This is going to be ONE TOUGH WEEKEND!
15233 posts • joined 3 Jun 2008
This is going to be ONE TOUGH WEEKEND!
...the Feds' Summer of Exfiltrage.
Everyone is contributing to this show!
Watchdog fears it would be easier to throw away whole IT system and start again
What we have here is an electronic brownfield generator.
Gimp > Filters > Enhance > Sharpen
I guess that's the one. As it runs the heat diffusion process in reverse, which is not uniquely determined, artifacts may appear indeed.
discovered during a product demo
"And here we see that data was copied to an IP address in .... ?"
T-Rex teleports into a Dilbert strip!
NOTHING TO HIDE, NOTHING TO FEAR!
NOTHING TO HIDE, NOTHING TO FEAR!
NOTHING TO HIDE, NOTHING TO FEAR!
That's a bug that is not apparent, for example a null-pointer exception that has not manifested yet. It generally indicates the use of imperative languages firmly rooted in the 60s, scant knowledge of development hygiene and/or the presence of hot-shot programmers who are actually too green to know what they are doing.
For this kind of over-the-top X-files levels of security I would hope that they are finishing Himmler's plan to summon the Ancients using hebrew letters cunningly painted in silver inside a pentagram shape (I suppose the Bilderbergs have lore on this, right?)
Then Google wonks will try to tame it and connect it to us all: "Search Ancient wisdom directly using the new Google brain interface"
When the sheeple wake up, it will be too late and ISIS will be the last chance of humanity...
Hairball as a Service!
Argh, it has been fixed.
It's too late. It was always too late...
TL;DR? Why not just go watch another five second video of a kitten with its head in a toilet roll, or a 140 character description of a meal your friend just stuffed in their mouth. "nom nom". This blog post is not for you.
Anyone who uses verbiage like that is ready for the shrink, a nice uniform with dangling runes, or both.
And open-source projects are ultimately just as vulnerable to disappearing.
No they aren't. You can put someone from your team on it and fork away. How hard is that? Not enough skills? You have another problem.
The ending just disappeared!
It is highly specialised targeting the machinery in use at Natanz
Very highly specialized, indeed.
I don't think that a few more gallons of fossil fuels will make a whole lot of difference.
With the fuel burned playing air force for Al Qaeda in Yemen one could probably go to Street View version 10'000.
This one will go into the books.
...and dropping the telegrams from Washington D.C. into the trash w/o reading, evidently.
The "rapprochement" with Russia in particular excites the lifeforms inside the beltway.
But she's still panging the birth of the New Middle East.
Computer malware and scripts that featured in the attack were typed out on a Cyrillic keyboard and compiled during office hours in Moscow and St. Petersburg.
They must have hired a french voyante with a Crystal Ball.
"We suspect that this activity aligns with Russia’s institutionalized systematic “trolling” – devoting substantive resources to full-time staff who plant comments and content online that is often disruptive, and always favourable to President Putin," FireEye concludes.
Favoring President Putin is not be the thing to do, I suppose.
the BBC reports
The BBC also reports a whole lot of crap on the world political situation that is of bereft of much grounding in reality. I notice that the trade union building in Odessa still "somehow caught fire" in that world.
My morning coffee!
OLE for Process Control
Ayee! They are heading in the direction of the customer for "unlawful obtention of trade secrets and reverse-engineering of copyrighted security code contrary to section ARSE paragraph SHIT of the DMCA".
My god has left me, only vapors remain over Hellas!
You may want https-over-http tunnelling protocol. Fat blobs of BASE64-encoded stuff in the http exchange? Suits you, sir.
But there is still much cancer in many locations. The doctor is still unsure about the prognosis!
The most critical problem facing the world is frankly 100% inbred politicians like Obama.
Can anybody please, please, please SHOOT THESE PEOPLE?
They can then get a tombstone of undestructible Poly(methyl methacrylate) with the inscription "here lies gonzo programmer; he insisted on using C-style languages without a safety net"
are a great bunch of people who deserve a pay rise for their invaluable work (just in case they're reading this)
They are the state bureaucracy. They vote themselves their own payrises, numbskull!
No need to sweettalk yourself into a job in the comment section either.
How did you lose this ... V-Giny?
The Bubble is a perfect sphere, twelve billion kilometres in radius (about twice as wide as the orbit of Pluto), and centred on the sun. It came into being as a whole, in an instant — but because the Earth was eight light-minutes from its centre, the time lag before the last starlight reached us varied across the sky, giving rise to the growing circle of darkness. Stars vanished first from the direction in which The Bubble was closest, and last where it was furthest away — precisely behind the sun.
