I'd also like to add
This is no different from airplanes that have fuel tanks in the wings.
Unless I'm mistaken they even have pumps to move the fuel from a tank to another.
752 publicly visible posts • joined 16 Oct 2007
How do you get lens flares on a picture created by a radio telescope? And the + -shaped effect on the larger stars?
Is just an artist's hand at work? If so, it begs the question how much of these artificially created visuals are manipulated to make them look pretty. For example, are all the colours of the actual subject just arbitrary choices to make it look pretty (radio waves don't have colour per se)?
Are all the surrounding stars actually part of the original image, or just added there for flavour? Are they even real or just product of a digital equivalent of paint, toothbrush and black canvas? The ring patterns in the stars are a bit suspect in their symmetry ...
/end mandatory pessimistic wet blanket ignorant layman conspiracy theorist message.
It's curious how language develops organically, not from a linguist's rulebook or an advertising agency's plans. What's the sense in "pineapple"? Perhaps the origins of the phrase predate Microsoft?
http://en.wikipedia.org/wiki/Eating_your_own_dog_food#Origin_and_alternatives
That was really hard.
I'm getting flashbacks to 1999, trying to get HTML and JavaScript to work correctly on multiple browsers and platforms. I got so fed up with the futility of it I decided to divert my career to sysadmin work.
Do I understand correctly that now, 12 years later the most (?) standards compliant browser actually requires hacks to make a popular site work properly?
* assume foetal position
* hug a penguin
* rock gently
Ah, happy place ...
http://host/abc123
http://host/resource/abc123
http://host/resource?pass=abc123
http://host/resource?user=bob&pass=abc123
In all cases you have a resource protected by a secret. By bruteforcing the secret to access the resource, you're performing an attack. It doesn't matter whether it's an olde CGI URL or a newfangled RESTful URL.
I have. For example, I was at an IT conference last summer and sitting at the back row I could see
a) mostly Apple laptops
b) quite a few of them were running Linux
This is a geeky site. Please don't underestimate people, we can tell OSX + Terminal from Linux. One common reason for installing Linux is the end of Apple support for PowerPC. You can happily run Linux on your old Powerbooks. Others just prefer Linux to OSX.
... and take off your HP glasses for a moment.
It's clear the US was putting (some of the) people in Guantanamo for the purpose of extracting information from them, not because they were enemy combatants or terror suspects. See the case of taxi driver and the reporter.
There is no defense for that. It looks to me like Obama wanted to close Guantanamo to prevent the PR disaster it has become as much as for humanitarian reasons.
Robert Heffernan said, quote:
1) "more like stealing electricity from the water utility"
2) "have greener credentials by plugging a regular radio into the grid electricity supply!"
The fact is, in the reservoir scenario:
1) Installing this radio does not incur additional cost on the water utility.
2) Installing this radio does not incur additional cost on the user, while plugging a regular radio into the grid does.
It may not be perfectly efficient, but *the net electricity consumption is less* than using an ordinary radio. Ergo, it's more "eco" than an ordinary mains powered radio.
If the water pressure is generated by gravity, how are you now consuming *more* electricity with the radio "plugged in"? Does the pump have to feed more water into the reservoir? Does the water have to be pumped higher up or faster?
Answer: none of these. You're only getting a shower with slightly less pressure, i.e. you are consuming less electricity than a radio plugged into a grid electricity supply.
Then there's "a torx screw under the HDMI lid". The E7 is the latter. But feel free to rage on about it.
I'd prefer that my phone stays in one piece if I accidentally drop it. I had a Nokia Communicator some years ago and it fell apart when I dropped it on a hard floor. Nothing broke, but I found myself wishing the battery was secured a bit better.
Since we've moved to the nitpicking realm, I'd say "known" does not mean "universally known". A British Froobology expert could say "I have discovered 113 Froobies and my guess is that Cuban and Chinese know of similar quantities, so the number of known Froobies is probably in the hundreds." He can't know if the Cubans and Chinese have discovered as many, or whether they are disctinct from his. He does know Cubans and Chinese are good at Froobology but they just don't share their findings.
I see what you're saying, too many wishy-washies in the sentence, and in the area of malware "known" does in practice equate with "universally known".
I was not making those assertions. The original article was.
*My* point was towards another poster, whose arguments were totally off the mark. I was hoping to get properly reasoned refutations of the original article. You provided those, including citations. So a sincere thank you for that.
Firstly, please stop mixing things up yourself.
GCC is distributed under the GPL. stdio.h is from glibc, which is distributed under the LGPL. The LGPL allows you to link against glibc from proprietary code, GPL does not.
Then please read the original linked article, esp. pages 8 and 9, and address the specifics. In condensed form:
1) Google Bionic is linked against GPL'd kernel headers, therefore it should fall under the GPL.
