing something to justify your vote. And this only every 3 or 4 years.
A majority of a majority isn’t always a majority (70% of 70% is only 49%).
“Nevertheless, in the interest of our country and its great people, I will meet with leaders of the intelligence community next week in order to be updated about the facts of this situation.”
Note the sequencing: first Trump declares an option, THEN he says he will try to be updated about the facts.
“Can you patent the "courage" required to remove the headphone jack?”
That’s the same courage it took to remove floppy disks, CD ROMs, modems and RS232 ports from desktop computers as well as the buttons from phones. The same courage to make USB, WiFi and BlueTooth standard on all of its devices.
Not all of Apple’s innovations have been stellar successes, some of them have indeed been trail blazers …
Biting the hand that feeds IT © 1998–2018