1876 posts • joined 11 Apr 2007
What a waste
I read dildo
Re: Poor excuse for a politician
I sincerely hope that it is a troll post and unwarranted t (good name for a rapper but I digress) does not really think that way...I don't care enough to trawl through his/her past posts and psychoanalyse.
The alternative is, it wasn't a troll post and unwarranted t (that really is a good name for a rapper) sincerely believes in what he/she wrote. Now in 2017 that is more scary than any trolling.
Re: Ridiculous trying to automate this
'I wonder how they're going to try and derive advertising revenue from the suicidally depressed'.
Advertise razor blades, sleeping pills or rope to them?
Re: What could possibly go wrong?
Mmm, I'm a front end developer.
Node.js and docker
Trying to teach an old dog new tricks.
I have to learn node.js and docker.... Well I don't have to I could just resign.
I have coded in various languages, a bit of a jack of all trades and master of none. I find myself having to work out what a node.js app does and how it does it. The app is critical to the business. And I do mean critical. This app was written by a very smart youngster who has moved on. Lot's of clever stuff, even though he has admitted the code is "shitty" ( I can't tell shitty node.js code from good node.js code). Given time, I can sort it, the problem is that time is a critical, there is zero documentation and the app is full of bugs.
I have searched, I have looked around. And I have read read node.js documentation, I have worked a lot of stuff out. Still, I am ill equipped to perform how my employers expect.
I can recreate what this app does in another language that I am more familiar with but it would take months, this is not simple stuff. I don't have months.
Can anyone recommend any courses or web resources that provide good tuition with well commented examples of how to create and dockerise node.js apps that accept user input and use the input as parameters to parse hundreds of disparate text files and render the results to xml?
Best practice, security etc?
Re: Safe home router ?
Seems pretty good. If ADSL+ is all ya need
Practical common sense
Until this is achieved by AI. And indeed local councils, I see little change to the way things are done.
How far should an American warrant go?
As far as US borders. Land marked borders.
Pretty simple really. However being a simple minded, KISS kind of person, I am probably not over analysing the situation and extending said borders into places where the US has a financial or military interest. Regardless of their judiciary (zero imho) in those areas outside of said borders
The real threats
go unnoticed for months maybe years and are never reported. Why? because they went unnoticed for months maybe years.
On another note:
Only skiddies attempt to hack from a location that can be traced back to them.
Running anothers' code is never hard, understanding what it does and what trails it leaves isn't so hard either... Unless one is a skiddie.
Re: "illegal content inciting hatred, violence and terrorism online"
That's how nearly every fsckr operates.
Open minded and friendly discussion ending in mutual acceptance of logic and the evidence has never held any credence with those whom have an agenda. (most people have an agenda, ALL nations HAVE an agenda).
To paraphrase Roger Waters.
"Each man has his price bob and
your's for most it's pretty low"
It is generally illegal everywhere to stand and shout about how you disagree with the controlling powers' view, attitude or actions.
You have no freedom. You did not feel it hit your ass as it left the room?
"its a feature, not a bug"
As bugs are a feature of Microsoft software...
DeepThroat or LongTongue preferred.
On a serious note.. Properly anonymised data please. Strip any and all data that can potentially be used to identify the OWNER of that data and we have a positive. Of course if we are looking at regional variances some location data my be required. However, a postcode/zip code is going to far.
The word owner is capitalised because corporate entities forget just who owns the data. Being an aggregate of data does not equate to ownership.
share your life with strangers on line. ie:Social media. Tell lies on every web form one fills in. If one feels the need to brag about ones achievements on line to total strangers or the general public, perhaps your life is not as fulfilling as you imagine.
And blank the registration number when one posts an image of ones new M3. (I am happy with my 17 year old Ford Focus)
Chop them under water
The scuba diving kit works wonders
"Any privacy concerns would revolve around whether it was possible to identify individuals with the eye-tracking data, and whether it was stored."
Eye tracking data would be as much as a privacy concern as keyboard monitoring and mouse tracking data.
The fact that a camera is constantly monitoring ones face is not a privacy concern?
