2130 posts • joined 10 Jun 2009
This is nonsense, according to the Boeing website the 777x has a two seat configuration capacity of 375 whereas Emirates run the A380 with a two class capacity of 615. Nowhere near comparable.
They are comparable if you figure it as passengers per engine. In fact, the 777x comes out better.
The big reason no one wants it is because the first few A380s built are less fuel-efficient than later ones, as various tweaks and improvements have occurred.
Think how many soft drink cans it'll make.
In theory it shouldn't need anything in the router apart from understanding IPv6, broadcasting the relevant magic to the local network and establishing a default route to the outside. The equivalent of the NAT 'firewall' that you get for free with IPv4 is the fact that the router firewall should be configured to drop any packets not associated with a connection set up by the local network. That stops all bad stuff coming in unless the user explicitly configures a rule. It's on a par with doing port forwarding under NAT with no other restrictions in place (so internal users can talk to any external address and port).
I find OpenWRT to be just fine for this stuff, although admittedly it's not consumer software (but that style of port-opening interface could be).
I run a few low-traffic sites and find that the bots that visit are invariably IPv4. I do get traffic from what appears to be phones on IPv6, and a sprinkling of others. Because I have IPv6 set up on the home network here, I find that it will often access the rest of the world using IPv6 if the far end offers it.
That's the other side of the coin of course, your average punter just connects his router to the cable modem (or uses a smart cable modem that does both jobs). If that magically broadcasts the IPv6 magic on the local network then most modern devices will set up and use it and said punter will be none the wiser for it. If he's got to go into a configuration menu and tick a box somewhere then all bets are off.
Re: Return ticket?
Ask YouTube about the NASA Sample Recovery Robot Challenge. Some of us had fun trying to do phase 2 a couple of years ago. It's surprisingly difficult, although I think technology will make great leaps before they have to do it for real.
It was indeed shrouded in fog. We heard it at the official viewing site but not a glimmer of light. It was as cold as a British Bank Holiday at 4am in Lompoc.
Re: Citation needed....
Outsourcing works well when you've got a well-defined package of work that needs doing, you haven't got internal staff available to do it and you won't need those staff once the work is done. Or it's a longer-term thing but only for a day or so a week and it's easier than trying to recruit a part-time employee to fill the gap.
Most of the horror stories are missing one of those requirements, usually the 'well-defined package of work'.
Saved by the mail app
I'm not sure I've ever fired up the Windows mail app, so I guess it's a change I wouldn't even be aware of if not for articles such as this. I locked down Windows apps by default, restricting what they could do on the machine in an attempt to impose some level of security.
I had a Galaxy 4, I just bought a Moto E4+ for work use and it's a step-up after four years for less money. It's also a bit too big but I'm getting used to the bulk. I don't use the fingerprint sensor, I much prefer a password even if it's a bit less convenient because it's more secure and more immune to US law enforcement. I don't know of anything on the newer Galaxy or iPhones that would tempt me to part with $1000 instead of $129.
Re: Poor decisions
My cattle class seats tend to take about a week to wear off, especially if it's long-haul.
How many people know how long a chain is though? It's a bit like an acre, a unit often used but ask people how big it is and most won't know (my answer is 'one chain by one furlong'). Perhaps the good citizens of New Zealand are more clued up about old imperial units than others.
Re: Chameleons ?
I've heard that there's a chamelephant in the room but I can't see it and people are reluctant to talk about it.
UK ICO, USCourts.gov... Thousands of websites hijacked by hidden crypto-mining code after popular plugin pwned
Another good demonstration of why ad blockers and script blockers are essential.
I see the ICO site is down for maintenance at the moment, I guess someone's pulled the plug on it until they can fix it properly.
Website Guide to IVR
What would be ideal is for companies to have a web page with the entire script to their IVR on it, so you could go browse it in advance and then when you hit the voice prompt just key 14235 and get immediately to your chosen point. If there wasn't a suitable endpoint for your query then you'd know in advance and instead of wasting time on the phone, could try writing a letter, wrapping it round a brick and delivering it to their offices in person via a suitable window.
