I do hope that the Metropolitan Police Service are not going to let Assange slip through their fingers, if they reduce the resources they allocate to watching him.
The gurning twat is still a criminal.
3265 posts • joined 19 May 2010
just take one step back to CD. You'll get fantastic quality audio, no skipping or crackling,
Hmm, beg to differ. CDs are not immune from the dreaded skipping.
This may be a consequence of having young offspring who apparently see CDs as an occasional side plate for their food, or a coaster for their fruit juice, in addition to their data and audio holding properties...
While playing elaborate pranks on the scammers may be fun, you are wasting your own time as well as theirs -- and your time is probably much more valuable, to you at least.
This is not the proper BOFH spirit!
NOTHING is more important than having fun taking the piss out of these scammers.
(Oh, except preparing a roll of carpet, a bag of lime and a large block of cement for the next luser who dares to raise a support ticket)
Using DISM to remove payload files and update rollbacks is all very well, but it still doesn't address the issue that any Roles and Features install themselves to the C: drive as well by default. Consider IIS, it puts both the web root, and all the log files, on the C: drive. Yes, you can change it, but why would it do that in the first place?
And speaking of log files, although you might get away with a Standard install of Server 2012 or 2016 in 32GB, after about 6 months use you would be lucky if it still fits within that restriction, given all the logging, crash dumps, etc that happens as a normal part of the operation of the server, unless you set up a ruthless cull of all logs at regular intervals.
I fail to understand not just why, but how, there are so many windows machines with SMB open to the internet.
If some home user puts a server on their broadband, then that doesn't automatically open that port, you would have to consciously add port-forwarding rules for it.
Conversely, I find it difficult to believe that any business would attach a server to the internet without some form of firewall controlling access, and again there must have been a conscious decision to allow SMB out of the network.
This is not something that happens by mistake, nor is it default behaviour, so what the hell are people thinking who configure stuff like this?
A very difficult task, and one which bears no resemblance to classic ATC.
You can't restrict delivery drones to a certain air corridor, or altitude, when they may need to access ground level at almost any geographical location.
This is why I don't see the commercial benefit of using flying delivery drones over ground based options, it smacks to me simply as "because we can" or "because it's cool".
Ultimately one man and a van still seems to me to be the optimum method for most deliveries.
Cue Amber Rudd demanding that Bitcoint be "shut down" or that we put "a backdoor in the hashblock".
Oh, it gets better than that...
UK Home Secretary Amber Rudd tells BBC she expects NHS trusts to learn from cyber-attack and upgrade IT systems
Maybe she should talk to Jeremy Hunt about why he stopped paying for extended support from Microsoft in 2015, and why he vetoed any upgrade strategy from XP?
this is not a ¨cyber attack¨, this is somebody with admin privileges clicking on something they should not have done.
Curious then that it has affected so many dispersed bits of the country. I think you'll find that the evidence so far is that this is collateral damage from an attack on Telefonica (who just happen to manage network links for some of the NHS).
Whatever big contract is awarded and then reported on this website, everyone slams the provider for being crap.
Well yes. This is because all of the big providers, who inevitably get the contracts awarded to them, have a long history of failing to deliver what they are contracted to do - in some cases, failing to produce anything tangible at all.
And yet despite this, the government persist in awarding more contracts - often for the same requirements, to the same providers.
For example in healthcare, this could keep GP load and A&E load lower, which will help the NHS greatly.
You can tell that this is written by someone with no knowledge of healthcare. Human Doctors and medical professionals regularly mis-diagnose patients, due to confusing / overlapping or non-typical signs and symptoms, how do you suppose an AI would fare?
And can you imagine the outcry, and ambulance chasing (literally) if an AI's misdiagnosis led to someone's death?
So did they prosecute him for saying "I'm an engineer", or for actually working out a better method of controlling traffic-light cameras?
What I'm getting from this is that if an American hobbyist inventor (think Trevor Bayliss) lived in Oregon, he would be prosecuted for his "unlicensed engineering" if he tried to turn a great idea into a commercial product.
Unlicensed thinking, it appears, is frowned upon!
Yes, we have expert systems but they are not much more than advanced logic controllers - if this, do that or nothing.
What is being touted as AI is nothing more than marketing hype to try and get a commercial advantage, or in the case of universities, funding.
Absolutely! It's on a par with calling radio controlled models Robots (as in Robot Wars), there's bugger all autonomous or robotic about them, and there's sod all intelligence at the current level of AI.
Ban all unencrypted traffic, like HTTP or FTP, which are both vulnerable to monitoring and MitM modification
This is nearly as bad as the government's "Ban Encryption" stance. There's no need to ban HTTP or FTP, they are both perfectly good protocols for certain requirements. The problem comes with inappropriate use - for instance HTTP for passing credentials.
And frankly, the use of MITM by criminal elements is wildly exaggerated, it is most unlikely that some "hacker" has managed to get in the middle of anybody's browsing session or FTP connection. Most leaked credentials come from malware on the host, or by compromising a database on a server.
For MITM it is far more likely that your local friendly government, your ISP, or even the company you work for are the culprit (using a web proxy is increasingly common in the workplace).
To help maintainers of Windows Server 2003 computers block almost inevitable attacks under these unfavorable circumstances, we decided to provide them a free solution: a micropatch for CVE-2017-7269, which they can apply on their machines not only without rebooting, but also without even restarting Internet Information Services.
Maybe they could teach Microsoft how they did this, as Microsoft appear to be incapable of writing any update which doesn't require a reboot.
Biting the hand that feeds IT © 1998–2019