* Posts by big_D

6775 publicly visible posts • joined 27 Nov 2009

They grow up so fast: Spam magnet Hotmail turned 22 today

big_D Silver badge

Re: Spam, Spam, Spam, Spam...

Mid 2000s spam was a problem, but they seem to have it sorted now.

I opened my account before Microsoft bought HoTMail. It has gone through phases of bad spam. But in the last few years, I have used it as my main private account (still the original account) and I guess less than 1 spam a month gets through at the moment.

But thereagain, I use GMail as a dumping ground for site registrations and other guff that could easily spam up my mail account, to keep my main account spam free.

Thunderbird gets its EFAIL patch

big_D Silver badge

Re: On SettingContent-ms files...

There was no mention of Office in the article... :-S But, generally, it is probably more secure, because it does less (KISS).

The problem you mention is the execution of control panel shortcuts within Thunderbird on Windows. The problem, among other things, is the <DEEPLINK> tag. If a manipulated attachment on an email in Thunderbird is opened, it can execute the embedded patch to an executable.

This is a problem with the .SettingContent-ms specification and will affect any application that allows these settings files to be executed. They are designed to be used locally, to open direct control panel elements, it seems it wasn't envisioned that they would be manipulated and sent per e-mail or downloaded from malicious websites. The same old story, a useful tool, where the developers didn't think far enough, when it comes to security.

This is a Windows 10 problem, bu it affects any application that allows the files to be opened or executed.

big_D Silver badge

Re: Good to see it's still in development

At my last employer, an open source security company, they used that and Claws.

It is starting to feel a bit dated and needs a little more love, but it is still a solid program.

Xen 4.11 is over a month late and its devs are mostly cool with that

big_D Silver badge

Good to see...

that they are taking the security and quality seriously.

I'd rather wait a few days or weeks for a secure, stable product than have something rushed out to meet some marketing deadline.

Microsoft and Apple often get caught up in this, if they release a buggy pile, they get grilled in the press, if they delay to deal with last minute problems, they get grilled in the press...

As a user, yes, I want to see / try the latest and greatest releases, but on the other hand, I have to work with it, so it has to be secure and stable. So I'm very happy if a company or project delays a release / launch a few days or weeks to "get it right".

Of course, even then, we are talking about software, so it isn't going to be 100% bug free, ever... But taking a bit of extra time to iron out the most obvious problems is time well spent.

Apple is Mac-ing on enterprise: Plans strategic B2B alliance with HPE

big_D Silver badge

Re: They create the kind of wonder...

Due to the price of subsidies, we get the choice of a Hauwei P20 or an iPhose SE or iPhone 6. If I wanted a current iPhone 8 or X, I'd have to pay at least 450€ out of my own pocket for a "company" phone... (Samsung Galaxy S9 is only 250€ of my own money). For something that sits on my desk all day, gets put in my bag at night and get put back on my desk when I get back to work, it isn't something I want to invest my own money in...

Google Chrome update to label HTTP-only sites insecure within WEEKS

big_D Silver badge

Re: It isnt the encryption that is the problem

@itzman the virtual hosts all use the same IP-address and the cert is for the domain name. This has been possible for over a decade - heck, I was doing this in my test environment running under WAMP and LAMP back at the beginning of the decade.

big_D Silver badge

Re: It's not "browsing" anymore..

@zapgadget I've never known Firefox or Chrome refuse to connect. They'll throw up a warning any you'll need to add an exception, but they will normally then let you through...

I've set up hundreds of https devices on internal networks over the years (2 QNAPs and a couple of printers just yesterday) and I've never had problems with self-signed certs.

big_D Silver badge

Re: It's not "browsing" anymore..

Yes, you can use https on any address and most corporate devices these days use https.

If your business is big enough, you will have your own trusted issuing authority set up, so you can issue certs for your internal devices, that your corporate devices will accept as valid.

But you need to put work into it, so only larger businesses with dedicated IT staff will bother.

big_D Silver badge

Most CMS systems, like WordPress, now have automated scripts for putting in certs from letsencrypt, for example. This makes it relatively easy to update.

Smash-hit game Fortnite is dangerous... for cheaters: Tools found laced with malware

big_D Silver badge

Amiga

I can't remember the game, it was an R-Type clone of some description, but the cheat code was to type in the "couple of keystrokes" of "xr3iturbonutterbastard" after you had typed that in, you had infinite lives and I think all power-ups.

When Google's robots give your business the death sentence – who you gonna call?

big_D Silver badge

Don't talk to us...

Google's attitude is, don't talk to us.

My previous employer was on the receiving end of a DOS attack last year. We did a quick check of the IP address initiating the attack (it was pushing >100mbps down a 10mbps line). The IP address belonged to Google.

Call Google... After 10 minutes of bouncing back and forth in their automated telephone system, the answer is: look at the relevant page on our website; only I couldn't find a page about Google hosting DOS attacks.

I then tried email, abuse@google.com and admin and webmaster... All returned a form-email saying that they get so many emails, they just don't bother reading them and I should refer to the relevant part of the website for support... Again, no part of the website covers being DOSed by Google.

I then tried Twitter, but no response form Google there, either.

In the meantime, I had contacted our ISP and they managed to put in a perimeter block on the IP address causing the attack (this is how I know that they were pumping over 100mbps at out 10mbps line). But that only ran for 7 days, after that, we had to pay for continued use of their IP blocking service.

Luckily, we were in the middle of switching to a new 100mbps line with another ISP, so we just accelerated the tests and switched over, leaving the Google server to continue to wallop a disconnected line.

It was probably a badly configured server in the Google farm or one of their cloud clients with a badly configured instance... Whatever it was, contacting Google was a nightmare.

