@ Fonts and Colors
You would be surprised how refreshing it is to look at raw data in solid and easy to read colors and fonts after being buried in black and white thinly lined code for hours and days...
116 posts • joined 8 Jan 2008
You are right. By taking basic computer principles (mathematics, encryption, CPU/Memory/Hard Disk speeds) and throwing them into an article, they were able to cloud the main details and make this event seem newsworthy. The real magic is that they took most of the CPU intensive work and utilized an 80 Gigabyte dictionary so that the CPU doesn't have much work remaining. At that point, WTF else is there besides some back-and-forth between disk and memory? And then, lo and behold, a faster hard disk gives better overall results. WOW! (sarcasm.)
Security guards do not need access to IT equipment other than camera screens displaying the inside of a secured IT center.
This screw up was like an IT guy having keys to the facility's weapons closet.
On a related tangent, I think it is documented psychology that power hungry people will often vie for positions that give them more power. Police work, security guard, etc. This is why it isn't uncommon for cops to screw with teenagers as retribution for some ill towards them in high school. It probably also fuels "hackers" intents to cause problems for other people as a way to even the score psychologically.
Wow fellas you guys sound about as kooky as this guy is made out to be. How about perhaps the lawsuit is based on his patriot concerns, having dedicated a significant portion of his entire life to stealth technologies? Maybe he just wants to ensure that a keystone aircraft in America's arsenal isn't... arse?
It is no small thing to present your name to the public indicating your intimate knowledge of a classified program, let alone directly challenge Lockheed Martin on a very sensitive subject. Ya'll think so hard you appear stupid.
Actually that is a great question, which I assume is related to why the writer mentioned OS and remote access software was not known.
But if you want a wild guess probably the simplest I can give is that perhaps the laptop was able to aquire the same DHCP IP because it was plugged back in to the same network that it was originally on? That is a wild guess of course because wouldn't the laptop be given a 192 address using WIFI?
There just isn't enough information to answer your not-too-daft question.
As is usually the case, it depends on how much you want to pay and what kind of risks you are willing to take.
A typical low end server, like perhaps a webserver, will have you running until your root disk mirror has lost enough disks, then you would want to schedule shutting down to replace any when convenient depending on what risks you would like to take and how many mirrors you have. You might have 4 disks in the mirror so you could run until two fail.
Or you could buy the extra array (This scales all the way up to clustering) and would not have to shut down ever except for the inevitable kernel patch(es) that require single user mode to install.
You could forgo the patch sets, but -might- be at risk. If your OS is hardened correctly you wouldn't have to patch but once a year though and not worry about being hacked depending on what apps you are supporting. It would be really wise for instance to patch Samba often if you have important data that hackerx shouldn't be getting to.
So the answer is, Solaris will run from either how long it takes your 1 internal disk to fail all the way up to never because you have enough cluster nodes and good sysadmins.
If it weren't for patch sets, there would be systems running here longer than my 5 years at this current job.
"Take your head out of the sand and realise there is real sunshine out there as opposed to the Sunshine you've been spoonfed."
Good point, and that must be the difference then because I see it from a US Federal spoon and you're coming from a UK/Europe telecoms view. For instance, I don't work there, but it would be some pretty wild shit to read that any important system at the Air Inteligence agency switched to Red Hat linux.
I still opine that Redhat's road to Redmond is not through Sunnyvale and they still have IBM to contend with even without Sun.
I bought a copy of BF 2142 a while ago using their download installer. God was I an idiot.
It wouldn't run (IMAGINE THAT!) because it couldn't --validate-- me using its mandatory computer Gestapo program. So I open a TT and get the usual guy from foreign country who doesn't want to help me; he wants to close a trouble ticket. I give him valid human information... he gives me cue cards in response, complete with questions I had already preemptively answered.
Turns out that the web interface had TWO ways to register/activate an account and they are two different accounts although they appear (graphically) the same, and because I had never used the one system, I activated an account on the new system, but some other underlying shadow system still did not have the account. Being in software development, and also kind of smart too (hah, sorry!) I noticed it, went the unique and undocumented registration route and lo and behold it worked. I instantly realised it was a systems design problem that EA probably had no clue about.
But it didn't matter to EA almost a year after the software was released, because they essentially didn't have to return people's money. They could drown out legitimate user problems with an Indian guy and cue cards. I hinted to the robot on the other end that I knew the problem and offered to explain it to him. Fuck if he cared, ticket closed.
This is something everyone knew was coming, but people can't seem to organize and boycot all of (Insert bad company's) products, which is what it takes -- Not just bitching about DRM or Spore and then turning around and buying it.
It is not so simple..
If you sign up with a medical condition or are more likely to get one while active duty, the Veterans Administration will eventually be footing the bill.
In essence the medical screen is a lot of things including a test to see how much of a return (or loss) on investment one would be.
And then of course there is a lot of entrenched tradition.
Are pretty obnoxious just to keep people buzzing.
