78 posts • joined 13 Oct 2007
Jaqui's opportunistic whackiness
And how exactly is deep packet inspection going to reveal the contents of SSL/TLS encrypted streams ? Unix users have had Opportunistic Encryption for years of course, but it's about time someone wrote an opportunistic encryption module for Windows. Then anyone can have the ability can make a secure connection direct to any $REMOTE_SERVER that advertises an OE capability, regardless of whether the application protocol is encrypted or not.
I'm just curious
to know the nationality of the various commenters. Some of them seem to be lacking in the traditional British ability to extract irony and black humour from any situation, however unfortunate. Is it possible that we have a few overseas readers in our midst who, as is apparently traditional for them, have Missed The Point ?
Ah, I remember it when it was just an underground car park which was rented out for parties.
then it became a proper underground club - The Drome. Memories of many happy nights there ...
then it became a mainstream club - SE1
and now it's just another arm of the government.
Thanks for the warning guys, I'll know not to go to any events at SE1 any more.
Title of some sort
I almost posted to your story last week about the Met's own warnings of anticipated police-v-crusty mayhem, that it was nice of them to let us know in advance they were going to beat up protesters - unlike in Edinburgh where it was not advertised in advance, but peaceful marchers were herded into suburban streets and beaten up anyway by the Met's finest on tour.
Unfortunately I didn't, so I can't say "I told you so" ....
More years-old news
Whilst it's always valuable to have research peer-reviewed, this is by no means the first discovery of this effect. Researchers at Harvard were studying it five years ago: http://www.hno.harvard.edu/gazette/2004/03.18/01-ptsd.html and in Montreal three years ago: http://www.chrcrm.org/main/modules/pageworks/index.php?page=002&id=1374
Y2038 is here again
"It was then noted by a perceptive person that the servers all failed on or before exactly one billion seconds before the end of the Unix epoch in 2038" : http://catless.ncl.ac.uk/Risks/24.34.html#subj3
Y2038 is also a factor for present day financial calculations: a mortgage taken out just five years hence will expire in 2038, and life insurance taken out now is likely to continue well past the end of the 32-bit epoch.
We use PING, as suggested by Tony, though to be honest it is somewhat clunky (e.g. its tendency to scrawl stderr messages over the top of its own dialogues). PING also has problems with LVM volumes, and I have found that it fails to restore disk labels on swapfile volumes (so your restored image will probably end up running without swap).
I haven't tried Clonezilla yet but it's definitely on my todo list. As another partimage-based distro I would expect it to be at least as capable as PING, and it claims to support more ghost-like features such as multicast restores.
Not necessarily "taken over"
Many domain vendors turn expired domains into a link spam page automatically. It's quite familiar to anyone who often uses search engines, when a domain expires and a tantalising text fragment in Google's cache is all you now can find about Venezualan beaver cheese.
If the domain is now popping in and out of existence it suggests that this is what happened, as DNS caches slowly update their idea of the web server's IP address from the real one,. to the hoster's holding link-spam page, and back to the real server again.
@Who clicks on ads
Several times I've found that merely viewing Google ads results in cookies from the advertisers' sites being sent to my browser. As a result, and out of pure spite, if Google does accidentally send me a relevant looking advert I now make a point of messing with the ad results by cut-and-pasting the URL into the location bar rather than clicking on the link.
Perhaps I should call it Adtarding, in line with El Reg's rule that if something is free, it's retarded.