Mustn't ever mention Windows ..
"A Microsoft-led operation resulted in the takedown of key servers associated with the infamous ZeuS and SpyEye banking Trojan botnets on Friday".
152 posts • joined 4 Aug 2011
@bleh_meh: Really just because the plod found the ipad and then stumble on a big load of drugs it warrants (see that, I made a joke!) an article here????
It's so as the Reg can get Apple and crystal meth in the same headline. Once a long time ago Apple barred a Reg editor from Cupertino, and they've never forgotten it ...
"The documents .. included .. a short memo summarising some proposed climate advocacy which Heartland intended to undertake", elREG
"We are concerned that schools are teaching climate change issues in a manner that is not consistent with sound science and that is designed to lead students to the erroneous belief that humans are causing a global warming crisis"
"Global Warming Curriculum for K-12 Classrooms"
"An Open Letter to the Heartland Institute"
Yea .. `warmist' ...
> ITYM Young, of Cryptome, accused WikiLeaks of being a CIA front?
Yea .. a typo ...
I don't know about 'tinfoil haberdashery`, but I do know that it don't help your credibility one bit to go on Alex Jones. To save you the bother of visiting that site, all those leaked cables on Wikileaks are really a false-flag operation by Karl Roves Whitehouse to discredit Wikileaks .. :)
@Aaron Em: That's the Cryptome guy -- he's never made any particular effort to hide himself and he's never had any noticeable desire to be some kind of new media fondle-toy. (He also probably doesn't look like a Swedish club kid, which is also a plus.) ..
Actually Young accused Cryptome of being a CIA front which would be ironic if the reverse were true. If you were to try and Google on any of this what you would end up with is stories linking exiled Russian millionaires in London, Soris, NSA and Mossad to Wikipedia. All is missing is the secret Nazi bunkers in the Antarctic.
"Why downvote this?"
There's a serial comment moderator on here, who's self appointed task is to tag unsound opinion. I guess it's some retired old f**t with too much time on his hands. The Reg should show who modded what and for what reason.
"What legal justification is there for censoring internet connections?"
To protect you from the terrorists, after all if you've done nothing wrong, then you've got nothing to hide <sarcasm>
This is from Sep 2010, maybe they've fixed it since then.
"Linux In The Data Center: How Does It Fit?"
What's a 're-startable check-stop`?
In the case of: U.S. v. Zhang, 12-mag-00108, U.S. District Court, Southern District of New York (Manhattan).
> A New York Fed spokesperson told Reuters and others that the bank had investigated the breach as soon as it was uncovered and promptly referred the case to the authorities ..
>> The New York Fed detected the breach through its established security procedures and referred it to law enforcement officials, Jack Gutt, a spokesman, said in an e- mailed statement ..
Minority Report: Investigators discovered the breach after one of Zhang's colleagues told a supervisor Zang had been asking round the office about a missing harddrive. Zhang had previously told colleges that he was developing something "for private work", in the event that he would be dropped from his current perma-temp contractor employement. The complaint, stated that Zhang copied his own code onto the external drive.
"Murdoch, who is currently under investigation in the UK over phone hacking by his newspapers, is a longtime critic of what he sees as Google's role in enabling piracy"
If he don't want to show up on Google, then why don't he just use the robots.txt file on his sites?
> Tablet fondlers can finally get some work done thanks to streaming cloud supplier OnLive, which now pipes the full Windows 7 experience from its data centres to punters' palms ..
Which would rely on a decent Internet connection, something my "broadband" provider seems to be unable to provide ...
> In her ruling District Judge Quentin Purdy rejected the defense arguments that extradition would be disproportionate to the crime, or that too long had passed since it had occurred, and said that there was sufficient criminal law on both sides of the Atlantic to have him shipped off to the US
Except the extradition treaty is not symatrical, as in on the the same grounds, an American citizen could not be extradited to the UK. But then again we're not an independent country ever since WW2 ...
> programme will also enable organisations to apply for gTLDs in non-Latin, non-ASCII scripts ..
What happens when a non-Latin URL shares similar looking characters with a Latin URL?
