Change it back quickly -
The NSA wants their feed back.
1987 posts • joined 12 Jun 2009
The NSA wants their feed back.
@John 104 - "The goal is to make the users the
betaalpha testers." FTFY
"The compiler gave no errors, it's perfect code."
@AC- "but one has to admit that if anyone can track, block and prosecute originators of nastyograms within their border, they probably can"
They aren't suceeding in eliminating 'nastyograms', so either they aren't trying, or complete traceabilty is not the solution.
I doubt whether complete traceability is a solution... as you said, you just find a botnet victim. Tracing the next layer requires exponential resources, against an attacker who will always be erasing the evidence. You spend ever more resources chasing an elusive goal. Time to look for a different approach.
@Franco - "I still have a 56K US Robotics external modem that would connect to a COM port."
Pfft! I'm still using a 28.8K Hayes modem, connected to a Serial/USB adapter. Well, it's better than keeping a fax machine. Some of my customers still send POs by fax.
@Barrie Shepherd - "while they take data from the signalling control systems they cannot interact with the control equipment"
Much appreciation to the techies and safety officers who fight the on-going battle to keep it that way.
@Jason Bloomberg - "in another decade they'll be so behind the times we'll be laughing at them like we're laughing now"
Why? It'd just be a dusty screen that still works.
Antiquarian Booksellers: almost as badass as Librarians.
@ICPurvis47 - No, the head is a waxwork, the rest is him. It's not just period clothing, it's his clothing. He asked for his body to be preserved and displayed as an auto-icon. Unfortunately, the process went badly wrong for his head, so that is kept in a box elsewhere.
Glad to see someone twigged what I was on about.
I don’t believe in the paranormal either, but, true story, at my old college, if you walked through the cloisters at the right time, you would see one of the founders sitting in his chair, with his book and glasses on the small table next to him without his head. I saw him with my own eyes.
Rumour was that his head still attended college council meetings, where he was recorded as "present, but not voting".
@John Brown (no body), @Solo Owl - I once saved a student's thesis by combining those techniques. Student's husband spills coffee on 5.25" floppy, desperate student brings it to tech support (me) for help. Carefully slice open floppy, remove disc, wash gently with distilled water then alcohol, allow to dry, slice open a new floppy, insert washed disc in new case, copy data (it survived!) to another new floppy, return to grateful student with a reminder to keep multiple backups.
I'm not a geologist, but if you'll accept Extra History as a source (https://www.youtube.com/watch?v=a-CW0B4YeBQ), Mary Anning disputed the claims of established scientists and was proved right. She went beyond collecting, carefully studying her finds, and was noteworthy for being good at it.
All of the above. Put each one on a different denomination, and Sterling becomes the only currency where you can always pay the exact amount. Convenience and practicality are overrated.
@Nick Kew - he lived during British Rule in India, so he was British by the standards of his time.
@Volands's right hand - "Papers by end of the week prole"
I recall being told that too... but I've never worked out, if you don't turn up and identify yourself, how do the police know who they want to arrest? It probably only works in villages where everyone knows each other, where it isn't needed.
We still have some time to prepare:
2:46 "The object becomes caught in a crack in the floor surface, and is freed by a human operator. Note that this is a flaw in the experimental setup, which is assumed to have a floor with no cracks."
Time to lay some crazy paving.
@David 132 - Ghent man, GHENT!
@JLV - forget the sharks, coconuts are more deadly
@Mycho - If you're interested in the matching set of obsidian carvings (I used to think they were, somehow, disturbing, but now they seem quite friendly, almost like they are beckoning), and the black, leather-bound book I found in the ruined library, I'm taking them to the clearing in the old forest tonight. Meet me there.
I have a theory, but I need to complete my investigation to be sure.
Is anyone else reading 'CoC' as Call of Cthulhu?
I should record this in my journal.
@Big John - "These allegedly-intriguing legal issues aren't really specific to the Potterverse. Any universe with magic will do."