I guess not as we all know a person cannot be identified from a photograph or video footage. </sarcasm>
I just buy a new car for cash when the old one gets dirty ;-)
BTW.. hackers can bend anything web connected to their whim, if they are smarter than those that chose the OS, and set up the web interface.
Q: WinCE? Isn't there a more secure OS out there that is OSS?
A: Maybe... it depends how it is configured.
Like every government policy,
it is not based on the level of threat as determined by an expert group, it is about control.
Expert groups are commissioned to produce a report that the government will ignore if it is detrimental to what they want. Yet still lends credence to a decision because an expert group was commissioned to advise government.
There is only cake when we get rid of the last bad guy/gal... Unfortunately that would leave us without enough MP's to form a government.
"Microsoft claims “145 million monthly active users” for Cortana."
Would that be 145 million users that don't know how to switch it off?
Thats exactly what it is...
Bribery, you took the words from my mouth. +1
"...and advertising group WPP"
So not all bad news then?
This is Gartner
<me>hands out pinches of salt</me>
"...Gaining this 'acceptance' is step one in the path to homosexuality.."
And I thought it was the realisation that one was attracted to people of the same gender that was step one. Acceptance is not required to be homosexual or transgender, it just makes life a little more comfortable for those that are.
Religious indoctrination is step one on the path to bigotry.
You have a point.
However: If one gets hacked and exposes the personal information of ones clients to an unauthorised third party, it is not the fault of a company or government that was taking similar and as lax precaution as oneself...
It's YOUR fault.
The older I get
the more I think that those who are trained to run computers aren't. And I can never see more than seven layers (or is it veils) in my mystical dream world of Unicorns, no matter how hard I try, or try to get hard.
Joke icon...cos some don't understand satire.
The only real downside to this is that the tax payer and consumer will foot the cost as prices or quantity/quality of product are adjusted so as not to upset share holders and the stock price.
AWS launches celebrity-spotting-as-a-disservice
Allegedly forward thinking (they say what they think will earn a vote) UK political party beg the help of religious fundamental nutjobs in order to form a parliament.
@Demos Re: Are we a simulation?
"and if we are in a simulation, is it simulations all the way down?"
Yes it is.... until you reach the first turtle.
Re: Comey calls Trump a liar
You may be right Adam 52, but so very few get rich by being honest, politician or otherwise. Oh sorry, my bad, he didn't get rich did he. He was born rich.
Comey calls Trump a liar
Isn't Trump a politician?
The word synonymous comes to mind
Re: Yes, progress happens.
"Remember when Windows wasn't a bloated sack of shite?"
Yes, I think it was called DOS
Re: Boo Hoo
In an ideal world all OS's should be secure by default without any need for AV. Unfortunately getting code out of the door quickly and selling it or giving it away for free and monetising by stealing data from the user drives the commercial software industry.
As "IT professionals" we have a choice... We can lock down our systems and our networks. And choose to use alternatives which may or may not require some low level tweaks to work they way we want.
Feel for the consumer, the victim, the person that thinks clicking on the "Next" button will solve their problems and cause them no grief.
@cavehomme2 Re: "We want Microsoft to stop misleading and misinforming..."
IMHO Nope, they are all equal. Honest and truthful multinational corporations do not exist in the real world. Only in advertising do such entities exist
"We want Microsoft to stop misleading and misinforming..."
So they want Microsoft to be honest and truthful.
I have never known MS to be that, it might be beyond their capability.
Perhaps Kaspersky think that Unicorns exist and everyone lives inside a huge hug bubble.
"Such a solution would basically be as secure as their servers."
And who would secure the servers?
The team that secured Talk Talk, Ashley Madison, JP Morgan Chase, Linkedin, Sony, Walmart, Yahoo, Verizon, US Department of Defence, UK Ministry of Defence?
All the above have been hacked: https://en.wikipedia.org/wiki/List_of_data_breaches
As soon as a backdoor or MITM access is given to end to end encryption it becomes insecure. And anyone concerned with security using it would switch to another method.
Re: Two solar masses (in energy) escaped
So much for "nothing can get out of a black hole"
Gravity has been doing it forever!
