We'll soon be publishing a tool that will help you apply this new scheme and a selection of alternative color schemes to your Windows Console.
Feynman, do they really think CLI users need a tool to change the CMD.EXE's colours ?
3797 publicly visible posts • joined 11 Aug 2009
This is a defamation lawsuit, not a copyright infringement lawsuit.
Well, this is the prelude, the copyright infringement lawsuit will follow, and since, imho, GRSecurity have no leg to stand on, they will be on the receiving end of this unwinnable copyright infringement lawsuit.
Consider them out of business already.
Venerable AC, I think you have completely missed the point, here!
If Perens wins, then effectively anyone doing their own kernel hacks is in breach of GPL2 if they don't publish their hack freely.
Nope, you do not get it. Only those that sell/distribute derivative works have to, they have always had to, BTW.
From https://grsecurity.net/agree/agreement.php (Perens has a PDF: http://perens.com/wp-content/uploads/2017/06/grsecstablepatchaccessagreement_additionalterms.pdf):
Notwithstanding these rights and obligations, the User acknowledges that
redistribution of the provided stable patches or changelogs outside of the explicit
obligations under the GPL to User's customers will result in termination of access
to future updates of grsecurity stable patches and changelogs.
So, in clear, the GPL says I can redistribute the code to all and sundry AND explicitly prohibits the addition of limitation to the contract. GRSecurity says: if you exercise that right, you are no longer a customer. Clearly in breach of GPL, it no longer applies to GRSecurity, they have no leg to stand on, they are now selling Linux kernel patches without a GPL. Linus, and a bazillion other poeple, can sue them to hell and back ... and Perens can only win. This future code debate is mute, if I redistribute the code freely, I will be sanctioned -> clearly against the GPL.
You have to understand that their whole business model relies on Linux kernel patches, that the Linux kernel was created by a great many people, that it could not exist without a license like the GPL ... great to see them contribute, sad to see them trying to milk ... Listen, GRSecurity, the kernel is NOT YOURS, consider yourself lucky to be able to make some money on the back of it!
Never heard of it
[Looks up from terminal, reads title, thinking the same (maybe Blizzard Entertainment game, or somethin', so leaked source code, cool!), reads tarticle ... ohh, television program, looks back at terminal, thinks "where was I?" ... Ok, ...]
IOW, Thanks el reg, but no thanks ...
Watt ?
Feynman, statistics can be turned anyway you want ... BUT, the press is claiming TOR is mainly used by crims, that is what the fellow tried to address ... it clearly is not. He probably went too far in the other direction, negating, he scores a few points, though. The press need to get their act together ... which, for those old enough to remember the hacker/cracker mixup is akin to wishful thinking ... besides, "criminal TOR" sells more than "paranoiac TOR"!
Dingledine quoted [intentionally released] top-secret Five Eyes documents that were backhandedly complimentary about the service. Tor was “the king of high security low latency internet anonymity,” GCHQ said. “There are no other contenders for the throne.”
Wanted to use the black hawk icon, for once ...
Reads like arguments about the best colour, the best piece of music or book ... I think it is all a matter of taste ... nice to read about all the different local variations in the comment section, looks like there is not even a clear definition for a full English breakfast ...
Reminds me of the last time I was arguing about tea time, dinner, and/or supper, you know, times at which the meals are taken, what kinds of food you eat at each ... and those three meals turned out to be very different, depending on where in England you are from, and people try to impose what they were taught on others, you know, "real" tea time is taken at 4 o'clock, with cake, muffins, or scones and, of course, a cupa ... when others claimed they would have a two course meal for tea ...
The fact that this has been around for as long as it has been in open source, I think, is just one more case that should debunk the theory that open source programming is in some way more secure than closed source programming.
adding that some affected code may never be fixed because the vendors no longer exist.
Who has enough brainpower to understand that the second quote COMPLETELY NEGATES the first ? If it is open source, a window cleaner can patch it, provided he knows where to download the diff, apply diff, recompile. There will be Microsoft Cleaner and Surface Expert-proof howto's on the web minutes after the patch has been released.
If it is closed source and the vendor is dead, you will have to invest in another solution.
I have relocated to another country for work. What you do, is, YOU MAKE 100% SURE YOU CAN SECURE A PLACE TO STAY, even a one room flat, if you cannot, DON'T GO, simple!
I have lived in 4 countries, I know that shit ...managed to move to France, keeping a good job in another country ... ok, I did not get relocation allowance, but that time, I chose ... and prepared.
One moment, he has a disease which needs regular treatment and HE relocates to a place where he will have to be in a hostel for a few months ... anybody in ? He is the twat in this story, if he cannot secure his treatment, then, when he get sick DUE TO NOT GETTING HIS TREATMENT, how is that Oracle's fault ?