I disagree. In Middle Earth, the legal system is largely feudal: the local lord decides. The Shire does seem to have some code of law, but it doesn't seem to be consistently enforced; Bilbo had a lot of trouble re-acquiring his possessions after been declared dead.
Conversely, in the Potterverse, the legal structures are frequently referenced: the Misuse of Muggle Artefacts law, the Decree for the Reasonable Restriction of Underage Sorcery, there's two trials at the Wizengamot shown, characters are imprisoned, released and escape from Azkaban, 28 Education Decrees, the list goes on. There is also a lot about how law, society and a free press (well, a slightly beetle-napped Rita Skeeter, anyway) interact in the rise is extremism. It's easy to see the influence of JK's time with Amnesty International.
But she did later work in the Department of Magical Law Enforcement, so her plans changed.
I hope the reporter wasn't trying to Currie favour with those puns.
You're confusing "two factor authentication" with "dual control".
I recently replaced an old server with powerful fans that produced a rushing-air noise. The guy in the next room alerted me that there was now an annoying noise. The whining of the fans of an adjacent server had been complete masked by the smooth white noise.
The difference is the security. When you use the same password on a dozen sites, any one of those sites could have poor security, allowing your credentials to be stolen and used on the other 11. With a central authentication service, only one place has your credentials. That place can* be given maximum protection.
*But it could just be outsourced to a bunch of muppets.
Also, with a single user experience across the services, you could educate users about what to expect in "security messages", and therefore make it less likely that people fall for phishing emails.
Google has Principles?
@Walter Bishop - "c. How did your sources come by the codename of this hacking group?"
I assume the investigators gave the group the codename, it's a lot easier than referring to them as, "the group we detected at... and...". Surely the GRU would use a Russian codename, google tells me that песчаный червь is Russian for sandworm.
These guys are obviously four civilian tourists visiting Amsterdam Cathedral.
@Aqua Marina - "And yet everyone forgets, Frodo ended up simply walking into Mordor!"
Not quite, Frodo was carried while unconscious. Sam walked, but it wasn't simple.
@Mike Henderson - That direction makes sense, but the announcement seems standard on all flights into Auckland. I was arriving from HK, "If you have an onwards international flight...", so I asked the cabin crew, "Do you have many flights to Antarctica?
They still pay him $145,000 less than he claimed. Of course, there's the costs - was he awarded costs? If not, and assuming SAP were using in-house lawyers, their additional costs could be minimal.
@Efer Brick - "What is it if a gun isn't involved in a mass shooting?"
The Battle of Agincourt?
@Timmy B - "According to the CDC 500,000 to 3 million people per year are protected in the US by the defensive use of firearms."
Is this the same CDC that is specifically prohibited from using its funds to advocate or promote gun control? Do you think that might make unbiased research difficult? Do you have a citation for your claim?
@Big Al 23
No, IEDs, poison, cars and planes are rarely used in mass murders in the US.
Why the hell does the US have a problem with black market guns from Russia and Ukraine? You don't have a land border with them. Is your Customs and Excise Department totally incompetent?
In Europe, Australia and Asia (excluding actual war zones), mass murders, when they happen, are headline news. In the US, shooting of 4 or more people is a statistic. If we've got our fair share of mass murders, the US is greedy and has far more than its fair share!
Now tell me how much free diagnosis and healthcare the mentally ill get in the US.
Big Al 23 - "Actually a gun is NOT involved in every mass murder. IED's, poison, cars, plains, etc. are often used in mass murders."
Yes, but it's really difficult to get the victims in-line when you start the bison stampede.
@EveryTime - "Or simply run a truck into a crowd of people. Or poisoned them. Or blown up a truck of ANFO next to the building.
The exact weapon or method is almost incidental to the act."
But with those alternatives available, this guy chose a gun. Maybe he chose it for its many advantages: easier to target than a truck in an office environment, easier to administer than deadly poisons, no need to build it yourself, unlike a bomb. It almost seems that having purpose-made devices for accurately shooting lumps of metal to kill people readily available makes it more likely that they are used in mass shootings. Who would have guessed?
