IT Techs too worried about being assassinated from their cushy jobs by psychopathic MP's that are too old & senile too remember their passwords.
552 posts • joined 27 Feb 2014
it's a shill to get people to fix their bugs for free..
do you really want the likes of Apple, Microsoft & Amazon controlling the US government and having access to all the information?
there are just somethings that should Not be in the hands of corporations.
Re: But Angela has a working brain...
If it was Grindr... it might be more news worthy.....
They don't want those phones running, it does not fit in with their business plans.
The same way they modified office to deliberately destroy office documents on osx in an attempt to force people to use onedrive,
and the same way they deliberately cripple osx skype for business to prevent contacting non-business users.
LOL.... very funny dig at the fact that the DM is leaching articles.....
This is old research,
papers were written about this years ago and presented at a security conference.
Re: OK Computer
Don't be silly......
Since using a dildo would be classed as sexual abuse of a minor.
There is so much data leakage out of China it cannot be controlled.
The sad thing is that it is the government & supposed top level controllers that are the problem.
We had a Chins tech. into one of our offices in China, his machine was so infected with viruses that it was tripping our internal systems every 2 seconds.
We have even had China Telicom staff, who maintain the endpoints, with the same problems.
This is where the issues are and they are not being corrected.
Because there is already some fairly Gash AV software called "Panda", you would not want them getting confused.
Not to mention the fun you can have when they get hacked....
Last night the Beaver was penetrated...... just does not sound same the same with Panda.
In this day and age "firewalls" are basically useless.
There is no boundary any longer , certainly in China where the majority of set top boxes and off brand mobile phones are loaded with backdoors built directly into the OS.
On top of that you have the multitude of Desktop & mobile software , specifically written to appeal to users requirements, character input methods, translation software, cloud based hand jobs.
looks like a translation app, acts like a translation app, unfortunately when your logged into you tax or banking app, there it is screen capping and sending highly confidential data back to the cloud and all without data encryption, but hay... it certainly translates shit.
Re: Ahhhh bitcoin <3
sell them out.
re-buy when it bottoms out,
I'm still clearing coins i mined in 2010 and beyond.
and as usual it will go down in their report as "a few users" experienced minor logging in issues.
for those of you not yet using 365, 365 is the number of days it does not work or has some issue.
Re: Within parameters
Does not work like that.......
For every 10 deg above 25 deg junction temp you loose 50% of the life at 25 deg, this is well known for all designers.
The cooler & closer you run to 25 or below the longer the life.
The 90 deg. matters WHERE it is measured., junction core case or air.
If you are measuring 90 at the case you have massive problems, due to thermal lag the die & junction will be WAY higher.
So she had no responsibility for preventing pregnancy
and she thought the weight gain was what exactly?
Re: Capacity or Revenue?
but USB is crap for transferring data.
throw the case away and fit it internally directly to the SATA.
Re: The NOMX site
One of the greatest acts of stupidity is to believe a " management interface " is safe behind a firewall.
sorry it ain't........
want more proof?
Go to find.synology.com and see how to reflect like a 'pro'.........
The main excuse this "supplier" makes, is that these exploits would not be in the realm of a normal user.
But they sell a device that is supposed to protect against a 3Rd party?
'We should have done better' – the feeble words of a CEO caught using real hospital IT in infosec product demos
Sorry...... but HOW is that even possible?
That said you should come to HK, where most of the tech support companies setup secret accounts , then share the PW in emails and store on mobile phones.
Least you could have done was preview MacPlaymate.
Re: Gentlemen: start your lawyers!
The legacy of all that Japanese bullshit ,SigMA 6, "lean" systems, economic powerhouse bullshit.
Re: PWC again eh?
If you ever see an 'Audit' by one of these so called top companies you will understand completely.
Prisoners built two PCs from parts, hid them in ceiling, connected to the state's network and did cybershenanigans
Re: Odd that there were network ports available inside the secure area
LCD monitor & clowns pocket comes to mind.
Re: They would have got away with it
**Example of a professional Microsoft rant....**
I have a very nice email from microsoft tech support explaining why they have DELIBERATELY changed the 2016 office software to loose attachments.
Double clicking on a word attachment in outlook opens the file in word, but puts the file in a temp directory .......8 levels down.
so when you do a save , guess where it goes?
and when you quit outlook...... guess what happens to the "temp" folder.
the explanation goes on to point out,.......
but notice how we have made the "one-drive service" very easy to use for saving your documents., the functionality is by design.. Please use one drive.
Re: Hats off to them...
yep and your little system fails on 2 counts:
1. Mac spoofing
2. Current trend for devices to randomize the MAC.
Put down your coffee and admire the sheer amount of data Windows 10 Creators Update will slurp from your PC
So if MS happens to slurp medical records or a lawyers confidential discussions with a client they are going to be allowed to get away with that?
