Well The Register made my decision for me, thanks!
I'm gonna ring up my ISP tomorrow and list the porn sites I'd like to grant priority access to
479 posts • joined 14 Nov 2012
I'm gonna ring up my ISP tomorrow and list the porn sites I'd like to grant priority access to
The worst thing is these guys will probably get hired after Club Fed because they are an "IT genius" in some PHB's deluded braincell.
the american security clearance review/appeal documents for real individuals are publicly available, and from those I can safely assume that these guys will never in their lives get a job in IT security for any US gov agency. They don't care how good you are; if you're not completely 100% trustworthy you're out the door, especially in these post-snowden days
It's fine when you have permission to do it, there's a site I visit (https://hashkiller.co.uk/md5-decrypter.aspx) which gives you a popup asking for permission and explaining what you're agreeing to. fine, i can get behind that, as long as i'm not doing anything more important elsewhere on the computer why not, but that popup asking me is the key aspect here
Even when development teams have nailed agile, pumping out builds weekly gleefully (or, monthly for the languid), as Oti points out above, they often are not able to actually deploy their code to production.
yep! everything's agile after management pushed for it. After great effort we now pump out regular code... management themselves however weren't prepared for it to actually work* and the code ships with the same schedule as when it was waterfall
*3 years and counting
The scripting tasks I set for my interviewees go further than that, I set something I know they cant curently do but I assess how good their google-fu is. Since let's face it that's a large part of the job, and it means that training and bedding in won't involve me having to hover over them
they're not "stolen", they're "stranded" in someone else's wallet
you know, like the great train "stranding"
I'm the same, still on a oneplus one because it's still functional and not outdated in any way i use it. I usually skip a few generations with each new buy and usually then because the device has died of old age
Security-wise though it sucks that i'd be better off replacing my phone 6 months after buying it
Loudly and defensively reassure the bastards in management that this is "normal" and
that's assuming management even notice, or indeed have ever been inside that particular building
they did a good job of harnessing the microsoft behemoth though after their european troubles took them down a notch or two, (then after microsoft's later products brought them down the rest of the way)
the government is trying to have their cake and eat it by treating you as an individual instead of a company?
Reg commentards: "Oh fuck off then google. threatening to leave because we want you to stop your dodgy tax loophole arrangements well GOOD"
Also Reg commentards: "they think IT contractors aren't paying tax? just because i pay myself dividends from a company in the caymans which is also me? well i am absolutely flabbergasted and shocked at the sheer cheek of it! i'll just leave and THEN see what happens GATHER THE PITCHFORKS MEN"
IT contractors in "everyone should pay tax except IT contractors" shocker
a chrome tab left unclosed
Yeah webmails etc allow CSS, but I'm fairly sure they don't allow it remotely, only what's embedded in the email
And if one doesn't block that at least by default then I simply won't use it
no one supports remote CSS though, inline or nothing
that's like saying you can use JS for malicious intent in an email. well yes, if anything actually allowed it.
we've heard of it
I think it's a good idea partially; have each team take responsibility for security in their own area from the ground up (ie talking about security during design sessions, coding defensively) and then the security team can be lessened and won't have to push back on things, they can also act as overall co-ordinators, policy-setters and educators, as well as ensuring that although two components may be secure in their own right that they don't introduce a vulnerability when used together
if you have one team doing it all at the end of the process of course they're going to have to say "no" a lot and push back on things because they're there after the mistakes have been made and we all know prevention is better (and cheaper) than cure, the solution is to have security at every stage, and that includes where they currently traditionally sit
“She will be the embodiment of Britain, in steel and in spirit” - Admiral Philip Jones RN
in that case an upside-down bathtub with a burberry paintjob and fur trim would've done the same thing these days
I thought Newport was awesome the few times I've been there*
*Which were entirely limited to the speedway track and its car park
that sounds good, i'm still on cyanogenmod til i can decide on a new OS, i'll have a look at lineage
I'd have been tempted for the 5 since 4 generations is a good innings, but at this price i'll be keeping my oneplus one (preordered for around 230 quid and still well up to the job)
think it'll be my last oneplus if this is any indication too
That was the idea behind Stross's Rule 34, and it didn't end well when the spam AI and anti-spam AI fight evolved...