Re: Simon will look back on this
He doesn't usually retaliate in the next episode. Revenge is a dish best served cold.
Re: You mess with the GNU ...
Look at it this way. I downloaded the source code. I've made changes, and given them to my mate Bill. I've now made more changes, but I don't want to give those to Bill. Bill is asking for them, wondering why I've now spurned him, but I'm not going to give them to him and I'm keeping my reasons to myself (basically, I think Bill is a plonker, and I don't want to hurt his feelings). Instead I've given these new changes to Alice. Where's the GPL2 breach in that?
If you've given Bill the binaries then he's entitled to the source required to build those binaries. GPL2 does not require you to give him updates to what he's already got. If you gave the updated source and binaries to Alice then she is within her rights to give the binaries to Bill, and if he asks, the source code too. Yes there was a high degree of daftness in putting stuff in writing.
The US credit scoring system is not fit for purpose anyway. I don't care what algorithms they're using, I consider them to be wrong because they fail to account for all relevant factors. Worse, the credit system has wormed its way into almost everything - want a phone contract? Unless you're paying up-front they'll go check your credit score. Want a job? Yes, some employers want to know too.
They seem to give greater weight to short-term things such as your current credit card balance, yet ignore the fact that this is a cyclical thing and that it's paid off in full every month, so you get a better rating just after you've paid off the card than just before, even though your overall spending/paying behaviour is the same (obviously if you don't pay it off then that's a different matter).
Minority Report, anyone?
El Reg is still IPv4 only. As is the BBC. Perhaps it's all a plot by the Chinese to prevent their people from accessing such subversive media.
The IPv6 network, first developed in the 1990s in China
Was that before or after Al Gore invented the internet?
That's what I was thinking too. Apple can point out that it's not a good use of taxpayers' money wasting it on lawyers when the government clearly has a way of achieving what they want without needing Apple to help.
Re: Fake news
Why is it fake news when a lot of people seem to have seen it happen (not me - see below)?
Damn! I missed it. For the good of the US (and the world) someone ought to set up a cron job to deactivate it overnight, although if he's off in Asia then perhaps 'overnight' needs to be a bit flexible.
I did an exercise once, I took an existing C# app that read from a USB dongle and updated a screen and ported it to C++ with the assistance of Qt. The original motivation was to be able to get the same functionality on Linux and the original, not exactly greased lightning on a Windows machine, was like cold treacle when run under Mono on Linux. Then I ported the C++ thing back to Windows (as in tweaked the HW-specific bits and recompiled it) and it was easily way more responsive than the original. C# is OK for slow-and-dirty hacks but a real pain otherwise. Yes, Perl is probably preferable.
That's not a proper perl script, it's almost readable.
Besides, internet fridge developers seem to have forgotten that not everything you buy from Tesco goes in the fridge, or even in the kitchen.
Oh, they have. You can have another box for the bathroom, one for each bedroom, one for the cleaning supplies cupboard. All interlinked so they can compile a master shopping list for everything.
It depends on how you're doing it. Older manual methods wouldn't have used xor, more likely it was a book of numbers, to determine which letter to substitute for the one in question.
Re: "unlike public key encryption, which has easier key distribution but is less secure "
Once upon a time DES was good enough, now it can be cracked quite quickly, almost real-time. If computing power continues to increase at the same rate, today's stuff will one day suffer the same fate. We're already recommended to use larger key sizes because 1024 bits can be brute forced. the information being protected may not be relevant by the time it's easy to crack - a bit like the old Playfair cipher used a hundred years ago - it could be cracked in a few hours, but if the message was "attack in 15 minutes" then it would be somewhat out of date by the time it was cracked.
Uncrackable encryption has existed for ages, it's known as the one-time pad. Unless you have access to the key then you stand no chance of reading the original plain text. Its big weakness is key generation and distribution, which has to be done via secure channels in advance, unlike public key encryption, which has easier key distribution but is less secure (depending on the amount of compute power available). Of course, one advantage of the one-time-pad is that in theory it is possible to easily create a spoof key to produce a harmless plain text.