Don't get me wrong, I hate the guts of Oracle, but this is unfair.
Now, seriously, I think it is f'd up that not everybody can get treatment in a civilized country (where you have healthcare), even without address ... but then, again, all the patriots, Christians, nationalists, conservatives , think I am a commy ...
.10% per 6 months ???????
I order you a pizza if you manage to get $10 back from them!
Madoff was 15% per YEAR
Yours has to be high risk ... could you tell me, is the business located in Israel, by any chance ? If so ... unlucky ... and don't trust branches, they might have a branch in the UK, but that is NOT where the funds go ... they go to the head office!
I am sorry, I really hope you will get your money back, but at best, this is a ponzi scheme, at worst .... get your funds out of there NOW!!!!!
>Only Catholic Priests are allowed to mix sex and religion.
>I'm going to hell.
Why only Catholic ? I heard of enough cases of Anglican priests having the same problems ... d*b's are everywhere, I'm sure there are cases of imams and buddhist clerics as well, evil is a human nature, you get evil humans anywhere, of every gender, every belief, every ethnic group ... does not mean ALL humans are evil, no more than it means all humans of one of the named groups are ...
Feynman, where has humanity heading ?
Yes, I have trouble respecting religions because they do so much wrong, it does hurt my feelings to shut up, but I do shut up, because I am wiser then them poor gullible walking meat balls.
>"it's over 50 per cent cheaper than the cost of current fixed wireless technology like 4G."
Then it is not cheap enough, because 4G brings in money, lots of it ... and is used not only by the locals, but also by the passerbys ... Feynman, I think Slurp have reached yet another level, how far cam they fall ?
glibc
maintainer after 30 years
Call me a conspiracy theorist
Well, that would be one way of putting it, another would be more constructive: I think you need to learn about server-client paradigm, how this app is a client and wannacry attacks servers.
Conspiracy theorists usually have no clue on the subject in question and love to make wild guesses that often sound like LSD-induced thoughts ...
You need to keep SMBv1 enabled on your server.
Actually, most home servers are in fact ADSL routers with USB/eSATA ports running Linux, so they are immune to wannacry AND acessible from this app ... I am not saying it is good practice to use SMB, though.
Last year, Redmond's Ned Pyle put it simply: Stop using SMBv1.
Last year, Redmond's Ned Pyle put it simply: Stop using SMB!
There, Ned, FTFY!
Very sucky that none of this seems to work easily on IIS. After all, 49% of websites now run it.
More like 8% as I am counting ACTIVE SITES ....
Source: https://news.netcraft.com/archives/2017/06/27/june-2017-web-server-survey.html
Grabs coat with the FreeBSD Corporate Networker's Guide in the pocket
4) Fail unit, log error, continue, fail anything that requires the failed unit <-------- there, that should be the behavior, makes sense ?
Note that systemd waits 90 seconds then refuses to boot if you have an entry in fstab pointing at a drive that does not exist! Obviously, this should ONLY be the case if / (root) cannot be found <---- that has been the behavior on UNIX since .... I dunno, some time in the 70's .... and Linux since fstab was introduced....
>For the same reason, a unit with User=nonexistinguser should fail instead of silently running as root.
That's exactly what happens, and what I wrote above: if the username is valid but the user doesn't exist we'll let the unit fail on start. If the username is already invalid syntax-wise we'll log about it but proceed.
Hence, if you write:
User=000fooo...@!
Then we'll ignore the assignment altogether (but log about it), since it's syntactically invalid. But if you specify:
User=waldo
and the user "waldo" does not exist (though it is syntactically valid), then we'll accept the setting, but as soon as you actually try to start the unit it will fail with "user not found". (Poettering, in the thread lnked-to in the article)
So,
user does not exist -> fail,
invalid username (according to systemd) -> use root
I think this says it all ....
The thing is, you can specify a regex for valid usernames ... I am not sure which other Linux software fails with a username starting with an integer, but it is possible to configure a system to accept them and create some ...
The other thing is, it is inconsistent, a unit will fail if it depends on an invalid service name, afaik.
Poettering knows he is wrong and he hates being wrong, if you try and explain the flaws in his logic he will pull the "this is not a philosophical debate" as he has so many times ... he ignores all software principles, such as principle of least surprise, because he and Kay are above all that, however, they keep forgetting that arrogance has to be earned ...
Sales are up $11 and they dish it ? What is wrong ? They only released the Joule in late 2016, afaik ...
The Joule looked quite good, at first glance, except, of course, if it was cursed by the same fault that killed other Intel Atoms ...
My thoughts go to the poor sods, once again, victims of board decisions!