That said, if this guy was completely serious then he is the real 'fail' in the article.
Google churning out software, whether well or poor, ultimately enhances the organization and its people.
Future software from said organization can only benefit.
-There should be a urinal cake icon for pedants
-The old man on the scooter chasing people would make a great icon.
-Someone mentioned a foaming beer mug icon, I second that.
There definately should be no icons supporting memes from other websites. It might be considered "humorous" or "witty" on slashdot. That tripe can stay on slashdot.
"You sadly fail at armchair psychology"
Nice, so you suggest that I was somehow "wrong" and then you hint that it wasn't psychology, rather, it was a form of probability mechanism imbedded in our minds that is the cause for the behavior?
I concede that you win at internet trolling and forming an argument where there is none.
"One last point to consider is that the FBI's explanation of the Ivins case supports the idea that it's elementary to engineer a biological attack. If Ivins, a single individual with no training in weaponization could do it, couldn't anyone?"
I think this is key to the whole thing; if the anthrax had been weaponized, a lot more people would have died.
Also, if specifically targeting Democrat Congressional offices for attacks and death did occur, as purported to support the passing of the Patriot act, then why don't we have more government conspiracies happening all the time? Because it is hard? Because government is so tight knit and shut lipped that they wait until they can make the perfect crime?
People that come up with consipracy theories may have a lot of knowledge about the opinions they are contending, but they suspiciously have zero knowledge of the government offices supposedly involved in these conspiracies. So they fill that unknown in to cognitively support whatever outrageous claim it is they are trying to make.
At any rate, the murders by anthrax are far less interesting than the demonstration of cognitive bias by the confused people who are contending government conspiracy.
Here is a nice list for your viewing pleasure:
No doubt, stupid NASA. The innocent victim in this case, and I'll take this directly from the article and bold it for you, is "THE ROCKET'S MAKER ALLIANT TECHSYSTEMS"
I'll forgive the obvious misguided attempt to bash a US government organization on the internet because it is so rarely done, and because NASA does have its failures (some colossal at that!).
Reducing their funding and increasing the bureaucracy over the past 50 or so years couldn't have helped.
Just remember, there are guys just like you who work at NASA. Lucky lucky NASA.
Has nothing to do with people making money off of sensationalism, smoke,
<-- here's a picture of a cute penguin.
and mirrors. As someone else pointed out, the Reg is known to do this often anyway, much like Slashdot. Hell, Copperfield made a career out of it.
The real problem is the people that keep visiting the site to prop up marketing revenue.
Back to the Reg; essentially if the Reg is a problem, then I am the problem because I support the website and the marketing revenue is because of readers like me.
That's exactly what will happen. So, I think the only obvious solution for brits to avoid this clearly dangerous situation is to ban guns. No, that won't do it! They ought to have CCTV posted everywhere as well.
Ahh shit, in order to be really safe from pedo schoolteachers and gun toting gangrapists, the british ought to employ everything from the book 1984.
That'll stop crime for sure!
In reality I think the real solution to crime is to get the criminals out of politics.
the paedo. He should get 15 years- that would provide the counseling he needs. The sick fuck should provide a year of his pay to the victim in this case- the kids, so that they can get counseling. Maybe the rest of the money can go to a support fund for abused children.
Sadly they shouldn't get any money for living though- it would just end up with more kids sucking dick. Sad sad world.
The DOD needs to make a new branch specifically for cyberwarfare if they deem it necessary (aside from the NSA).
That said, why doesn't the NSA just handle it? Or do we need a specific command complete with Media Relations officers so that dipshit Americans can be assured their data is safe via canned statements?
I like the going theme of taking stuff from the comic books and cartoon AKA half face and scare crow.
That said, maybe they could come up with some original shit instead of rerunning characters that have to fit a certain persona and name. Oh damn, did I just ask for creativity in media? Sorry about that.
I guess it kind of works out for me in a roundabout way- video games get more focus, talent, and money when people get sick of the Same Old Shit™
Guess it'll be more gaming media spending than dvd media spending in my future.
"I don't really see how anyone having my DNA, Car info etc is that bad."
James, we found your DNA at a crime scene and would like you to come down for questioning. Yes ,yes, of course you weren't involved. OK, sure you were never there. We're just going to put these cuffs on you and you'll be back in no time. By the way, is there some place your kids can stay for a week or longer, in case, you know, something happens?
That is precisely correct, and especially in the US military. As an Airman, this guy might have only had official duty days that were from 7:00 to 4:00 or whatnot, but the fact of the matter is he was Government property 24-7 for the entire duration of his enlistment. Does that mean they could raid his home and take his stuff? Not exactly, but he did, as the courts noticed, induce the Military to use his software, and for free.
This is typical with intelligent people who can write code/use the intarwebs/invent stuff; they make for dipshits when it comes to business sense and often common sense as well.
Biting the hand that feeds IT © 1998–2019