Re: no provision for utilities at all
Or, apparently, a cup of tea (which the civil service lived on then, and probably still does).
46 posts • joined 3 May 2018
This is an old problem. If you read "Most Secret War" by R. V. Jones, he relates how a new building was built for the Admiralty in the late 1930's that had no provision for utilities at all. They had to move in as-is and wait for 6 months, at which point the necessary modifications could be attributed to depreciation.
At which point Google can (and probably will) argue that the person concerned deliberately and actively concealed their location, and that there is no technical mechanism in place for Google to be able to determine their true location given the intrinsic technical characteristics of a VPN.
When I was an undergrad, I spent a year working for Link-Miles (the old flight simulator manufacturer) down on the South Coast of Blighty. I was actually working in the business support section of the company, and my manager had a Commodore PET computer - the more expensive business-class model. This was used to generate various reports for the PHBs.
Some of these reports required over-night runs, which most of the time was not an issue. However once or twice a week we would come in on the morning and find the computer frozen with the report job only partially done. Much head-scratching occurred, and I eventually put together a small program (almost embarrassingly simple) which we could use to work out when the computer was freezing. To our surprise it was at almost the same time every night - about 2:00 in the morning. Cue more head-scratching for the next couple of days, until someone realised that there was a medium-engineering company next door. Light-bulb moment! A quick trip over resulted in us finding that: (a) they had an electrically-powered drop-hammer on the premises, (b) they tended to use it during off-peak hours to save money, and (3) they where currently using it two or three times a week in the early hours of the morning.
It turned out that the drop-hammer was generating voltage drop-outs on the primary mains supply which was serious upsetting the CPU of our PET computer, hence the lock-ups. The subsequent installation of a UPS to regulate the voltage saw the problems magically disappear.
Depends on which country you are operating in. Since the miscreants are are encrypting peoples files and then demanding money before they *might* give you the key to decrypt them, under UK law they are committing blackmail (or technically, "demanding money with menaces"). If you set up a brokerage company like you describe, you could end up being charged as an accessory to the blackmail, since you are clearly profiting from the actions of the bad guys even though you are not performing the blackmail yourself.
Many, many years ago when I was young and working in my first job, I was given responsibilty for managing a small network of Sun workstations (one of which was a diskless node). One day I decided I need to clean up /tmp since it was close to being full and causing problems, so I logged on as "root" and entered the command "rm -rf / tmp". Note the significant space!
Control-C followed after about 2 seconds, but there was not enough of the system left to be usable (although I was able to dump the data directries to tape prior to a full re-install).
The effects of gravity on time has been known for nearly a century. Surprisingly the SI definition actually takes that into account; a measurement of (say) a second will be identical whether made on the surface of the Earth or in deep space; however an absolute comparison of the measurements will show a (very small) difference due to gravity-induced time dilation.
In order to detect gravity waves, they will need a network of four or more clocks equally distant from each other. One would then measure the absolute differences in the clock readings caused by gravity waves; by looking at the order in which the clocks drift back and forwards it becomes possible to determine the direction from which the gravity wave hit us.
I can remember in my first job we received a Dec VAXstation which was going to be used on a specific project for a customer. The thing arrived on a pallet containing a vast quantity of boxes (including one that just contained a sheet of paper saying "this box is empty" - shades of Douglas Adams), including enough manuals to fill 3 shelves of a cabinet.
About a month later the software engineer working on the project needed to know the system call to print a text message on the console. This ended up talking 4 us, and having to refer through 4 fully cross-referenced manuals before finally tracking down the system call.
Paper documentation is good, and I often still prefer it. But Dec used to take it just a tad too far in my opinion.
Brussels will never agree to weaken GDPR, that could be seen as an admission that they might have got something wrong, and hence is completely against their standard dogma.
I very much doubt that Washington will enact something as tough as GDPR since there will be too many "interested" parties who will be busy buying the votes of Congress/Senate critters to let anything through like that.
I think that what is more to the point is that the UK Human Rights Act does not apply inside the Ecuadorian Embassy (the Embassy is diplomatically considered a part of Ecuador), so Julian's court action will probably be tossed out PDQ. However it is likely to annoy the Ecuadorian government enough that, shortly after the case is tossed out of court, Julian will be tossed out the front door. Probably after giving the plods a heads-up so they can organise a "taxi" for Julian to nearest nick.
Ecuador did try to give him diplomatic immunity a couple of years ago; I suspect so that they could get him on an aircraft to South America. HMG refused to agree to it (diplomatic immunity is only valid if the recipient country agrees to it, you cannot just extend it to anyone you like) . The whole point of diplomatic immunity is that it is not supposed to be abused; Ecuador came within a cat's whisker of breaking this rule!