"The internationalized domain name (IDN) homograph attack is a way a malicious party may deceive computer users about what remote system they are communicating with, by exploiting the fact that many different characters look alike"
> Mark Shuttleworth has long sought to beat Steve Jobs’ Apple on the look and features of the desktop with his Linux distro; at times, with his cropped hair and stubble ..
I don't think he's actually trying to channel Saint Jobs. People grow facial hair when they start to go thin on top ..
> TiVo has .. proven that it holds valid patents which not only resulted in the invention of the digital video recorder, but which also have developed .. search and recommendation, video metadata usage and new formats for advertising, as well as the collection of audience viewing data.
If could be argured that TiVo were first to file patent on the DVR not that they originally invented the concept or that such should even be patented. But we are talking about the US patent system which is patently broken. Any revenue accuring to TiVo in the AT&T legal action will most probably be provided by Microsoft as they had to imdemnify AT&T in the case. This may also impact on Microsofts' downstream users of its 'technology`. Microsoft is also claiming patents on 'technology related to program schedules and selection`. These claims are so broad that anyone implimenting timed recording on any digital device would be in violation.
As far as I am concerned I don't see how adding a tuner card to a PC and then sticking the letters 'DVR` on the front constitutes inventing the digital video recorder. The same goes for program listings, timed recordings etc. If I can paraphrase Jim Royle .. patented 'technology` my arse ..
John Arthur: "I did note in the newspaper article that she made a habit of not bringing enough paper rolls with her to work"
And we can believe this because an officer of the Court would never knowingly tell a lie. Who's idea was it to put the stenographer in charge of the only known record. What was supposed to happen if the defence requested a transcript of the previous days proceeds?
@Leyden: "The PC subsequently became infected by an unidentified virus"
What was the name of this unidentified Operating System that this unidentified virus ran on?
> I'm guessing the issue is Comet 'selling' Microsoft copyright product - ie making money and not sharing any with the owners.
It don't say they were selling the disks seperatly. If so, bump up the price of laptop and 'give away' the recovery CD.
"The allegedly counterfeit recovery discs were then sold to customers who had bought desktops and laptops running Windows"
I don't think this is the real issue. MS moved from full recovery disks some time ago. What you got was a reduced version that restored from a hidden partition on the harddrive. This presumably to reduce 'piracy'. If you replaced the HD the the restore CD didn't work. Tough luck on the enduser I guess. I figure Comet were providing full recovery CDs ...
> Thursday's ruling .. dismissed criminal charges against William Lawrence Cassidy, who used multiple Twitter accounts to sharply criticize a religious figure identified only by the initials A.Z.
Would that be Buddhist leader Alyce Zeoli?
@P.Lee: "Once Novell were in a situation where people were buying MS licenses and getting MS file-serving by default they should have seen the writing on the wall and come up with something innovative"
Begs the question as to why MS had to expend so much energy in slaughtering Novell ..
No it was MS yet again obfuscating the API calls to wrong-foot their partners, I mean competitors, same thing really :)
"We need to slaughter Novell before they get stronger", Microsoft Sep 1991
"the way to shut out novell in the base is to either ship a full client or make it so there is no network connectivity", Microsoft Jan 1994
"Microsoft would like cooperative product testing, access to Novell’s SuperLab for Win95 testing", Novell Jan 1996
That was very well written, Barry, but it's meaning here may be lost as it's (mostly?) techies that hang round here. Any Virtual Desktop I've seen, if at all to be usable, required masses of bandwidth (as you say in your piece) and I was not that impressed ! Unlike the old-fashioned method of the app running locally and the data being accessed remotely. And there are currently various methods of the one copy of Windows and the one copy of the application to the desktop.
One method I've seen, having a local image server that reimaged a PC once the NIC cable was transferred to a special socket in the switch room and the machine rebooted. Apps were standard MSI packages wrapped up in some "unattended-installer-app" that delivered them to the PC on reboot. Hardly unattended remote backup, but it did the job.
So to conclude: The main benefit of Desktop Virtualization is it totally eliminates the need of a technician to visit the PC, reduces the number of on-the-site people required and saves money. Management always like to hear about ways to save money.
ps: You use too many acronyms in that piece ..
Biting the hand that feeds IT © 1998–2019