Reliable software wipeout of e.g. 1TB HDD would take about 12hours IIRC.
682 posts • joined 1 Aug 2008
Reliable software wipeout of e.g. 1TB HDD would take about 12hours IIRC.
They may also demand you to hand over your private ssh key's passphrase, so you will need to use password auth instead of pubkey one. Moreover, with known_hosts being accessible by third person for some time, you are vulnerable to MITM attack. Having paper printout of known_hosts with you all the time would help.
"More tech companies join anti-Trump battle, but why did some pay for his inauguration?"
WTF? These companies oppose one particular executive order, and not Trump in general.
I clone my repos by git+ssh. If I don't want to store 240GB locally, I just ssh to server and build it there. Or mount the repo via sshfs. There are also alternatives like CodaFS that can cache files locally, so...
If I understand correctly, to effectively operate a GVFS repo you need proprietary MS Team Services (WTF is that?) and open-source GVFS-enabled git client.
"GVFS relies on the GvFlt filter driver, available as a prerelease NuGet package with its own license."
Another proprietary piece of shit?
GlobalSign R2 and R4 bought by Google? Thanks for reporting this, I'm going to remove them from browser "trusted" list immediately.
"Apply that principle universally instead of just to things you can't be bothered learning"
Apply this principle to things that are forced on you by default, are not necessary (sysvinit is just fine) and come full with root escalation vulnerabilities. Apply this principles to "improvements" that "fix" things that ain't broke.
"it's still fairly straightforward to run the current Debian release using sysvinit instead".
Only if you run the current Debian release without desktop environment. All Debian's "task-desktop" variants, i.e. gnome, kde, lxde, xfce, mate and cinnamon _require_ systemd.
"Would that removal of systemd work for the latest Ubuntu/Mint too..? Has anyone tried it..?"
Most probably you won't be able to get rid of systemd on desktop machine as all major desktop environments (gnome, kde, lxde, xfce, mate and cinnamon) depend on systemd. At least that's how things are on Debian at the moment. On Ubuntu YMMV. You can switch to minimalistic window manager though (openbox, uwm, twm etc), it definitely would work.
"Was there a place where he tied off the electrical cord; balcony, stair railing, overhead light fixture . . . showing abrasion from the wire? Possibly a piece of the electrical cord still hanging? Or not?"
There's a link to PDF report in the article; on its page 4 it says a vacuum cleaner was fixed at the top of stairs and vacuum cleaner cord around Ian's neck.
Naming a US Aircraft Carrier Ship after Theodore Roosevelt was presumably too like getting a tattoo with their name?
Major Linux distributions what? Wait, all the two of them - Debian and RHEL? Oops, no, some "Ubunty" and "OpenSUSE" distros? Never heard of them before, why should I care?
"The agency believed their courier ruse had been necessary because, they claimed, intelligence had suggested that Love's computer equipment could be encrypted “at the press of a button”"
"the NCA denied that any such assurances would have been given, stating that “all officers at the scene were experienced Cyber investigators [who] would know the length of time it takes to forensically examine computers"
-- forensically examine their asses the only thing they would know. If they think typical (terabyte) HDD can become magically encrypted at the press of a button, they are idiots.
The consensus in international law is that a state does not have any obligation to surrender an alleged criminal to a foreign state, because one principle of sovereignty is that every state has legal authority over the people within its borders
Not in The United Fucking Kingdom, though.
"Some countries, such as Austria, Brazil, the Czech Republic, France, Germany, Japan, the People's Republic of China, the Republic of China (Taiwan), Russia and Switzerland forbid extradition of their own nationals."
> Less than 6 million settings
Read the https://github.com/Cr4sh/ThinkPwn first:
"It means that original vulnerability was fixed by Intel in the middle of 2014. Unfortunately, there was no any public adviosries, so, it's still not clear that Intel or Lenovo actualy knew about it. There's a high possibility that old Intel code with this vulnerability currently present in firmware of other OEM/IBV vendors."
> when the hardware constraint went away,
> narrow minded people didn't understand
> it was no longer the right way
When CPU power and screen estate became plenty, wide minded people decided that putting ability to execute code (or bytecode or whatever) in every image, data and hypertext format on the Internet was a great idea. Enjoy.
> I've used ImageMagick on Python sites as well; functionally it's miles ahead of PIL.
I used PIL with Python and GD with Perl just because I didn't like ImageMagick's bloat.
> So grsecurity react to a hole in grsecuritys software
> by banning anyone that mentions the issue in grsecurity's software?
I sent a patch to spender once and he just accepted it, without any Monty Python Shitfan Circus stuff.
Instead of focusing on the concept of freedom, guys here attempt at "clever" joking along the lines of "as it won't work in reverse and add back the data removed – this code could be banned by the law, too". Yeah, that's funny while it lasts, but I see no problem in fixing the proposed law so that everything is fine with jpegs and mpegs and shit while NSA is allowed to use strong crypto and you aren't.
