Bit defender next......
685 posts • joined 27 Feb 2014
And they are continually crying about being hacked by Russia & China..
You would think they would have an off the shelf box or suitcase... that could be wired directly into a home circuit to secure all digital comms .
It's just Pathetic........
Looks like their "red team" is not earning their money.
LOL... love the music reference
Re: Demonstration of Incompetence
LOL... you to eh....
The issue is the ISP's
many still do NOT supply IPv6 for the last /first leg of the journey.
If they sorted that out, then the uptake would be a lot faster.
More like he was taking out a competitor
Then decided to show how "clever" he was.
"Robber barrons fie system", should fit right it.
They are not after github
They are after all the personal data and interrelations, plus the business info of who they can sell their shit to.
Then they will gradually leverage thier own personnel into top opensource projects, get control of the direction and use the hundreds of thousands of contributors as slave labour.
They set the direction .... You do the work.
Then you can bet there will be the EULA that will be changed over time.
They made it clear in 2010 they WANT linux or they want it DEAD. that was why they probably funded SCO against IBM
Physics..... might well stop you.
But the real issue is no one is trying to stop you do anything other than continually stealing technology you don't contribute to.
This after a China national hacked into a US robotics company via Macao
The HK government refused the US deportation order.
In other news , HK complains very strongly about the US holding a HK/China national and refusing to grant him bail.
Yes... the sordid little webs we all weave.....
Sealing money from the government owned China telicoms.
Same shape and tooling they used 15 years ago......
sure i still have that one propping up the missing foot on my wardrobe.
Their top of the line Switch is still only 1000 SFP ,the kind of crap that poorly educated Technicians would use.
Anyone else get the idea this is a fuck feast, where intel and Co are out to find more spectre flaws to muddy the waters & stave off any lawsuits against intel
Code reviews mean Fuck all.
The key features of AV software:
1. Generally runs as root process or with authority of user.
2. Reconfigurable from central location
3. Downloadable updates
4. Uploads data to "central servers"
You can have the cleanest code for review, but a 30 second change can pull in all the data you need.
There is an increase in the lack of user control for all modern apps, these fucking companies will just NOT leave it alone.
So if I buy a lock
and then a criminal rips the door off , I should blame the lock manufacturer?
They are garbage products,
The keyboards are so BADLY engineered, that some of the keys are raised and this impacts the screen when closed, those idiot apple engineers made the keys curved so that after a few months there are impact marks on the screen.
so far I have had Two screens replaced due to the failure of the finish & the keys impacting and taking the finish off and all they do is fuck you over by reducing the guarantee on the new screen to 90 days.
Yep it was an old trick, the track header contained the track number & block
by setting the track header to a different one than expected, caused the drive to error.
Basically the drive went to track XYZ but when it got there , the header was a different number and so it threw an error, validating the disk.
There was also a byte in each sector header that was 0x09 or was it 0x21.. if i remember correctly..
my system produced a disk that only the directory track (trk18) could be read, the rest of the disk was unreadable.
can guarantee it wont emulate correctly.
I was a specialist in writing protection for the 1541 disk drive, and i don't mean adding "IBG" or extra sync marks to the sync headers....
and for some of my stuff he would need to have programmed the head travel time between tracks
Sorry... but why wold you strip the most competent people out of another countries economy just so you can produce shit for a cheaper price?
It's not helping anyone other than the VC's get Rich.
LOL... Java script in Excel.. as if there have not been enough exploits with visual basic.
Is your gadget using secondhand memory? Predictable senility allows boffins to spot recycled NAND chips
Re: Bathtub curve
Don't be silly.
that is like eating a cake to see if it meets the required standard.
You WILL see windows running on linux in the short term.
Currently MS is spending hundreds of millions maintaining a full os, but you see all there other kit
MSQL, 365, is migrated to linux, but just not available for the "public" yet.
as the billions start to roll in from 365 and MSQL cloud integration they will gradually move everything to offsite, possibly keep some onsite AD+skype engines for speed.
Then all they have to do is shove some massive pipes up the ass of every user and start pumping the cash out, since everyone will be so tied it it will make 50 shades of grey look like a childs bedtime story.
Even if they hash the passwords, let's not forget that recent MASSIVE cockup with windows authentication, where they were passing password hashes out to fake SMB sites, those sites were then using that data to identify the users passwords against rainbow tables.
However that aside, sites should not be sharing user data , becasue that would allow them to profile who has what services with whome.
So now the Leftwing is going to try and take over the open-source community.
There should be NO acceptance of money from ANY politically motivated group.
