Infatuation - No - GREED YES
How big are the backhanders that Pai and the other FCC commissioners getting?
For enough money, many people are prepared to look stupid.
418 posts • joined 20 Mar 2009
How big are the backhanders that Pai and the other FCC commissioners getting?
For enough money, many people are prepared to look stupid.
ADSL is often run from street cabinets where the distance (and/or cable quality) make running ADSL from exchanges impractical (FTTC - fibre to the cabinet with ADSL for the last hop is not uncommon).
Depending on local conditions, connecting a mobile network mast by a fibre link in a nearby cabinet may be the most economic method. (As BT owns a lot of cabinets with fibre connections and also has a lot of mobile network masts, I would be surprised if they do not use this method on occasion.)
As MS written browsers have such a horrible security record, I have disabled their internet access on my systems (by using the program control feature of the firewall in Norton). I use Firefox with Noscript and AdBlockPlus instead - while not perfect it is better than the offerings from MS. I also went through the settings in IE and Edge to disable every feature that I could to try to reduce the damage if they somehow got internet access.
If AdBlockPlus, NoScript and Password Exporter are not all available then I will NOT be changing to Firefox 57. (I have just downloaded PaleMoon to give it a test.) I was already upset when a previous "upgrade" broke EPUBreader (the current version is far worse than the old version).
Why would the current Republican rulers of the US state of Georgia want honest elections - the current electronic voting machines make it easy for them to stay in power.
If you were an enemy - would you prefer your opponent to be led by an incompetent blowhard or by a malevolent witch. Answer that question and you can see why Putin prefers Trump as US President.
As most mobile phones are running old versions of software for which no upgrades are possible (eg my Android phone runs on 4.2.1), the platform is insecure. It does not matter how good the app is if something in the background can intercept every keystroke/finger tap. In my opinion mobile phones are unsuitable for banking. (To pay for apps on the Play Store, I use prepaid Play Store gift cards - there is no bank or credit card usage on my phone at all.)
An app running on a PC or MAC with the latest security updates and a good antivirus package MAY be secure, however I trust Firefox with Noscript and AdBlockPlus more than an app written by a bank that probably got its code written by the lowest bidder in India.
Looking at the detailed report - AES 256 encryption is used with everything that supports it (the significant exceptions were Android 2.3.7 and IE8 on XP which no sensible person should be using for online banking). TLS 1.3 is not supported but as the draft was only published in April 2017 this is not surprising. Diffie-Hellman key exchange was not used with any of the simulated browsers (RSA was used instead) so the fact that the server supports the DH key exchange does not have much impact on security.
The Tech Report SSD endurance test (http://techreport.com/review/27909/the-ssd-endurance-experiment-theyre-all-dead) indicates that the life of SSDs is considerably higher than the manufacturers claims.
The 960 pro uses V-NAND in MLC mode (2 bits/cell) and as V-NAND has larger feature sizes than planar NAND, the lifespan should be even higher than in the Tech Report test.
(The 256Gb 840 pro managed over 2PB written - just allowing for the larger flash array a 2TB 960 pro drive should manage over 16PB and allowing for the larger feature size of V-NAND would probably manage over 20PB written.)
How many enterprise hard disks ever have 8000 total drives writes during their working life?
There are good open source encryption programs (eg AESCrypt, GnuPG, 7-Zip) that make "rubber hose" decryption the only way of recovering the data if the user has been careful.
For transmitting a message to another person without leaving the usual traces, USENET can be used. There are several newsgroups that often have encrypted ZIP or RAR files. If a message is placed in one of those groups, it will be replicated to servers across the world. It would be difficult to determine who had read the message (as against just downloading all the new messages on a newsgroup).
For the AES key - use a known part of a 7-zip encrypted jpeg (The password for 7-zip can be something easy to remember, the jpeg being an innocent file can be carried through customs on an SD card in a camera or phone or be a known image on a website.) Example encrypt a file "swimwear.jpg" with 7-zip using password "beach party" then take bytes 5001 to 5032 of the zip as the AES 256 bit key. Without knowing which jpeg, 7-zip password and offset into the 7-zip encrypted file is used to generate the AES 256 bit key there is no real way to decrypt the message. (The offset should change each day so that breaking one message does not allow others to be broken.)
The encryption and decryption should be done on a standalone system (no internet connection or hard disk) that boots a version of Linux from a DVD. All data transfers to and from this system should be done by a SD card or USB memory stick that is destroyed after use.
