Re: I can believe her
But she's still panging the birth of the New Middle East.
15010 posts • joined 3 Jun 2008
But she's still panging the birth of the New Middle East.
Computer malware and scripts that featured in the attack were typed out on a Cyrillic keyboard and compiled during office hours in Moscow and St. Petersburg.
They must have hired a french voyante with a Crystal Ball.
"We suspect that this activity aligns with Russia’s institutionalized systematic “trolling” – devoting substantive resources to full-time staff who plant comments and content online that is often disruptive, and always favourable to President Putin," FireEye concludes.
Favoring President Putin is not be the thing to do, I suppose.
the BBC reports
The BBC also reports a whole lot of crap on the world political situation that is of bereft of much grounding in reality. I notice that the trade union building in Odessa still "somehow caught fire" in that world.
My morning coffee!
OLE for Process Control
Ayee! They are heading in the direction of the customer for "unlawful obtention of trade secrets and reverse-engineering of copyrighted security code contrary to section ARSE paragraph SHIT of the DMCA".
My god has left me, only vapors remain over Hellas!
You may want https-over-http tunnelling protocol. Fat blobs of BASE64-encoded stuff in the http exchange? Suits you, sir.
But there is still much cancer in many locations. The doctor is still unsure about the prognosis!
The most critical problem facing the world is frankly 100% inbred politicians like Obama.
Can anybody please, please, please SHOOT THESE PEOPLE?
They can then get a tombstone of undestructible Poly(methyl methacrylate) with the inscription "here lies gonzo programmer; he insisted on using C-style languages without a safety net"
are a great bunch of people who deserve a pay rise for their invaluable work (just in case they're reading this)
They are the state bureaucracy. They vote themselves their own payrises, numbskull!
No need to sweettalk yourself into a job in the comment section either.
How did you lose this ... V-Giny?
The Bubble is a perfect sphere, twelve billion kilometres in radius (about twice as wide as the orbit of Pluto), and centred on the sun. It came into being as a whole, in an instant — but because the Earth was eight light-minutes from its centre, the time lag before the last starlight reached us varied across the sky, giving rise to the growing circle of darkness. Stars vanished first from the direction in which The Bubble was closest, and last where it was furthest away — precisely behind the sun.
The Bubble presents an immaterial surface which behaves, in many ways, like a concave version of a black hole’s event horizon. It absorbs sunlight perfectly, and emits nothing but a featureless trickle of thermal radiation (far colder than the cosmic microwave background, which no longer reaches us). Probes which approach the surface undergo red shift and time dilation — but experience no measurable gravitational force to explain these effects. Those on orbits which intersect the sphere appear to crawl to an asymptotic halt and fade to black; most physicists believe that in the probe’s local time, it swiftly passes through The Bubble, unimpeded — but they’re equally sure that it does so in our infinitely distant future. Whether or not there are further barriers beyond is unknown — and even if there are not, whether an astronaut who took the one-way voyage would find the universe outside unaged, or would emerge just in time to witness the moment of its extinction, remains an open question.
And having brought at least one of them back, he'll retreat to his perfect-acoustics room, fit that last stylus and...
... hears LBJ telling the story of who REALLY killed JFK.
Why is that guy not safe for Voyager?
I thought the conclusion was that quantities of AA were overall maybe, possibly not that important. Because the heart will go first...
Just by having a significant proportion of faultless robo drivers won't make the meatbags drive more recklessly thus raising premiums.
You seem to assume that the insurance market is a monopoly. Not so. "Do you own a robo-car? Our premiums are 30% less than the competition, and we will thrown in a free lawyer in case of accident against meatbags. Call 1-800-DRIVERATOR now!"
the only thing you might mistake a G-car for is this
Wait until it deploys katana-armed robotic arms.
If it is this one, it will surprise you that it is based on TCP/IP among others.
Sounds like a standard identification method, like, you know, exchange of certificates in SSL...
See also RFC6538
The Host Identity Protocol architecture introduces a new namespace, the "host identity" namespace, to the Internet architecture. The express purpose of this new namespace is to allow for the decoupling of identifiers (host identities) and locators (IP addresses) at the internetworking layer of the architecture. The contributors to HIP have expected that HIP will enable alternative solutions for several of the Internet's challenging technical problems, including potentially host mobility, host multihoming, site multihoming, IPv6 transition, NAT traversal, and network-level security. Although there have been many architectural proposals to decouple identifiers and locators over the past 20 years, HIP is one of the most actively developed proposals in this area [book.gurtov].
The Host Identity Protocol itself provides a rapid exchange of host identities (public keys) between hosts and uses a Diffie-Hellman key exchange that is compliant with Sigma ("SIGn-and-MAc") to establish shared secrets between such endpoints [RFC5201]. The protocol is designed to be resistant to Denial-of-Service (DoS) and Man-in-the-Middle (MitM) attacks, and when used together with another suitable security protocol, such as Encapsulated Security Payload (ESP) [RFC4303], it provides encryption and/or authentication protection for upper-layer protocols such as TCP and UDP, while enabling continuity of communications across network-layer address changes.
The primary reason given for the changes is to stop
repressivedesignated regimes THAT ARE NOT DANCING TO UNCLE SAM'S MAD PIPING around the world from buying sophisticated software that can be used to spy on political opponents and others.
