* Posts by rcxb

27 posts • joined 22 Aug 2018

Defaulting to legacy Internet Explorer just to keep that one, weird app working? Knock it off


Re: I've always felt uncomfortable with this statement

Serial-over-lan works perfectly to access the BIOS with any decent server. I do it on a regular basis, back to those 2950s. Plus ipmi allows you to change several settings from the command-line without entering the BIOS.

Windows has had serial-over-lan support since 2003. Microsoft calls it "Emergency Management Services". It's enough to get your booting or networking issue sorted out, then you switch over to RDP, remote MMC, or whatever.


Re: I've always felt uncomfortable with this statement

"iDRAC allows access to a virtual KVM and other features which is difficult to emulate in a telnet shell..."

Anything newer than a PowerEdge 2850 has IPMI Serial-Over-Lan support that works far better than a virtual KVM. Text only, fully standards compliant, no browser interface needed. Comes with all those features found in your DRAC web UI and more. Just once check-mark to enabled it on Dell servers.

Airbus will shutter its A380 production line from 2021


Re: Turns out Airbus was the silly one

There were twin-engine jets from both Boeing and Airbus flying trans-Atlantic, and the ETOPS rules went into effect in 1985, years before the very first steps in A380 development. The future direction of air travel was out there for any well-informed individuals in the industry to see.

Not heard owt bad about Huawei, says EU Commish infosec bod



Doesn't matter whether you get the equipment from an ally or enemy. When you're buying equipment with known lack of all security and long-standing bugs because it's done as cheaply as possible, the attack could come from anywhere, not just from the manufacturer.

Musk shows off the latest power plant for Starship, replaces Tesla CFO with a millennial


What's with the dig at millennials? You know they're just shy of middle-age now, right? Seems reporters think "millennial" perpetually means early-20s young adults. In fact there's never been a more clearly delineated generation, with the date right in the name. Might as well call out those no-good young whipper-snapper GenX'ers.

Are you sure your disc drive has stopped rotating, or are you just ignoring the messages?


Re: I can believe it!

Forbidden areas: Go back a few years, and mainframe printers in particular were big open dangerous things that looked like newspaper printing presses. They were behind locked doors, with a window you'd go up to, ring a bell, and stand around for possibly quite a while waiting for someone to come over and hand off your stack of wood-pulp. Relevant to this case, the people who were in the locked room and able to hand over your stack at any given time, weren't always one of the few trained to replace consumables, so wait times could be lengthy.

Unknown location: It's fairly common to have a couple printers in a rotation, and sometimes many more than that. With a dozen printers on two or three tables, it's easy to spot the one that has papers in the output tray. It may be less easy to find the one out of a dozen that has an alert icon on the LCD, or a sometimes dim red LED somewhere on it. Doubly so if several of those printers are substantially different models that have the alerts in different locations and in different forms.

I am fully sympathetic to lowly users being dumb and helpless. I am less sympathetic when the supervisors/managers of the groups are similarly slow witted, unable to remember or follow instructions, and unable to filter the dumb, helpless and repetitive requests from their users before wasting the IT dept's time on such trivialities.

Apple blew my mind – literally, says woman: MagSafe plug sparked face-torching blaze, lawsuit claims


Would I get to pick which leg? And the method of removal I find most amusing?

Heard the one where the boss calls in an Oracle consultant who couldn't fix the database?


Re: "ran like a three-legged dog"

Had a 3-legged dog, myself. Missing a rear leg. Ran circles around everybody. Walking along slowly was another matter, entirely. He had two speeds: 1. sit down 2. run like mad.

Early to embed and early to rise? Western Digital drops veil on SweRVy RISC-V based designs


You won't find many drives that can sustain more than 1Gbps, even sequentially, definitely not random reads/writes. You'll only see that briefly to/from cache. Besides, SAS and SATA are higher speed in part so they can be shared across several drives. Ethernet switches give everybody the full 1Gbps. And let's not get into overhead. USB3 claims 5Gbps, but is actually a bottleneck to drives than can't sustain 1Gbps.


With that kind of CPU, WD should be able to sell individual hard drives with built-in ethernet, instead of just SATA or SAS interfaces.

It's a, it's a, it's a SYN flood: Quick, ditch that packet


Syn flooding has been adequately addressed for decades. DDoSes don't bother with such tricks anymore, they just send a huge amount of traffic.

Peak tech! Bacon vending machine signals apex of human invention


This doesn't sound like the USA I know... That bacon should be chocolate-covered!

Technical foul: Amazon suffers data snafu days before Black Friday, emails world+dog


Relevant Information

I may be able to shine a little light in the darkness... I e-mailed security@amazon.com a week ago because I got a spammy e-mail specifically offering money to write product reviews on Amazon This is to an e-mail address I only give out to family and retailers I similarly trust with my credit card data.

It's not the first time I've gotten targeted emails that seem to know I'm a highly rated reviewer on Amazon, but this time they failed to use the BCC field and supplied me with a list of dozens of e-mail addresses that clearly look valid. Not remotely sequential, not dictionary words stuck together, not brute-forcing all random combos, etc. Clearly a list of personal e-mail addresses.

I requested they check the list of addresses against their user database to confirm or disprove my strong suspicion that their website is somehow being coaxed into leaking private customer e-mail addresses. Then came the Amazon e-mail early this morning...