"and NOT hot dog"
the last bastion of the company that accepts employees want to be able to eat but doesn't want to actually pay them so turns them into a charity case for the customers for donate to
see also: US service industry
The hero we need
it's a slippery slope only giving voting rights to those who by some arbitrary measure have "earned it"
can't find work? working minimum wage? work in marketing? attend art college?
i dunno where the line is drawn as to "doesn't contribute"
came here to basically write down your comment title
haven't we already been down this road before? and haven't we learned shortly thereafter why it was a bad idea and a false economy?
it's called the "Research and Development" department, not the "doing things" department
hacking talktalk in the 1990s
"Database download: 1.4GB remaining. estimated time left: 34.9 years"
"Ads are comparable to, and indeed worse than, rape"
I was reading a book the other week where an ex-soldier who was playing detective would immediately break out his phone and have a blast on tetris everytime the plot would have him attacked or near a shootout as a calmdown-habit he'd had since he had to leave the army for PTSD
the law doesn't judge the morality of the affair nor take it into account (whether or not he actually was shouldn't matter), it judges the written ACTUAL law as applicable to data protection
On the flipside, if there's one country that's well-practiced in not taking any crap from the big boys it's Ireland
Microsoft must be looking at cases like this and wonder why they were allowed to bundle internet explorer when google bundles EVERYTHING with android
the only different is that at least with google apps the lack of privacy is intended
I can't find technical details of the leak on the mackeeper page either
Hello! The TLS version of the site isn't quite ready for prime time, please bear with us...
I'm glad they're finally almost catching up with those they criticise, but i wonder why i wasn't already seeing this with https everywhere enabled
get political capital from asserting that we could fix poverty and social injustice if we only took the money.
ever the ways of the opposition!
"that's bad you shouldn't do that, hi everyone look how crap they are"
"what would you do instead?"
"THAT'S NOT THE ISSUE STOP DERAILING US!"
The Register has attempted to contact Apple, but received no response.
that doghouse must be awfully crowded with all of ireland moving in
i thought the peter cushing cgi was pretty good, i could at least ignore it and suspend my disbelief for the film easily
the leia one was awful though
The problem with star wars is that we only really see storm troopers fighting mercenaries, gangsters and rebels so they're at least evenly-matched and end up looking not very scary
One thing force awakens got really right was showing them in their true habitat: circling innocent families of men, women and children and showering death on them.
THAT'S the stormtrooper in his day-to-day, being the fascist bully with nothing to stop them
... if a so-called "professional" tried to pass off junk as working code, and expected you to put YOUR name on it?
yeah, i worked in QA
especially if there's some board game newcomers in the gathering we always play a few co-ops; flashpoint, pandemic etc, or lighter versus games like love letter, spyfall or codenames so the game is over quickly and they get another chance faster
As the article states, a lot of this is down to people not wanting to tell someone 'no'
after working in a bank i have both security and hatred of people in general drilled in. I've told newstarters, visiting VIPs or just people who've worked there a while but not in my department "no" if they've forgotten their pass and want to follow me through a door, I've just left them in the freezing cold lobby with the promise i'll send any name they give me downstairs to meet them.
just doesn't work on absolute bastards ;)
I quite like the tree chart data visualisation triggering the other graphs, let's you get an idea of the scale of each breach and what areas of danger it represented
It's crazy doing anything with a card there. Even the subway ticket machines let you just swipe for your tickets with no pin etc required, and you hand it to every waiter etc to take away and do the transaction unattended
We brought a card which gave very good conversion rates solely for the trip and cancelled it once we got back, it's the only way to pay for anything in the US..
My wife and I have all our devices running through privateinternetaccess, thanks to some user-created scripts it's working flawlessly on my opensuse boxes too
looks like the usual nikto output
you missed the register article earlier about cops using fake basestations then?
i bet you feel silly now
the phone trusts the dodgy base station because the police and gchq etc want your phone to trust dodgy base stations
something something terrorists
Businesses can have funding to send people (me) to get an OSCP or something then they can take care of themselves (because let's face it, it's business losses that matter to .gov)
at least it wasn't coming in to land with the software insisting the wheels were down and no one thinking to check!!
Biting the hand that feeds IT © 1998–2017