(For real paranoia - do the encryption and decryption in an underground Faraday cage to reduce any possibility of sniffing the data by radio methods.)
And if you want to be nasty - have a few dozen micro SD cards with really toxic contents (such as episodes of X factor or Emmerdale) to distract the G-men while keeping the secure data elsewhere in an encrypted file on a cloud server.
Are there ANY home routers that do not have security holes that could allow them to be taken over as part of a botnet? If so please name them.
Filing a lawsuit is one thing - getting it heard may be another. If there are too many GDPR cases filed then it could take a long time for them to be heard by the courts. (Most courts already have large caseloads and there are complaints about too many cases and too few judges.) Unlike PPI where most cases were straightforward and well documented there will be a lot of variation between GDPR cases and judges will have to decide in each case whether there was a significant breach and what (if anything) is the correct amount of the penalty.
(Crudely - having and releasing private details on all the UK population has a maximum penalty of £20m or 4% so what is the correct level of penalty if data on only 100 people is involved. That is a matter for the judge to decide depending on the circumstances. Also either side could appeal which would result in even more court backlogs.)
Unless the CRM system is completely stupid it will be able to do database exports and imports. If so then (if there is no better way) the deleted data can be removed by exporting the non-deleted records then dropping the database tables and recreating them from the exported records.
Another possible alternative (depending on the database structure and the CRM programs) would be to overwrite the data in the "deleted" records - replace all the text with a load of XXXXXXXXXXX , change all personal names to "John Smith", change all NI numbers to "VV123456Z", change all company names to "Fake Company", change all phone numbers to "0123456789" and change all addresses to "House of Commons London SW1A 0AA" - this should remove the personal information.
For a dedupe hash to be useful it needs to be smaller than the data block (otherwise the data block itself would be a better index). This implies that there will be hash clashes where two or more different data block have the same hash value. Because of this a dedupe tool has to compare the data blocks when there is a hash match to avoid losing or corrupting data. Using an easier hashing algorithm may increase the number of duplicates but will reduce the time spent calculating the hash. (Eg using a 64 bit CRC as the hash instead of a SHA-512 will slightly increase the number of hash collisions but will require less effort to compute.)
For the mass market products such as Windows and Office that just need keys to activate a free download the sanctions are impossible to enforce. Anyone can go into the local equivalent of PC World and buy a key for Windows or Office then send the key by email to someone in Russia. At most it would add a pound or two to the cost of the product.
The bill is designed to be confusing so that they can prosecute anyone they want while exonerating anything that the spying services do.
Agreed - see the Wikipedia article on Atomic Diffusion for a good illustration.
Why would any sane organization want to use yet more Oracle software ?
Also a bug in the "automated DBA" could result in multiple companies databases crashing at the same time.
If you are Mr Evil Guy with a drone with a nasty payload wanting to get it through an anti-drone defense system then sending a group of decoy drones at the same time as the nasty one could greatly increase the chance of the payload hitting its target. Basic drones cost under £1k each so expending a few to get the payload to its target could be cost effective. It also requires the defender to spend much more money for a more capable defense system for each target that needs defending.
The water cannon defense has severe limitations - a hostile drone can fly at 1000ft AGL, come to a hover over the target (still at 1000ft AGL) and drop its payload without coming within range of a water cannon.
Drones could also be programmed to fly evasive maneuvers near the target to make it more difficult for the anti-drone defenses.
Drones (like IEDs) make the defender expend far more money and effort than the attacker and for the same reason - the defender does not know where the next attack will be.
It means that you are safe from the patents that RedHat owns. No one could provide protection against third party patents (or even list them all - there are too many).
Calibre is far better than Edge for handling EPUB files.
And who uses Bing as their first choice search engine?
My own opinion of Edge and IE 11 is so bad that I have used the Program Control feature of the Firewall built into Norton Security to block both of these products (and Cortana) from internet access.
The PV panels on a satellite accept a wide range of light frequencies and have a wide acceptance angle so as to get power even if the panel is not perfectly aligned with the sun. This implies that along with the desired signal from the LEDs on the ground there will be a huge amount of background noise from all the artificial lights on Earth (in nighttime) or from the reflection of the Sun's light (in daytime). The resulting signal to noise ratio will be horrible. (Look at pictures of nighttime Earth from space to see the amount of light emitted.) A lens and a narrow band optical filter could improve the S/N ratio by 40dB or more compared to the PV panels.