Purely speculating now, I wonder if this is related to the phenomenon of lots of new merchant accounts popping up on Amazon, which claim to have millions of items at absurdly low prices, then either send a tracking number for unrelated packages (to stall for time) or else don't even bother pretending they have ever shipped anything. In either case they're playing a numbers game, waiting until their feedback and refund rate is bad enough that Amazon blacklists them, but in the mean time collecting angry e-mails forwarded through Amazon's e-mail proxying system of people asking where their items have gone.

Symantec execs cooked the books to protect their fat bonuses, investor lawsuit alleges


So if bad actors are liable for illegal behavior that caused a drop in stock prices, do they also get all the credit from their illegal behavior that caused a stock price rise some time before the fall? Maybe the shareholders will end up having to pay them.

US draft bill moots locking up execs who lie about privacy violations



A senator in the minority party (which doesn't control the house, senate, or the presidency) proposes a strict privacy law a few days before a major election? I'm sure it'll sail right through.

Official: IBM to gobble Red Hat for $34bn – yes, the enterprise Linux biz


Re: Amidst all the wailing and knashing of teeth here

Linux has long had pretty much everything you say it doesn't:

Live OS upgrades: KSplice has been around for a decade.

Inline memory compression: Compcache / zram has been around for a decade, also.

Hypervisor overcommit memory: KVM has had over-commit for at least a decade, Xen even longer. VMware longer still.

ASO/DSO (automatically tune the operating system: Linux systems need vastly less (if any) tuning of parameters, compared to traditional crufty Unix systems.

Workload Partitions: Linux has rather advanced containers in OpenVZ/LXC/Xen for over a decade.

Suspend / Resume: KVM/LXC/etc. suspend / resume just fine.


Re: You may have got it the wrong way around!

"IBM sold off the x86 hardware business to Lenovo and the Apple/Microsoft partnerships are not interested in alternatives to OSX and Windows."

Hmm,.. I recall Dell occasionally steps into the fray with Linux developer laptops and Windows-free desktops. Dell isn't as much of a direct competitor to IBM as others like HP, Oracle, etc, so a partnership where Dell boxes get shipped with IBM logos at a marked-up price to big IBM shops might work.

Yes, Americans, you can break anti-piracy DRM if you want to repair some of your kit – US govt


Re: Breaking DRM to perform "unauthorized repairs"

Copyright is one of the issues both sides agree on. Hollywood is a major contributor to Democrats who doesn't want to see that well dry up, and lots of other business interests make money from longer and stricter copyright, so the Republicans are on-board too. The lack of opposition is why copyright has been extended practically indefinitely, despite that being blatantly unconstitutional. Robbing the public domain while giving nothing back has been highly profitable for Disney and many other mega media corporations.

Chinese biz baron wants to shove his artificial moon where the sun doesn't shine – literally


Re: Drag

"So, HOW BIG does that mirror need to be?"

They say 8 times as bright as the moon. Moonlight is under 1 lux, so call it 8 lux. Full sunlight is around 100,000 lux. So you need a surface area of around 8/100,000ths the area of the city you intend to illuminate. If I did my quick maths right, You need a reflector of 48x48ft for every square mile of city you wish to illuminate.

Leaked memo: No internet until you clean your bathroom, Ecuador told Julian Assange


It sure is nice that Assange is a man of his word and he immediately agreed to be extradited to the US when Pres Obama commuted Bradly Manning's sentence.

SUSE punts SES v5.5 out door, says storage is going software-defined and open source


Re: how is this different from red hat?

The article is fine, you just missed it:

"SUSE was the number-two contributor to Ceph open-source code, and said it typically brought out commercial versions of Ceph releases from the open-source community four to six months before Red Hat."

Intel's commitment to making its stuff secure is called into question


Re: Speed

- "Why not an ACTUAL jumper(s) on motherboards to enable diagnostic modes, management engines, BIOS/EFI updates etc? You should need physical access, more than USB or other socket on outside and NEVER default access by software without a HW jumper enabling it."

I'm not going to pay data-center staff to go around swapping jumpers on hundreds of servers every time we want to update the firmware, then put them all back again. That goes double if we want to do the firmware update in the middle of the night when load is low.

US mobe owners will get presidential text message at 2:18 pm Eastern Time


Re: "And EAS alert can be avoided with a mass media fast"

Register-to-English translation: Shut off your TV, radio, and mobile phones, and you won't see any emergency alerts.

'Men only' job ad posts land Facebook in boiling hot water with ACLU


Re: Equality in advertising

- "What people are born with doesn't change (race, sexuality, gender dysphoria, etc) and is something they have to live with through no fault of their own."

So you're saying you fully support age discrimination?

Dust off that old Pentium, Linux fans: It's Elive


You can make your OS as lightweight as you want, but if you want to browse modern web pages, Firefox / Chrome / etc are going to chew up at least a couple GB of RAM on their own, and make you sorry you tried it, if you have less. I only wish there was a lightweight browser out there which could render modern web. Now THAT would be a huge productivity boost for everyone.

Elders of internet hash out standards to grant encrypted message security for world+dog


Re: Cue firestorm

(1) That's just ignorant. Encryption is math, and mathematical proofs are absolutely fundamental, untouchable by any technological progress. It only just happens that the currently popular factoring systems of public key encryption ala RSA are potentially vulnerable to quantum computers. There are a number of alternative, existing methods of public key exchange which are absolutely invulnerable to quantum computers. There's even a full Wikipedia page just on the subject of "Post-quantum_cryptography".

Biting the hand that feeds IT © 1998–2019