No, they stopped that several years ago. However you can be sure that if Assange does decide to leave, old Motor Mouth will let everyone and their dog (or cat) now about it. At that point the plods will make sure that they are in a position to greet His Dickheadness with open handcuffs.
They probably could, but it might well be more satisfying to simply kick this current case into the long grass, and make a court order stating that he cannot make another attempt without identifying himself.
Judges are human too, they might as well get some satisfaction from their job!
It is definitely possible, and in my experience there are too many people who click on links automatically and regret them immediately afterwards.
Saying that however, the real question is why their flight info system could be accessed from the internet, whether directly or indirectly (e.g. via an internal router). Yes it is really convenient to get your updates as they occur, but what you really should do is download your updates to a DVB, check them via an antivirus footbath, and then load them on to your systems manually. Means more work for the techies, but ultimately secures your systems against 99.99% of attacks, and helps to neuter the ones you cannot secure against.
This may sound paranoid, but it isn't really. Remember, they really are out to get you.
Typical European Commission thinking, they seem to think that anything even vaguely European needs to be regulated until the pips squeak. They have no idea how the real world operates; instead they operate in a cloud-cuckoo-land where the entire universe resolves around them.
Enigma was broken because there were inherent weaknesses in the system (e.g. a letter would never encode to itself) and the way that the operators used it (retransmitting the same message with different keys) that gave the brainacs at Station X a lever allowing them to crack open the whole system.
It also helped that the Allies captured some Engima machines and the rotors, meaning that all they had to do has break the code settings.
An (apparently true) story.
IBM was caught red-handed infringing on one of Sun's patents. Their respective legal-eagle teams then had a meeting that went something like this:
SUN: We want you to pay $x million in order to be allowed to use this patent, plus another $y million in damages. Otherwise we sue your ass.
IBM: We want a cross-licensing deal and no damages.
SUN: No way. See you in court.
IBM: We have the largest patent portfolio in the world. You almost certainly have infringed on something. Do you really want us to go through the portfolio to find out exactly what and how many times?
SUN: About this cross-licensing deal ...
Many years ago (just before the 21st century) I was doing some work as a contractor to a company that was building a major new satellite communications system. The employees of this company were outnumbered by contractors; in fact I think about 60% of the company was made up of contractors at this time.
Things did not precisely go according to plan, and having blown $5 billion in 3 years and not achieved anything the decision was made by the very senior PHBs to get rid of all of the contractors. This decision was actioned the following Monday when all of the contractors were given 1 weeks notice.
The company made two basic mistakes. Firstly the forgot that several of their most specialised and expensive contractors were also on long-duration contracts (one had just signed a 12-month contract with no get-out clauses). As I understand it the company was sued by at least 30 of their former contractors the following week, and ultimately lost each and every case. The second mistake was even more basic - they failed to ask for a hand-over to the remaining staff who did not have a clue what the contractors actually did.
You can probably visualise what happened the following two weeks, and also the reactions of the company's management when they tried to ask the contractors to come back for a few days for free to perform a belated hand-over.
One year later it was completely bankrupt.
On the flip side I had to visit a satellite ground station site in the Netherlands a couple of years ago with my boss (not military, but these commercial sites normally have tight security due to the cost of replacing all that fancy kit). My boss had to go through a long process to prove who he was to the security guard. In my case he just tossed me the security pass (a higher grade one than my boss I should add) with a friendly greeting - I had worked at that site 10 years ago and they still had my details on file!
We actually a phone which basically has the same function - a BT 8600 (yes, BT actually sells something that is both useful and works). Has basically eliminated the cold callers on our landline. Wish it would do the same for the mobile, but I've found that putting them on "hold" sooner or later results in them hanging up (having wasted a load of dosh on a useless call).
No, you are right. What you may have forgotten (or just not been aware of) is that NASA was able to make very accurate measurements of the mass of Uranus and Neptune when Voyager-2 made it's close approaches to them. They discovered that Neptune's mass was significantly different from the first estimate made by astronomers (I think it was about 4% heavier); when they dropped that into the orbital motion calculations the unknown perturbation disappeared.
No-one has every said that Linux is immune to viruses; however it's security model (in particular the hard separation of the kernel and user-space) makes it *very* difficult for a virus to get any more that a nominal foothold. This should be compared to all versions of Windows what are designed for infection!
A time bomb (or suicide bomb) is possible. Triggering one from vibration is probably a no-goer since the "train" is flying through a vacuum without touching anything (that is what maglev is) so there is unlikely to be enough vibration to work with. However you do it, the result would be a very nasty mess!
Biting the hand that feeds IT © 1998–2019