No - the US companies will put their own badges on Chinese products and sell them to the US government for 3 times the price!!!
The ever changing project requirements have been around in computing since well before the internet.
If your project does not have at least the majority of its requirements defined before the design phase then the result is certain to be a failure - unfortunately there are too many bosses that think the requirements can be changed at any time (including the test phase) without increasing the timescale.
Actually in "The Year of the Jackpot" story - you would live a bit longer at the bottom of the deepest mine and even longer (a few tens of minutes!) on the equator on the far side of the Earth from the Sun. (Hills would be no protection!!)
If I read this correctly, the attacker needs physical access to the target device to exploit any of these vulnerabilities. If that is true then this is only a problem for a person that gets a pre-infected phone (eg a NSA target) or a person that lets a malicious person (say in a phone repair shop) have control of his/her phone.
Good quality encryption is already in the public domain (eg OpenPGP ) and any attempt to insert a backdoor is very unlikely to succeed when the source is publicly available.
For people who REALLY want to keep information secret - it is possible to use multiple encryption programs in series (eg use 7-Zip to create a password protected Zip file then use ccrypt to encrypt the Zip file then use OpenPGP to encrypt the output from ccrypt.). Done properly there is no way of recovering the original message without knowing the keys even if one of the programs has a backdoor.
The charging station needs a LARGE electrical energy capacity (or a permanent cable to an external generator).
In hostile waters, the charging station would probably need to be either a large drone to allow it to get to a suitable location or an air dropped disposable charger. As the drones to be charged have to find the charger, it will need to emit some signal (probably acoustic) that the drones can detect. The presence of the signal would however tell any enemy that there are drones working nearby and where the charger is.
In friendly waters, a grid connected charger or a towed charger (if too far from mains electricity) would be possible.
How long before the Internet wakes up?
5000 kilometres depth not 5000 metres
the two other planets - should be - the two outer planets
And who is to replace them?
Of the current SF authors only David Weber is of the same level as the great SF authors of the past (Heinlein, Norton, Asimov, Brunner, Bradley, Clarke, E.E. Smith etc) and he is over 60.
As there has to be a controller inside each SSD to handle the mechanics of block allocation, wear leveling etc, it would be feasible to have RAID 1 logic inside this controller with 2 flash arrays on the SSD. (Higher RAID levels would probably not be feasible due to the increased complexity and overheads.)
Their current Falcon 9 (in maximum performance mode - no attempt to reuse the first stage booster) can already get a heavy payload to GTO (flight 38 carried a 6761kg Intelsat payload). This is more than enough lift capability to get a third stage with a payload of a few hundred kg to lunar orbit. (As the third stage would already be at orbital velocity, it would not need a large engine - just large fuel tanks)
How long before 50% (let alone 100%) of companies comply with the regulations ?
For fun - just imagine 1% of the users of Microsoft products query M$ for the data that M$ hold on them (or the same for Google !!!).
How many firms are going to go back over their archival backups to delete individual's data ?
Accounting records have to be kept in the UK for a number of years - how does this interact with the GDPR? If a user requests that his data is deleted - does this then have to happen when the retention period required by tax lax expires?
For a closed source implementation (eq most Windows programs) there is a danger that a deliberately weakened random number generator is used. If the public/private key pair is generated with only 32 bits of randomness instead of 2048 or 4096 then breaking would be easy for the NSA. This would not be easily apparent to the users of such compromised software as all the key exchange protocols would proceed as normal.
Note such a flaw could already have been placed in IE/Edge at the request of the NSA and there would nothing to indicate the problem to users. (Make 96 bits of the 128 bit AES encryption key depend on the other 32 bits and the NSA has an easy decryption job.)
If you use Usenet newsgroups then you can hide the destination of a message. A newsgroup message is a one to many broadcast. If a busy newsgroup is used then it becomes almost impossible to detect who is the intended recipient.
How many P100s could you stick onto an AMD EPYC processor ? (And how big would the case and PSU need to be to handle them all !!! )
The NHS has a lot of computer controlled equipment that is mission critical (eg CAT scanners). Until (and unless) the supplier of the equipment has confirmed that a particular Windows update is safe, the NHS would be risking the continued use of the vital equipment if it performed an update. (If the supplier has gone out of business or no longer supports the equipment then there is a real problem.) I do not blame the NHS for use of old software for such equipment.