256 bit AES encrypted plain text file
Several copies:local disk, raid backup server and a couple of USB sticks.
Use a pass phrase like a sentence of 30+ characters. "Why th@ fsck do ! n3Ed t0 b3 s0 P@r^noiD?"
Why trust a third party? Trust no one.
@ version 1.0 Re: I consider
Been there, I showed my dick to a six year old girl, I wanted to see what she had... I was eight not 47. This fscker has no excuse.
anyone and everyone, regardless of gender or sexuality does indeed have a sickness if they send images of their genitals to children.
So hospital or prison?
imho, someone that recognised they had an "illness" would seek psychiatric/medical help BEFORE being caught.
Re: How things have changed
I send email in plain text PGP signed. I read in plain text.
All attachments are potentially unsafe and a plain text rendering of an email will indicate if any links contained within point to mycutekitty.org or iownyaass.com
"Always use caution when opening (such as by double-clicking) files that come from someone you do not know,..."
Always delete emails without reading or opening attachments when they come from someone you don't know. Always treat with caution email attachments from those you do know.
Who writes this? And who is bound by it?
Yes IT techs make mistakes, the environment which they have to control is usually complex. However, IT techs find themselves pissing into the wind when they advise the greedy fsckers that determine policy.
I got sick of getting wet and although self employment brings in less than I earned in my last position, I make my own rules and I alone enforce them.
Re: Does this mean
I made no mention of a corporate structure nor did the person I responded too. My response was for the change to a personal system.
However migration away from MS can be done over time by any corporate. Yes trying to do this in a year would be expensive but as a long term strategy.. No problem. The saving in licence fees alone would go a long way to paying for the change.
The box you are in is a Microsoft construct, what you really need to see is that there is no box.
Re: Does this mean
Re: JLV - Smug mode
I get a lot of emails from addresses I know with attachments or links to somewhere. I can always tell if they are legit. It is obvious that it is a spoofed sender or hacked account email. In fact It is painfully obvious. I don't think I am particularly smart.. to be honest I can be pretty stupid. I just know my clients even though I have many of them.
I sign all my emails with PGP and send all in plain text. I also explain this to my clients and send my public key attached. If they click on a link or open an attachment from an email that looks like it is from me that is not signed... fsck 'em. I can't look after every slow thinker on the planet.
I also see my received emails in plain text. Who needs html email? Aint that what websites are for?
Re: Does this mean
Find an alternative OS.
There are very few applications that cannot be replaced by an OSS alternative. The learning curve in some instances may be steep but you do IT right? Shouldn't be too difficult.
Windows has the edge over Linux for games, sigh. I need a CPU with VT-D or AMD-Vi. to get near native gaming performance in a Windows VM on Linux. I reckon I will be upgrading my hardware as soon as Windows 7 goes out of support. Until then I will game on Windows and work on Linux.
Experienced enough to never open an email attachment or follow a link from an email address I don't know.
Experienced enough to recognise an email attachment from an email address I do know and a link in an email from an address I do know could be dangerous. The body of the message usually gives enough clues as to the legitimacy of the email.
Linux and Windoze user... Who's last virus infection was the Saddam virus on my Amiga 500. Getting old sucks but the wisdom it brings has benefits.
I been in IT long enough to know that If I was asked to design something it would infringe on prior art that I had no clue about. Or some greedy bastards patent on common sense.
Live and let live... We should be paying for quality of service not a patent.
Too many times
Hung up without saying a word. And hung up with a simple fsckoff.
I have behaved as if I didn't know what I was doing and kept them on the phone for around an hour and allowing them control over a VM before telling them I have been messing with computers since 1983 and asking them why they scam for a living.
I have allowed them into a VM, screen recorded everything and sent it to the UK police online fraud website: actionfraud.police.co.uk (I have incident numbers but never heard anything back)
I have even run Tcpview from sysinternals while they are viewing the vm and told them I am logging their IP address for a fraud report. Sometimes they just carry on trying to scam, other times they have disconnected immediately and hung up the phone.
My response depends on how busy or bored I am. I get many of these calls, occasionally 2 in a week. So much so that I have a dedicated Win7 VM setup just for this purpose.