It will be triangle, taking only apple Triangle shaped PCIe v1.0 boards as well as having an LCD icon display and be backed by V2.0 of a 6502.
It is clear that Jobs made a massive mistake with his current Technical person.
Thought it was 120.....
Re: Best Practice...
No..... A password manager.
Re: Could this happen by accident?
Beeeeeee cauuuusseee the reward is based on some theoretical assumption of robbing peter to pay paul.
since the calculation is solved "quickly", it is theoretically possible that the time saved by not calculating an extended solution, frees up time to solve another solution quickly, and hence reduces the cost of the whole setup, thereby making the payout higher for the winners.
There is not a single fixed "next block" it is not a single solution race, it is a race to hash a semi-random collection of spends so that the proposed solution meets the difficulty currently required AND gets that solution accepted by the majority.
Re: house of cards question
No... no it cannot
Go look up what ASIC means.
Re: house of cards question
Nothing , because it is NOT computing power, it is hash calculation power
the chips used are single solution hardware. remove the requirement for work and you re left with e-waste fit for land fill.
Nearly all the hardware on offer is useless for generating fully extractable sha256(x) or sha256(sha256(x)), you cannot actually get out all the XYZ GH/S results.
Since the check for a solution is hardcoded into the actual chips, so the result calculations are not even extractable only single proposed solutions are passed out of the chip.
They have started their shit again, where they attempt to eradicate osx from the business work space.
Skype for business on OSX WILL NOT communicate with any outside skype application not within the business domain.
Strangely the windows version has functionality to add contacts to external skype users.
This and the continual Nazi Jackboot like behavior of dictating to IT admins what services are turned on by default, clearly shows that microsoft are intent on resurrecting their old habits.
Re: Thank you to Assange?
We seem to be in a minority,
people at work think i'm some sort of paranoid conspiracy merchant who is against the world.
The sad fact is that most people are the chimps in the first space trials,
surrounded with technology they know nothing about & totally unaware of what is about to happen to them.
And this is why Asimov 's three laws of robotics are complete bollox.
They are as thick as pig shit and have a FU attitude.
We run a distributed network over a production facility, pattern print jobs are processed at night.
Well they used to be until win 10, now we just come in in the morning to find the print controllers have all shutdown to update.
My mother ate a shed load of blue Stilton whilst she was pregnant.
It is now the only cheese i will eat,
Re: RAID cock-up
for the cost of $100 us we pull 1 drive a month, then recycle into the desktops.....
Re: Not a PC
you can start a serious fire with a few hundred mA and a fuse is NOT there to protect the appliance
it is there to protect the cabling... go read the BSI standards.
I have even seen CORECT BSI approved fuses not blow and cables to completely burn.
go check out the washing machine & dryer fires.....
Re: Not a PC
do they still use fuses or is it actually an ECB?
caddies are not Lego..
it is fairly easy to fit a disk drive upside down even though the caddie is correct.
Saw one IBM 'engineer' do it......
120Mil is NOTHING when developing a new technology potentially worth Billions......
Really good R&D spends upto 25% of a companies profit, or the UK could continue to piss 16 billion down the drain by supporting the EU Greek bail out....
Users are stupid and Greedy, that is why they are Easy.....
The guy is an idiot, "very few people" he needs to get out of his little ivory spy tower and start looking at Chinese Android, see if he thinks a few million devices are a "few people"
Or he could try running a corporate network in china factories, and get to see the "shill devices" that have been specifically engineered to hack corporate networks from the inside.
Perhaps take a look at WIFI.com, a company that specializes in the theft of corporate WIFI network credentials in the attempt to turn a profit by spreading advertising malware inside corporate systems.
Then maybe he can be qualified to talks about android "security"
So the solutions are:
1. get a free pollinator from nature, something that has been honed for tens of thousands of years is 100% bio degradable and self repairing.
2. Poison the planet with man made insecticides to wipe out natural solutions then make some landfill plastic shit that requires massive resources to work & service the tasks previously taken by a natural solution. finally make that so it is not bio degradable.
Seriously......... WD cause us nothing but problems....
sounds like Microsoft & 365.......
We have identified a small % of users... yep when it is calculated over several million users....
never will they give a figure... I.E 500 users have been impacted......
Seriously WTF was this not on a separate VLAN with Firewalls.
Typical China like mentality, just increase the subnet mask and stick it all on the same network with the same DHCP.
As one of my staff asked today,
"I've been reading up on some internet tutorials, can you give me a config dump of the CISCO core switch & FW, I want to improve it"
Scum bags have not told anyone that the new clients also prevent you from using any domain account tied to a business that uses a M$ server.
Also force you to enter a genuine name/email-address as the id, plus forcefully insert spaces to beak functionality