However the NHS also has a LOT of CRAP OBSOLETE software that relies on things like IE6 and ActiveX because no one ever was prepared to pay for it to be upgraded. This is the fault of the NHS and its paymasters who have left it with insufficient money to handle day to day activities let alone needed software upgrades.
What will happen to Equustek if Google complies with this order by not returning ANY results for a query that includes the word EQUUSTEK ?
This will probably kill Equustek as they would lose so much business.
Even a trace of grease from fingerprints is going to be enough to kill the anti reflection property. This would only be suitable for a NON-touchscreen device such as a wall mounted TV.
If you encrypt/decrypt the messages on an offline system with no internet connection and use a good encryption package (eg OpenPGP) then there is NO way that the messages can be decrypted in real time. (The only decryption that can be done depends on forcing the the key from the recipient - for example by torture.)
Simple - gravitational energy - a body falling from 30000 feet in earths gravity would attain a speed of over 400 m/s in a vacuum. This energy will be provided to the rocket by the plane rather than by burning its own fuel.
The 400 m/s extra from equatorial launch probably includes the gain from not needing the orbital plane correction - the rotational velocity change between the equator and Cape Canaveral is about 200 m/s. I was not sure of the amount of energy consumed by the correction which is why I showed it as ??? .
I am not a rocket design engineer so I did not know how much advantage the reduced atmospheric pressure would give to the performance of the engine so I left this out of the list of advantages.
Existing large rockets need big expensive launch facilities - with a lot of unoccupied land around to handle the occasional large bang.Doing an air launch over an ocean removes the need for the ground based launch facility. There is also the advantage that the rocket can start in the desired orbital plane rather than having to expend fuel to allow for the difference between the desired orbital plane and the launch site (eg an equatorial orbit when launched from Cape Canaveral wastes quite a lot of fuel due to the launch point being over 28 degrees north of the equator.) For an equatorial orbit there is an additional 200 km/h advantage from launching from the equator rather than Cape Canaveral from the earth's rotational speed.
The speed benefits
1) Starting at 30000 feet instead of sea level - equivalent to over 400 m/s
2) Equatorial launch (instead of Cape Canaveral) - equivalent to 200 km/h
3) Plane velocity - around 200 m/s
4) Orbital plane correction - ??? km/h
There is an additional benefit from an air launch - the maximum dynamic pressure will be reduced as the spacecraft will be in thinner air than for a ground launch for any given supersonic speed.
Could it be that the support team that is now in India cannot access the systems to restart them ?
Restart often needs hands on staff to push buttons and enter initial commands.
Just include footage from local traffic cameras - boring as hell - but so what it is local content!!!
(If traffic camera footage is not available for some reason - use videos of cattle or sheep grazing.)
If they want to include "artistic" performances then see if any churches would like any of their services videoed. Also see if local TV news services would like their programs copied onto Netflix etc.
Anyone who wants can set up a use once and throw away hotmail or gmail account for the registration and use a name and address from the electoral roll. The only people who will be badly affected by DJI are the law abiding majority - anyone intending to break the rules will use a fake registration.
In rural areas drone deliveries could be useful to reduce the number of van miles per package. In built up areas there is usually a number of nearby deliveries that can be covered efficiently by a single van but in farming areas a delivery van may have to travel multiple miles between each delivery.
My own proposal - within one mile of an airfield no drones above 250 grams unless operated by a qualified pilot with the agreement of the local ATC - between 1 mile and 3 miles from an airfield drones restricted to 100 feet above terrain (land, trees or buildings) - elsewhere restricted to 1000 feet above terrain. A drone under the direct control of a qualified pilot can exceed these height limits with the agreement of the local ATC.
The 250 gram derestriction allows drones that are too light to damage an aircraft to be used near an airfield - small camera drones can even be used to inspect parts of an aircraft that are otherwise difficult to see (eg tail fins ). (250 grams is less than the average weight of a London pigeon.)
It works - and its default of blocking remote content is useful for dealing with junk emails.
What useful enhancements can you think of for Thunderbird ?
I use this road when I am journeying from my home in North London to my relatives on the Isle of Skye. The reduction in journey time and petrol usage more than outweighs the toll charge (which at £5.50 for a car is less than the cost of 1 gallon of petrol - even a HGV is only charged £11.00)
manbreaks automated tests at 00:30
Biting the hand that feeds IT © 1998–2017