Did I mention that the staunch supporter of
NATO"freedom", Monsieur Saakashwili, currently on the run from his own home country for various kinds of nastiness, has just been appointed governor of the freedom-loving Ukrainian province of Odessa? Seriously. Can I export debuggers to Ukraine now?
It's time to tell the USA to go be barking mad elsewhere until it gets better.
Did you miss another T in that?
Not this is correct. As is the case with "PATRIOT" and "FREEDOM", USAnians like to have loud-sounding acronyms to cover a sordid reality. I suppose it was meant to be FATCAT but I guess that would have sounded too much like old-style german word-smithery about removing certain ethnic groups from premises, even in the current mindset of obtaining total state control over pretty much everything.
And make sure your problem Is not a Sony!
Do not be of grammar nazi, comrade!
TCP/IP is not appropriate for 21st century needs
Yeah well maybe you should go back to the course on "Infosec 101" because if you think TCP/IP is the problem, I have a bridge in lower Manhattan, very cheap...
"He overdosed on alcohol? Clearly the fault of the glass bottles!"
Data communication must be encrypted at the SOURCE, by DEFAULT, across the world. Period. Anything else is simply a continuous data theft, waiting to happen.
You may want to explain how encrypting data communications will prohibit data being exfiltrated in the first place. Your voodoo is weak...
Ok, start with The Orange Book and work your way forward, slowly...
Bind still exists? That's so "TLD requested by several applicants that is pending at ICANN" it's sad.
I hate to break it to you but unless you pass through a forwarding service there better be. Unless you DON'T want to do business. Of course, for a generic shock site that's probably not the goal...
It must be banned not because of socialism but because Uncle Sam is already missing 120 trillion dollar to pay for THE OTHER social services.
NSA presently is being savaged
The smallest fiddle in the world is heard playing.
Alos, 5 minutes until the suggestion emerges that the breach was actually due to the 5-minute interruption in metadata collection between the sunsetting of the P.A.T.R.I.O.T. act and the inception of the F.R.E.E.D.O.M. act.
The important part however is that without Wikileaks publishing this treaty no one outside government teams and large corporates would have any idea what was law until it was passed: something that rankles, especially in the era of the internet.
There must be 10⁴ copies of this shit floating around on the devoces (mobile or otherwise) less-than-practically.skilled-in-IT political operators. How come nobody has dropped core onto the sidewalk yet?
You can be sure that escrow will continue to be acceptable practice. Assholes refusing to conform will just suddenly have no customers. No code in the notary's safe? No deal!
Indeed, in my book, we are now in the era where inspectable open source code (and not only "read after my death" escrow) is becoming necessary in quite a few business dealings.
BSides offers a genuine sense of community and upbeat, unfussy vibe
What the fuck am I doing on my (expletives hurtful to the GLBT community) job ;_;
Indeed! Entire WAREHOUSES of ghostly Microsoft IP have DISAPPEARED without a trace.
In an emergency those LAND LINES could be OVERLOADED...or worse, CUT.
That EMERGENCY would then turn out to be a SKOOL SHOOTING, in which case you would be in a DIRE PICKLE as all the blue-clad people meant to "guard the campus" (i.e. harass and taser students for incontinent speech freedomization) would have left due to ELF AND SAFETY regualtions, waiting for the SWAT team to arrive. Which would then trundle in about 4h later.
For example, it seeks to extend American copyright laws to participating nations, possibly even going so far as to make ISPs responsible for any copyright infringement by their users, and impose criminal charges on downloaders.
National laws are not passed via secret treaties, bilateral or otherwise. They need to be voted on by parliament. These things are null and void. Next there will be secret ententes promising military assistance in case bullshit happens during dickwaving with the neighbours. Oh wait...
We just don't know.
Cue ominous music: "Probably not a problem"
"Collisions releasing greater energy occur millions of times a day in the earth's atmosphere and nothing terrible happens."
More on this: The Particle That Broke a Cosmic Speed Limit: Physicists are beginning to unravel the mysteries of ultrahigh-energy cosmic rays, particles accelerated by the most powerful forces in the universe.
One can apparently have fun with Smartphones used as cosmic ray detectors: crayfis.io
The Snowdens of yesteryear warned us about this!
MUH LOSS OF CONTROL OVER MUH IP!
This is the IT equivalent of a fart joke.
Yum update food!
It's finger-licking good?
It's like chemo has been successfully applied.
Next: disallow IPv4. Only IPv6 allowed here, so soorrreeee...
You mean the bizarrotardo button that is "powered by Telefonica" (who?) that invites you to "Start a conversation" or WebRTC?
I joked with Microsoft that the release would include manga wallpaper. After all, that reflects the Insiders' tastes pretty well.
I hate to say it, but ALL of the tech is determined by the "Insiders". The fact that a "Start Button" has become lore and part of the expectation does not mean it comes from "Outsiders" or is a good idea.
Yup. It's not like there are any unsolved mysteries of computation locked up in there. Into the trash it goes!
Why doesn't the BND add selectors for Trojans and send those to the NSA, who will analyze them and then warn of an intrusion
In which part of the multiverse would this actually work? How can you select for Trojans, why would the NSA analyze them and why would it warn anyone of anything?
So, unless you use WSUS your are assumed to be in a crappy consumer setting feeding on consumer shit (like, I suppose, Windows) and addies can be pushed into your face?
Great marketing logic.
Biting the hand that feeds IT © 1998–2017