Re: Been Done
You know... manipulating the image itself would be so much more fun.
156 posts • joined 13 Jul 2013
You know... manipulating the image itself would be so much more fun.
promote take up of a "Cyber Supplier to HMG‟ badge which companies that supply cyber products and services to Government
AWAKE at the quietest whine..
or the tapping of nails of the kitchen floor
and tentatively touching dark lumps on the floor with an outstreched big toe trying to figure if it's a sock, a toy, half eaten dog chew or something unpleasantly squishy on the way to let them out. Illuminated only by the intermittant glow of the wifes mobile phone flasing to say she's got mail.
Am glad to know I'm not the only one with a soft spot for a Goblin. My 'Swift' was a real lifesaver in my shared house student digs.
Let's face it, few people are going to be happy with a touch screen interface until it looks (& works) like LCARS.
Snowden will claim to have the proof that Gary McKinnon was onto something big.
TCP/IP with bongo drums (circa 2002) http://eagle.auc.ca/~dreid/ and seems to crop up every five years since.
Around this time the USNavy was also experimenting with 'stealthy' active sonar* and incurring the wrath of various enviromental groups http://news.nationalgeographic.com/news/2003/10/1008_031008_whalebends_2.html
* Instead of going 'ping' and listening for the echo the vessel replays natural ocean sounds eg: dolphin clicks, whalesong, surf noise and iceberg fizzing.
Your inglish is awful, please be speaking Hindi. Usually gives phenomenal results.
but if they are persistant there's always this...
Wrong department, you need to call this number .... 020 7632 3035 or
020 7664 9274 [ because nothing says "screw you" better than a diplomatic incident ]
Post your IP address, somebody will contact you.. :}
I see what you did there..
Oh chuffin brilliant.. How long before RockStar starts divulging (or selling) players psych profiles to interested parties?
Check out the recent DEFCON presentations about "JackPotting" certain varieties of stand-alone ATM machines typically found in conveniance stores, gas stations & bars. The speed of the intial hands on hack to compromise the machine simply beggars belief.
I wonder if TorrentPond and the numerous similiar sites are using data provided by Googles cache or Custom Search service rather than harvesting the links using it's own scripts?
Takes me right back to Leetsi & Diso
If a networks security had a GUI with the look & feel of a MMORPG then the 80K+ cyber mercenaries required would not only train themselves but would probably pay for the priveliege of combat.
Sure things are going to go wrong but that's the whole purpose of the race, to expose weaknesses in the design or technology. Personally I wish the CUER team was out scrounging tubes of epoxy and a steering damper rather than figuring out when the next bus home is.
This month I'll be logging into 'The Cloud' wifi network with the name.. Dr Anton Phibes
With folk able to move files about and control the system from anywhere on the planet.
I wonder how the cops would sieze an orbiting data centre if they suspected piracy ?
A circuit diagram to do this appeared in Practical Electronics over 20 years ago.
Next lunch-time wander around your nearest Industrial estate looking for WEP hotspots. (no special tools required just a smartphone with WiFi)
When you find one go knock on their door and tell them how insecure it is. (for those still not aware it takes less than five minutes to slice through WEP encryption under optimun conditions)
1. "Yeah whatever", "We'll tell the IT guy", "That's Bullsh#t"
2. "Stay there, I'm calling the police"
3. "Thanks!, can you tell us how to secure our WiFi ?"
4. "Can you prove it !?"
However.. I should warn you all...
nobody has ever said Thankyou to me yet when conducting this experiment and outcome 4 is particulary rare from my experience.
" ...free material from social media providers? They'd be mad to pass it up... "
Understanding the data however is a three edged sword: your side, their side, and the truth. One wonders how often does a lie need to be repeated across the internet before agents are dispatched to investigate?
I wonder if you could convince people they can charge their phone by putting it inside a microwave oven?
Hyperbole? In the event of direct command/control signal loss, degredation or deliberate interference some elements such as basic flight controls & navigation will have to be capable of autonomous operation till the human can be re-inserted back into the loop. From a military viewpoint it would also make sense that the aircraft be able to defend itself during this vulnerable period. It's not a great leap from that to letting it fly the complete mission by itself.
LinkedIn 'grows your contacts' by mailing people that you already know...
By what stretch of credulaty is that networking ?
I'll get my coat, it's got the business cards in the pocket.
I'm now really looking forward to speaking with the next muppet offering me SEO services.
Did you not get the memo about keeping their balls clean?
If ... Davros was a failed genetic experiment to clone our favourite time-lord it could could fit the Whovian lore.
"Earth will eventually end up speaking an unholy mix of English, Chinese Mandarin and Spanish – with a soupçon of Portuguese, Russian, Hindi and Javanese thrown in for good measure"
Cool, sort of BladeRunner meets Firefly
The waving of hands is just a distraction ask any magician. as for that 3D metal printer now that's the real trick.
Do I shout 'Medic' or 'Mechanic' ?
How to get a 747 into orbit and beyond is actually documented in Harry Harrison's book "Star Smashers of the Galaxy Rangers" ... thinly disguised as pulp sci-fi so as not to alarm those of a nervous disposition.
No! we are not going to call it Roswellium
Unwanted gift, used only once...
Other folk around the web manage to scrape sites larger than craiglist without incurring the wrath of the owners so one does have to wonder about the elegance of the code created by 3Taps.
Are you suggesting we should stop using spare capacity to brute-force passwords and mine bit-coins on the company hardware after hours?
What we appear to have here is a simple failure to communicate not malicious intent, pay the guy!
a hacker is feeling both elation and a strong desire to change their underwear, identity and town.
Tea & sympathy with a bucket of hindsight are not what I need.
Close but no cigar for the Brunell reference.. try this
Why waste the bullets?
Just wait till somebody hacks into a bin getting it to display smut and let the lynch mob do the rest.
Media whoring & trolling aside the idea is technically sound. Four autonomous 'biobots' would be more versatile than their mechanical counterparts, plus they can be recycled as plant food for the next crew.
there's something fundamentally worng with the universe
mines the one with the tin-foil in the pocket
after all it took almost ten years before the original CSS history hack was finally patched across all mainstream browsers.
"or find a charity that actually spends it's money on looking after animals"
Good luck with that, for several years I was employed by a direct mailing company that specialised in fundraising for charity. Time after time I was told the clients had no images of recently rescued animals for use on the flyers and was told in no uncertian terms by my employer to go grab a camera then find any fly bitten pony.
Indeed why? my wife helps moderate on a website with a large community and routinely recieves vile communications of the nature seen in the news this week from persons who are clearly disturbed and in need of professional help, yet her complaints fall on deaf ears.
Hell, I would be happier to bring my own coffee..
Ummm from personal experience.. It's mainly the 'innocent' kids swearing & posting porn.
I always thought it was an Internet legend that 'kohai' from Chess.com would reach through the screen and slap miscreants, now I'm not so sure.
Sods law also suggests that when every traffic light has an internet connection, somebody will say...
"why don't we put CCTV or APNR on them as well?"
Biting the hand that feeds IT © 1998–2017