2) "On Android, all native code must compile against Bionic", therefore all native applications fall under the GPL
Now point a flaw in that argument. Thankyou.
Read. Think. Don't post.
* Malware Installed by LiveJournal Ad
http://it.slashdot.org/story/06/06/24/1420251/Malware-Installed-by-LiveJournal-Ad
* Major Ad Networks Found Serving Malicious Ads
https://threatpost.com/en_us/blogs/major-ad-networks-found-serving-malicious-ads-121210
* Google Text Ads For Known Malware Sites
http://tech.slashdot.org/story/08/11/14/1352221/Google-Text-Ads-For-Known-Malware-Sites
* Hackers Use Banner Ads on Major Sites to Hijack Your PC
http://www.wired.com/techbiz/media/news/2007/11/doubleclick
* Malware Rising - Attacks Increasing Through Malicious Online Advertising
http://www.securityweek.com/malware-rising-attacks-increasing-through-malicious-online-advertising
etc.
Or whatever your favourite scapegoat happens to be. Politicians, government, people from country X, people not from country X, whatever. I thought freedom and democracy are the cause of all evil.
http://www.imdb.com/title/tt0093058/quotes?qt=qt0475805
You went wrong the moment you said "good people" and "evil people". You'd probably make a good fundamentalist religious type, since things are so clear cut. In fact, one could conclude you're probably just the type of prescriptive know-better "good guy" who ends up causing bad things because you "know better".
So I should trust your "guess" over a security expert?
You've got "a little" experience with FireWire and you "would guess that said laptops had Firewire networking enabled". Well, guess what. You should read:
http://simonhunt.wordpress.com/2009/09/14/firewire-attacks-revisited/
Look at "Defending against this attack." Is there a point saying "disable Firewire networking"? I don't see one.
Please add some citations or take some reading lessons.
So is this just a software bug? Does *any* operating system do "filtering" on FireWire? Reading up on the FireWire exploit it appears neither Apple nor Microsoft do. The article discusses VT-d explicitly in the Thunderbolt context. OS X doesn't use it.
They aren't "reprogramming the disk". The got the admin password.
Please point me to the article where they say USB OTG adds a remote DMA feature to USB. This is what I read:
"However, in some versions of USB (such as USB On-the-Go), the devices will negotiate who is to be master, and who is to be slave. We found a couple notebooks 6 years ago that could be broken into with USB this way."
Why do you think the exploit uses Mac Target mode? What does target mode have to do with this? This is about FireWire and Thunderbolt peripherals having full access to the host system's memory.
Quote: 'The reason this works is the trusting nature of the protocol. Your laptop sends a command across the wire saying "please write the data in my memory location XYZ". What the device on the other end is then supposed to do is send the data with an address of XYZ. But it does't have to. It can instead send data to address ABC. In other words, it can upload malware into the computer's memory and run it.'
Quote: "A hacker can walk up to your laptop while you are not looking, connect a device for a few seconds, disconnect it and walk away with your data (such as passwords). This works even when your laptop is "locked" with the password screen."
Doesn't seem like they are talking about rebooting the system in Target Mode.
Nice bunch of vague conjecture and straw men. Again, citations please.
As we all know, the two main past times in Australia are going to movies and burning money. It's one or the other.
To make up for their lost spending, pirates should break a window for each downloaded movie. That would increase the spending on window repairs, which would employ more glaziers and have an equivalent multiplier effect!
As we all know, money for window repairs in Australia comes from thin air (the burnt banknotes cause precipitation, however the money raining down is only accepted by glaziers).
"But the cull of senior management isn’t going to continue. It might not have been as great as was predicted but don’t expect there to be further tranches of executive exits."
The people who made the bad decisions (or too many decisions) get to stay. Once the transition is over I give it a few months until the next company reorganization and change in strategy ... "We'll go for Android after all."
The share of phone users that browse forums or even install applications on their phones is small. Most buy their phone based on a 5-minute hands on test in the high street. If Nokia can lose customers so can its competitors.
Similarly, the big cash machine for Nokia is the low end S40. Getting rid of Symbian R&D and just buying a ready next generation OS is a good choice, despite whatever whining is going on in these forums. The low end remains the steady though unsexy foundation, all the talk about "Bye Bye Nokia" due to a change in the smartphone OS is overblown.
As for MeeGo and Android, though the typical Reg reader probably loves Linux (I do), wants to tinker and likes the idea of a free as in libre phone OS, WinMo is a better choice to get a foothold in the USA and the corporate market. The US has always been Nokia's white whale.
Lastly, all the conspiracy talk about Elop selling out Nokia is also a bit silly. Why do you all think he was brought in in the first place? A Finn couldn't have done the dirty work and expected to have a pleasant future in Finland, and Elop had the Microsoft connections.