I once worked at a German electronics store, and one customer had an open debt of 1 Pfennig (roughly half a cent). We sent out a letter (costing 70 Pfennig) to send the demand note.
And the customer waited for the third reminder to be received before he paid that Pfennig back, right ?
It is always easy to smash, in theory, anybody can do better, the thing is, go do better, Mr. article author, love to see you perform better.
Why no Windows ? Cost is not a concern, if I understand this correctly ... why no Windows ? oh, shit, I should know this, Windows cannot scale above a core ... or was it a thread ?
Hello ? Nobody trusts Microsoft around here, last time I checked, that is ... I have been crying out loud on here since around 2003 never to trust MS, with Windows 10, now, everybody has seen the light.
Sincerely,
Hans 1
Microsoft MHP
Adobe MHP
Accenture MHP
Currently supply of Rare Earth Elements is outstripping demand. This will carry on for about another 10 years then as demand overtakes supply the cost will start to rise and there will be an incentive for mining companies to locate new sources of supply.
Go talk to fisherman at Cape Cod ... look at the mines in Africa, the guyz in the pits are treated like slaves.
Where does the ewaste go ?
http://www.greenpeace.org/international/en/news/features/e-waste-toxic-not-in-our-backyard210208/
Most of it gets sold as second hand electronics (in working condition) to Senegal, where they burn the stuff to get the metals ...
http://www.reuters.com/article/us-senegal-environment-landrights-idUSKBN13I1KV
You have to be pretty f'ed up not to realize this is bad, right ? You do not pay the real price for your devices, the third world pays the rest with their health ...
Call me commy, freetard, tree hugger ... I don't care, this is not right.
I can hear the teeth crunch of the many slurp shills on this site who must be calling their devs NOW, on a Saturday, asking them how I could be possibly doing it ... I'm loving it :D ... Remember, I only use PUBLISHED API's, douche bags!
Yours sincerely,
Hans 1
Microsoft MHP
Adobe MHP
Accenture MHP
If test s/w is running on XP I don't see what the fuss is about.
Windows 10 is Swiss Cheese
Windows 8.1 is Swiss Cheese
Windows 8 is Swiss Cheese
Windows 7 is Swiss Cheese
Windows Vista is Swiss Cheese
Windows XP is Swiss Cheese
Windows 2k is Swiss Cheese
Windows NT4 is Swiss Cheese
Windows 2016 (all versions) is Swiss Cheese
Windows 2012 R2 (all versions) is Swiss Cheese
Windows 2008 R2 is Swiss Cheese
Windows 2008 is Swiss Cheese
Windows 2003 is Swiss Cheese
Anythings after, between, and before is Swiss Cheese.
Get the picture or need some more ? I could have written Windows is Swiss Cheese, but then you would have stupidly asked "Which version, Windows 95 ?" ....
As I have already written multiple times, I can easily impersonate anybody who is currently logged on to any of those systems, enterprise-wide, with local admin rights ... which I can easily gain with a malformed PDF, Word, Font, flash file ... you name it ... any system a currently logged on user has access to, I can log on to, gain local admin rights and spread ... it is dead easy. This problem is due to the fact MS think because they have proprietary software, hidden API's, they think that user x who has local admin rights on system y has these rights limited to system y, which is not the case, again, I only use standard API's ... If I can convince a domain admin to log on to my system, to troubleshoot an issue I would have created, I own the domain ... any computer in the domain, that has a session open as a user from another domain admin (from another domain) in the forest, I can become domain admin in that domain ... and so forth, here, no exploit needed ... Now, try that on a Linux box in a domain .... won't happen ... ;-)
A zero day, or a gullible domain admin and I own your enterprise. Thing is, MS do not know how I do it, it is dead simple, scriptable, no "exploit needed for the spread" ... I use published API's ... they are dumb enough to publish them ... and have not yet figured out how I do it ... been doing it since Windows 2003 ... and it works from 2k onwards ..., never tested NT4 ... it still works in 2016, i tested it ... ;-)
I have seen fewer BSOD's on NT4 and 2k combined than on XP, the first NT4 system I saw was in 1998. Had been using 2k until 2006 as secondary Windows Desktop (primary was Linux, of course).
XP would bluesheen when I looked at it weird ... I dunno, it is the PlaySchool user interface that reminded you of PlayDoh or Duplo ? Is that your thing ? I dunno ... compared 2k, any sane person would say that 2k, with the memory requirements was just better ... HELLO, you have two OS', the only difference being USB2 and a fsck'ing FisherPrice ui with 4 times the memory requirements to display a ui in Primary fsck'ing Colors, you are insane ... and you could hack the XP USB2 driver to run on 2k ...