@tfb - "moving services into the clown"
I know that sketch, it's the one with the ladder, bucket of whitewash, and the hilariously large syringe. This way is a lot more fun than running your services on someone-else's computer.
Yes, the large coat with the flower in the buttonhole. Would you like to smell the flower?
"Each of their CCTV units consists of a camera attached to a Microsoft Windows-powered computer"
Imagine the scene...
Washington DC Police HQ, some years ago
Heat of IT: "We've completed the desktop upgrade, but now I have a thousand Windows PCs with webcams that need secure disposal, and no budget!"
Chief of Police: "Don't give me that. I need to deploy CCTV across the city and there's no budget for that either!"
and the rest is history...
@AC - "Given that women
* Work less hours on average
* Get sick more often
* Take more leave days overall
* Are the overwhelming majority of sexual harassment complainants
* In manual labour jobs, get injured more seriously, more often
* Are the majority of OHS complainants
* Are more likely to leave after having kids, and never come back.
Why WOULD you hire them?"
Even if your claims are true, it doesn't mean that a woman's productivity is any worse than a man's. If they work fewer hours, they get paid for fewer hours, and might be producing more because of less fatigue. Someone who complains about OHS might be reducing your overall injury rate and associated costs compared to people who put up with a dangerous situation. And leaving to have kids sounds like a positive advantage to employers who want to fire their expensive, experienced staff and replace with cheaper new hires: age discrimination by the back door.
@AC - "sends me emails that consist essentially of a https:// link to the place on their secure website (user handle and password required)"
This explains the amount of phishing emails containing links to fake login pages.
"online (password protected)" - We all know how good people are at choosing and remembering passwords.
"Axe the Fax" focusses on a symptom, not the problem of efficient, secure communication.
Ochib - "So you will need a encryption system that all the parties agree to and can use. Or you use a fax"
Yes, fax is so good at doing signatures. My standard method, when someone insists on me faxing a signed document, is to prepare the document in my wordprocessor, paste in my signature image and fax using my fax server. No-one has objected.
Fax fails on the 3rd and 4th requirements for electronic signatures that you quote. As soon as I have ever faxed a signed document to anyone, I no longer have sole control of the image. Image files are easily edited.
@martinusher - Secure? Hardly, they are unencrypted and can be intercepted anywhere along the POTS wires. Someone with the motivation could hook up a small device to record every incoming and outgoing fax.
In comparison with plain email, then you're only exposed to attackers who can access the wires, not everyone on the internet. In comparison to end-to-end encrypted email, then the email is a lot more resistant to attack.
Don't you find that the liquid nitrogen makes the sharks sluggish? You have seen the memo making sharks compulsory in moats?
General statistics do prompt some odd thoughts...
"67 per cent of spies have been civilians; 37 per cent had no security clearance;" - So your secrets can be stolen by people who shouldn't have access to them?
"84 per cent of spies were successful;" - Can you be called a spy if you haven't successfully done any spying?
"67 per cent volunteered to commit espionage; 81 per cent received no money for their services;" - Were 48% trying to improve the 'voluntary service' section of their resume?
"94 per cent went to prison" - That's a pretty good prosecution rate, but did you count the ones that weren't caught? Do you have any idea how many weren't caught?
Anyone suggesting Parent/Child as a replacement for Master/Slave has no idea of how likely a child is to obey.
@Herby & @veti - I totally agree with both of you. The Internet has both a VERY good and a *terrible* memory. It's probably some sort of quantum state, which is collapsed by the observer to the detriment of the person that would be most heavily affected. Thus, when a prosecutor goes looking, the result is incriminating records are found and the defendant is jailed, but when a defendant looks for exonerating records, they're not there and the defendant is still jailed. You're lucky it's only your Greybeard status based on your Usenet posts that is at stake.
Could fruit flies be used as Britain's alternative to Gallileo?
Biting the hand that feeds IT © 1998–2018