I'm glad you qualified that with a 'yet'.
I'm wondering how they'll extract the information from those who are naturalised citizens, unless the starting plan is just to give themselves permission to hold the information without any specific plan to actively acquire it. I can't quite see USCIS doing a mailshot to people with a form asking them to fill it in. Or rather, that's what I'd like to see them try because that's the quickest route to court. More likely is that they'll pick off individuals at airports as they enter the country, which is the time when you're most vulnerable and surrounded by enforcement goons with limited access to a lawyer.
I thought that was normal behaviour for Windows 10. For reasons beyond my control I have to run a Win10 machine and if I have to reboot it then it takes 20 minutes before it's usable again. On the plus side, I do have a Linux VM installed and do as much as I can in that.
Re: More spying?
I'm a bit more careful with mine. A small square of cardboard behind a piece of black tape so I don't get glue all over the lens. Standard fitment for laptops in my possession. Even the desktop webcam spends most of its time hanging from its cord, pointing at the base of the monitor stand where it can record the steady accumulation of dust particles.
Re: Samsung Galaxy Note 8 is $929
My cheaper option is currently to keep using the phone I bought three years ago. It does what I want, and while the battery holds out I don't see the need to upgrade to something that expensive.
I'd like something with the feature set of a Galaxy 4 only with a modern CPU and memory capacity. A lot of the newer ones are too big - the 4 fits in my pocket nicely and the screen is a reasonable compromise between portability and readability. None of this face or fingerprint crap for unlocking either. Dual-SIM would be nice, unless one of the carriers is prepared to offer me two numbers on a single SIM.
The only way updates should be applied to this sort of stuff is by user intervention. Someone needs to have physical access to the aircraft and flip a switch, insert a key or other positive action that allows the upgrade to occur, in conjunction with detecting that the aircraft is on the ground and otherwise powered down. IT should only accept a signed image, and also inhibit all functions related to movement until the upgrade interlock is removed.
The same is true for cars, too (especially the 'on the ground' bit).
Re: Error 0x00000245
ENOTTY - Not a typewriter.
Except it wouldn't be an error i this case but an accurate statement of fact.
Re: They're part of the problem
The US credit scoring system is not fit for purpose anyway. What you get is a snapshot, so the day before I pay off a credit card bill my score can be noticeably lower than the day after. It fails to note that this is a repeating pattern and actually represents a sensible and responsible use of credit.
As for paying interest, if you're doing that on a credit card then you're using it wrong.
As the credit card is linked directly to the bank account and automatically debits 100% of the balance at the end of the month, credit cards have little value over debit cards, currently.
To me, the big difference between a credit and debit card is who is liable in the event of fraud or failure to perform. There are more consumer protections when using a credit card than a debit card, and I suspect that both have way more in the way of legal protection than using your phone. I don't have any mobile banking apps on my phone and prefer to keep it that way. But then, like may Reg Commentards, I like to think I'm a bit more aware of the security risks involved and have a lack of faith in bank and phone security.
Re: Lose the Unsecured IOT Device
There is no excuse for leaving an unsecured device connected to the net these days. I wonder how many bot-nets it participates in already.
If that was aimed at me, it's secure in that it only talks to their server. Internal to my network it's on a VLAN of its own and I've sat there and watched what it does using tcpdump on the router so I don't think it's participating in anything. That's how I know it uses http clear text to communicate.
Re: Apart from smartphones
I normally put my phone into flight mode overnight, I guess that's a usage pattern they can spot. In theory it stops it transmitting, but given that it's a software switch, no doubt someone can override that. Sometimes I forget to restore it to normal and about noon the following day I decide that things have been a bit quiet and realise why.