> Perhaps I oughta spend less time on the
> range and more time in the shops!
perharps you should spend more time educating your gremlin self. Guided munitions start at $10000 per unit nowadays.
"...Garry Kondakov sent an email ... Kaspersky Lab says the email never existed."
Existense of the email can be verified with DKIM signature.
"The JunOS-based vSRX Firefly firewall covers basic functions like IPSec VPN, NAT, QoS and routing integration, threat management and intrusion prevention, and supports multiple CPUs, virtual NICs, and session-based forwarding."
Any GNU/Linux box would do the same just fine.
> where they've got too many models
the first thing Steve Jobs did when he'd returned to the Apple was to reduce number of Mac models to just four -- PowerBook, iBook, PowerMac and iMac. With phones you must only have 2 models -- PowerSamsungPhone and CheapSamsungPhone, and the Apple managed to do with just one, BTW.
All that high-end, medium and low-end is utter bullshit. It's either high or low, there's no middle ground.
There's a better option: http://en.wikipedia.org/wiki/DiskCryptor
MiniSIM is convenient for users, nanoSIM and softSIM aren't: you break your phone, you insert your miniSIM in another one and there you go. When your iPhone 5 starts acting strange, you dig up your trusty old RAZR V3 and what do you do? The damn iThing uses nanoSIM FFS!!! Try inserting it in RAZR to make and urgent call. Good luck.
While Marc has the right to believe that Snowden is a Russian spy (USA is supposedly a free country), his notion that the scale of operations of NSA and whatever Russian agency there is is comparable betrays lack of intellect.
illustrations for the latest (3rd) edition of Introduction to Algorithms have still been produced using MacDraw Pro, so what?
"AND get paid to do so AND you want to get paid a second time to celebrate your poor judgement?"
In fact, articles by mr.Dabbs, ms.Stob and probably by mr.Orlowsky are the only worth content on this site nowadays. Quality of other El Reg's content have fallen below the lowest ligger bottom IMNSHO.
Durov in Russian means "son (descendant) of a female fool".
JFYI, son of a male fool would be Durakov.
any criticism of ukrainian "government" gets deleted from their sites and Facebook accounts. "govt" "offenders" get blocked permanently.
rather, fool is incompatible with his company
you can use TOR and specify geoIP-based exit policy -- this way you can see the matrix from any viewpoint, including viewpoint of your fella merkins
why, not that ugly photo again...
P.S. If Sculley didn't fire Jobs, the Apple would sustain even heavier losses trying to produce and sell $10000 (a la NeXT) and $135000 (a la Pixar) computers.
"High-end" deals with LPC (low performance computing) then?
"had poor power consumption, had 2G only, had a poor camera, no video recording, no secondary camera, no expandable memory, no removable battery, no GPS, no 3rd party application support, silly SIM tray thing"
* "poor power consumption" - a lie. Lasted 2 days, the same as any touchscreen smartphone
* "2G only" - another lie. It had EDGE support (2.75G)
* "poor camera" - not needed in a phone, go buy yourself a proper gear
* "no video recording" - a lie. You could do that on a jailbroken iPhone
* "no secondary camera" - only needed for 3G and skype video calls, no big deal IMO
* "no expandable memory" - no need for this, just don't be cheap and buy 16GB version. If you fill 16GB fast and are unable to manage your data, then microSD cards won't help you too
* "no removable battery" - same as most smartphones today
* "no GPS" - not a big problem - very few phones had it built in at the time (e.g. Nokia E90)
* "no 3rd party application support" - clearly a lie, it was lacking only until iOS 2
* "silly SIM tray thing" - you call it silly? It's clearly a great feature, I liked it very much on Moto StarTAC 130 and on iPhone too. It allows you to swap SIM card on the fly - without turning phone off
"We laughed our heads off" - it seems you've remained in this state ever since.
Kibkalo is a ukrainian family nam, not Russian
Only yesterday night I managed to reset password for my WinXP JP edition using live-build, ntfs-3g and chntpw, and today I get the news that "Windows XP market share grows again"
IMHO it's more like "we need their money more than we care about freedom".
I use StarTAC 130 as my main phone, I store SMSes and contact list on SIM card. When somebody sends me UCS16 SMS (rare occasion) or I need to fetch my email via IMAP over GPRS or there's no GSM signal at 900MHz, I insert my SIM card to other (2.5G) phone.
Intel thinks it's news? Eye-Fi have been doing this for ages (camera writes image to SD mass storage device provided by SD card, then embedded CPU/OS running on the SD card uploads image to Eye-Fi server).
I agree fully -- the best way to know your frends better is to plant tracking devices into their pockets.
Mine with the one of course
Wrong. Sony is licensed to both Rockstar's and Android's patents, so it's entitled to use Rockstar technology [present in Android, if that's true].
fscked by SHA-1 collision? Not so fast, says Linus Torvalds