Won't be long before they start inserting their own people at the top of the tree and we can see WHY they targeted "LLVM" because it has tentacles into major projects.
thank fuck for that.
It is just completely laughable that people are stupid enough to allow access to there sexual profile info.
I have today sent a letter to Mr Musk asking when the fuck he plans to get me off this planet, even if it is in the next car he send up.
I weep that people using GIT , who you would expect are programmers or at-least IT savvy, think it is a "server system"
Same reasoning I suspect that people think if it's in the cloud or 365 you don't need to waste money on backup storage, "because the providers have their own backups"
Or the people hiring IT staff in Hong Kong based on "tell us your current salary or we won't look at your CV"... nice......
it will be fun for all the legal firms.......
say for example they get a case where verbal abuse is used and they have to document it.
Then they will potentially get banned for documenting the details.
Re: No Cussing Allowed?
They don't have to be the government.
They are a company and subject to the laws of the US, the same way they are subject to Gender laws.
They want to clear the space for business users.
I discussed a method of creating issues with malware as a DOS against the bitcoin wallet over 5 years ag,.long before "inter-poll" got involved............
There are a number of potentially attack vectors, they just require a bit more thought.
Specifically because you can "opt out", so that the company specifies one contact in the company who's data is available.
Which is already the same for directors of companies.
list the name, the email address & the company head office.
All of which is available on a business card.
Fixed IP address?
Clearly some people have never run a "real network"
Software licensing comes to mind as one reason, yep.... there are some real "developer" tossers out there who STILL lock their license keys to IP address.
This crap is still big in Hong Kong
Potentially this is dangerous,
since you could launch servers under a companies existing SSL that are
malware , but have a valid ssl /https encryption to tunnel thru AV software.
so for example I could launch a https server under the domain WITHIN the network and then use https encrypted tunnels to corrupt other workstations within the organization , without it triggering any network or firewall alarms.
If you buy hardware from China , you throw away your security.
If you guys could actually read Chinese and were on the forums you would piss yourself with shock at the information available, people selling the ability to load " modified firmware into devices at the factory level, Illegal reverse engineering & hacking to openly steal I.P & you guys think an exploit database is news.....
don't even get me started about malware being injected into hotel feeds by government sanctioned companies or HARDWIRED "bypass" boxes fitted to patch ROUND firewalls, all thanks tof your local government funded police & security dept.
Same rules apply,
There should be no "right to be forgotten" as long as the original data remains in the court file.
When they destroy ALL records of the court case held in the legal files, all news paper articles and any other sources THEN google should be required to remove the data.
in the UK you can go back 400 years , in some court cases "pendle witch trials" springs to mind.
Surely those people who were acquitted also have the "right to be forgotten", let's start by burning and destroying ALL historic records of legal cases.
Problem is not the port speed but the backplane speed and intelligence.
Like those cheap assed 1000T 48 port Chinese switches with a back plane of less than 2gb
All the government data in a single area, protected by a single system.....
What could possibly go wrong?
It was Fraud pure and simple.
Bet the stock price got shorted as well.
Re: Oh, come on
No you CANNOT.
lets say for example you have a machine with win 7 that is fully licensed.
Then as PART OF A DISCOUNTED UPGRADE you get a win 10 license from that win 7
Then your company dumps/sells the OLD win7 machines to a recycler.
Then that re-cycler RE ENABLES the win 7 license.
YOU ARE in breach of the license terms, technically speaking when you upgrade software you are NOT supposed to sell the old version to someone else.
Re: What is a 'hug' ?
Living in Asia I go out carrying a large two by four,
I don't want to meet wild animals OR random people,
Nor do I enjoy directors of the company I work at continually doing high fives every time they manage to successfully wipe their own arses.
Re: Oh my fucking gawd/ess ...
Then they should just fuck off.
Many of these code project have extensive histories, when you join you abide by the rules that have been established by the group.
Everyone seemed to manage before the SJW's and soy boys came onto the scene, but no these individuals just cannot resist inserting themselves into every process, continually trying to control the way humans reach consensus.
The answer from the group should always be "fuck off you are not wanted here" if you cannot abide by the current group consensus ... then don't come here to contribute.
Simple... return your CPU and get an upgraded one.....
If some government agency threw a few million at me to write a report on back-door cypto... I would do it, even though I know it's a bad idea and not really likely to be secure.
it's a massive con to fuel the legal profession.
There was still a significant loss of resources fighting something that should NEVER have been granted.
This was already looked at about 5 years ago with another product.
Lawyers also looked at the possibility of people being charged under statutory rape laws if they activated devices without the users consent, which basically it would be.