I'm glad my home is dumb. Apart from smartphones, I have one IoT device on the system and that mostly operates on a fixed timetable, I only talk to it to change the schedule. It's also hideously insecure, using http with no encryption in sight, and the server out in the cloud is slower than a snail on valium. A real POS of design. One day I'll hack the protocol and set up my own equivalent so it need not talk outside the firewall.
My router runs OpenWRT, so hopefully less likely to have dodgy firmware.
Isn't it cheaper to do the last mile wireless...
Yes, if you're the only one using it. Otherwise it's shared bandwidth with everyone else, whereas wired bandwidth is, to a first approximation, all yours (assuming your ISP has properly sized the pipes).
If you've got 100Mbit/s then you lose some of that because radio is half-duplex compared to the full-duplex of a wired system that can (in theory) stream 100MBit to you while taking the return traffic. Radio has to stop sending so you can send the acknowledgements. Then there's the overhead needed for each radio burst so the RX is in sync with the TX before the real data starts. Then there's all the neighbours also wanting some of that airtime.
Point to point wireless is possible, but costs a lot more and may exceed the cost of installing a wired channel.
They should have it on the same basis that BT provides services to smaller ISPs, where there's a wholesale arm that maintains the equipment and allows BT Retail and other ISPs access on comparable terms. Most cable companies are a de facto monopoly, or a duopoly with the local telco so competition is somewhat limited unless steps are taken to encourage that.
So a deal to allow Comcast to put in and run the cabling is fine, but other ISPs should be allowed to tout for the endpoint business without having to pay punitive access charges.
Re: Old school
Cost of wasted space is less than the cost of dealing with it.
I always used to swear mightily at the dodgy attachments when it was still dial-up, noticeable pause as the crap was squeezed down the phone line only to be deleted. It's interesting how things have scaled, back then when it was still small hard disks, an offensively large attachment might have been 100k in size and hold up a V.34 modem link for some time. Now it's all scaled a few orders of magnitude bigger.
Re: "E-Mail is a TEXT medium"
Then what happens when you're told you just lost a big deal because of your paranoia AND that your job is now at risk AND you risk getting blacklisted meaning you may not find a replacement job, either?
If you read my original comment I noted it was personal email, so the only person who could fire me from that is me. At work I use whatever system they have set up, although if I have enough configuration control on the email client I'll set it to favour plain text both ways. It's someone else's job to keep the system secure, my only obligation is to not do something stupid like click on the dodgy link or attachment should it make it as far as my inbox.
Re: "E-Mail is a TEXT medium"
I still view email as plain text by default and I still sent plain text by default. I've noticed that some HTML clients handle plain text really badly, often losing the line breaks and bunching it all up though, but that's not my problem.
As for the occasional one that turns up and all I see is a line telling me I don't support HTML so should upgrade my email client, they're straight in the bin.
I'm of the school that considers HTML email to be a security hazard, to the point that if you send me email with an HTML section and you aren't on my approved list, it will bounce (the joys of personal email rather than business). If you can't present your information clearly as plain text then too bad. Just that simple filter takes out an awful lot of spam without having to try too hard.
Even GoDaddy hit a piece of moral high ground the other day when they finally dumped that Alt-Right outfit.
I am currently debating whether to click on that link or not. On the one hand it might make their sifting job a bit harder if suddenly there were tens of millions of IP addresses in the log, On the other hand I wouldn't put it beyond them to take the trouble to ID everyone and put them on a travel watch list.
Re: Google has also given them the boot!
Several factors at play here. If the site is still at the same IP address then it will take a while for removal of DNS records to filter down, especially if the default TTL was set high, and it'll still appear to be there. If the hosting provider (as opposed to the domain registrar) pulls the plug then it doesn't matter who's providing the top-level DNS pointer, it's not going to find anything. At that point a long DNS TTL works against them because the system will keep giving the old, and now invalid, answer until it times out so their new site, wherever it is, won't get much traffic until it does.
Re: Aim is improving.
True, I was using the centre as a reference but I guess if you miss by 1000km then that's spacing from the surface, not the centre.
Re: Right here on the The Register