The Bubble presents an immaterial surface which behaves, in many ways, like a concave version of a black hole’s event horizon. It absorbs sunlight perfectly, and emits nothing but a featureless trickle of thermal radiation (far colder than the cosmic microwave background, which no longer reaches us). Probes which approach the surface undergo red shift and time dilation — but experience no measurable gravitational force to explain these effects. Those on orbits which intersect the sphere appear to crawl to an asymptotic halt and fade to black; most physicists believe that in the probe’s local time, it swiftly passes through The Bubble, unimpeded — but they’re equally sure that it does so in our infinitely distant future. Whether or not there are further barriers beyond is unknown — and even if there are not, whether an astronaut who took the one-way voyage would find the universe outside unaged, or would emerge just in time to witness the moment of its extinction, remains an open question.
And having brought at least one of them back, he'll retreat to his perfect-acoustics room, fit that last stylus and...
... hears LBJ telling the story of who REALLY killed JFK.
Why is that guy not safe for Voyager?
I thought the conclusion was that quantities of AA were overall maybe, possibly not that important. Because the heart will go first...
Just by having a significant proportion of faultless robo drivers won't make the meatbags drive more recklessly thus raising premiums.
You seem to assume that the insurance market is a monopoly. Not so. "Do you own a robo-car? Our premiums are 30% less than the competition, and we will thrown in a free lawyer in case of accident against meatbags. Call 1-800-DRIVERATOR now!"
the only thing you might mistake a G-car for is this
Wait until it deploys katana-armed robotic arms.
If it is this one, it will surprise you that it is based on TCP/IP among others.
Sounds like a standard identification method, like, you know, exchange of certificates in SSL...
See also RFC6538
The Host Identity Protocol architecture introduces a new namespace, the "host identity" namespace, to the Internet architecture. The express purpose of this new namespace is to allow for the decoupling of identifiers (host identities) and locators (IP addresses) at the internetworking layer of the architecture. The contributors to HIP have expected that HIP will enable alternative solutions for several of the Internet's challenging technical problems, including potentially host mobility, host multihoming, site multihoming, IPv6 transition, NAT traversal, and network-level security. Although there have been many architectural proposals to decouple identifiers and locators over the past 20 years, HIP is one of the most actively developed proposals in this area [book.gurtov].
The Host Identity Protocol itself provides a rapid exchange of host identities (public keys) between hosts and uses a Diffie-Hellman key exchange that is compliant with Sigma ("SIGn-and-MAc") to establish shared secrets between such endpoints [RFC5201]. The protocol is designed to be resistant to Denial-of-Service (DoS) and Man-in-the-Middle (MitM) attacks, and when used together with another suitable security protocol, such as Encapsulated Security Payload (ESP) [RFC4303], it provides encryption and/or authentication protection for upper-layer protocols such as TCP and UDP, while enabling continuity of communications across network-layer address changes.
The primary reason given for the changes is to stop
repressivedesignated regimes THAT ARE NOT DANCING TO UNCLE SAM'S MAD PIPING around the world from buying sophisticated software that can be used to spy on political opponents and others.
Did I mention that the staunch supporter of
NATO"freedom", Monsieur Saakashwili, currently on the run from his own home country for various kinds of nastiness, has just been appointed governor of the freedom-loving Ukrainian province of Odessa? Seriously. Can I export debuggers to Ukraine now?
It's time to tell the USA to go be barking mad elsewhere until it gets better.
Did you miss another T in that?
Not this is correct. As is the case with "PATRIOT" and "FREEDOM", USAnians like to have loud-sounding acronyms to cover a sordid reality. I suppose it was meant to be FATCAT but I guess that would have sounded too much like old-style german word-smithery about removing certain ethnic groups from premises, even in the current mindset of obtaining total state control over pretty much everything.
And make sure your problem Is not a Sony!
Do not be of grammar nazi, comrade!
TCP/IP is not appropriate for 21st century needs
Yeah well maybe you should go back to the course on "Infosec 101" because if you think TCP/IP is the problem, I have a bridge in lower Manhattan, very cheap...
"He overdosed on alcohol? Clearly the fault of the glass bottles!"
Data communication must be encrypted at the SOURCE, by DEFAULT, across the world. Period. Anything else is simply a continuous data theft, waiting to happen.
You may want to explain how encrypting data communications will prohibit data being exfiltrated in the first place. Your voodoo is weak...
Ok, start with The Orange Book and work your way forward, slowly...
Bind still exists? That's so "TLD requested by several applicants that is pending at ICANN" it's sad.
Biting the hand that feeds IT © 1998–2017