Sysadmin shut down server, it went ‘Clunk!’ but the app kept running

big_D Silver badge

DEC Engineer

No, not me...

We had a series of VAX 11/7xx machines in a row in the computer room, about a dozen of them.

DEC sent an engineer out to do some maintenance and upgrade the memory on one machine. We duly moved all jobs and users to the next machine in line, shut the machine down and told the engineer he could power down the machine.

He disappeared behind the CPU cabinet and... Nothing. He reappeared, the VAX was still in Shutdown mode. His face went a bit pale and, suddenly, there were screams and shouts from the next machine in the row. You know, the one we had shoved all the users and jobs onto from the one we had shut down.

He'd managed to mix up the circuit breaker for the machine he wanted to turn off and the one next to it.

Ready, get Sets... no? App-grouping whizzery for Windows 10 killed

big_D Silver badge

Re: Why tabs?

@Loyal Commenter but that would be a case, for me, for having them in a "launch" set, but not tabbed, I'd have them open in separate windows spread across my main monitor at home (34" ultra wide) or spread over the three Full HD monitors at work, I wouldn't want them grouped in a tab, because if that is the case, I can only see one piece of information at a time, I can't compare the content of different windows or look at the contents of one windows (E.g. report) whilst working on another windows (E.g. Report Generator) to correct the output and a third window with the data sources in it.

big_D Silver badge

Re: Why tabs?

@Geoff Campbell but then is the point where I don't want them in tabs, I want to read one window whilst working on another...

big_D Silver badge

Re: Why tabs?

Theoretically, you can "group together" a bunch of related applications or application "windows" in one window. They act just like tabs in a browser, so you can switch between Word, Excel, browser, Notepad etc. Why you would want to do that is anybody's guess.

big_D Silver badge

No news here...

At their developer conference last month, they announced that it would be unlikely to make it into Redstone 5.

So it is hardly a surprise that it is disappearing from Redstone 5 builds.

That isn't to say it is totally dead, Microsoft said they would deliver features when they are ready... That said, I saw sets on the last build and it is useless to me, I couldn't see any plausible reason to "tab" together different applications.

Registry to ban Cyrillic .eu addresses even if you've paid for them

big_D Silver badge

Re: "Does anyone..."

@Mike Shepherd I think you should read the OP again, or even the bit you quoted. His point was, if you type in the first part of the address in Cyrillic, Arabic, Hebrew, Urdu or whatever, why would you switch to Latin for the suffix (or would that be prefix)?

big_D Silver badge

I would say, that the Cyrillic name on the Cyrillic version of .eu and the Latin version of the Cyrillic name under the .eu domain.

As to the European ä â°a etc. being in the "Latin" .eu domain, that only makes sense, those letters are additions to the English Latin alphabet and they still use e and u, therefore it would be .eu anyway. Greek is harder to defend.

If there is a Cyrillic version of the .eu domain structure, it make sense to push the Cyrillic names there.

For me, it looks like a logical move. At first glance, the only people who should be really upset are scammers using a mix of Cyrillic and Latin to dupe people into visiting "fake" sites.

SD cards add PCIe and NVMe, hit 985 MB/sec and 128TB

big_D Silver badge

Re: 128TiB in an SD card?

Your array will probably get hot very quickly and the cards will start to throttle performance.

Speed causing heat problems in big, fat SSDs and m.2 cards, squish that down onto an SD card (or a micro-SD) and you are going to run into heat disipation problems very quickly, if you are using it as a traditional drive.

Potato, potato. Toma6to, I'm going to kill you... How a typo can turn an AI translator against us

big_D Silver badge

Re: Rubbish in, rubbish out...

Agreed. I worked for a short time in a translation buro. My translations were readable, made sense, grammatically okay, but were a long way from what the trained translators were producing.

And what I was producing was a thousand times better than what Google Translate was dishing up. As you say, it is a long way from being production ready. In most cases, at least with German, you could take about 15% of what it produced as usable text, the rest would need to be re-written from scratch.

big_D Silver badge

Re: Rubbish in, rubbish out...

When I hear Dutch people talking, it always sounds like every other word is either English or German. I can usually understand what they are saying, but I can't speak Dutch.

big_D Silver badge

Re: Rubbish in, rubbish out...

Also, I always hear people praising Google Translate, MS Translate and various other tools and services, but they are all doing English <-> Spanish or English <-> French, with a bit of Chinese thrown in for luck.

All of them make a horrible pig's ear of English <-> German.

big_D Silver badge

Re: Hmmm

Google doesn't even need spelling mistakes, or it didn't used to.

English -> German is very dodgy with Google.

(NOTE: The following example now works, because I uploaded the correct translations a couple of years back)

I had to do a quick translation of a handbook I'd written in English into German. I thought I could save a little time and use Google Translate to get the rough text translated and just tidy it up...

The problem is, Google Translate has real problems with formal English. Abbreviated English is fine, but formal caused it to ignore the negatives:

"Do not open the case, high voltage inside" -> "Das Gehäuse öffnen, Starkstrom drinnen"

"Don't open the case, high voltage inside" -> "Das Gehäuse nicht öffnen, Startstrom drinnen"

Or even funnier:

"Do not open the case, no user serviceable parts inside" -> Das Gehäuse öffnen, nicht drinnen"

(Open the case, nothing inside)

There was nothing with the spelling mistakes, just it would ignore certain words, like "not", although why "no user serviceable parts inside" translates to "nothing inside" is anyone's guess.

FireEye hacked off at claim it hacked Chinese military's hackers

big_D Silver badge
Big Brother

Re: and what if they had done it?

It would be illegal to hack-back, so the Mandiant staff could also face charges.

That said, if that is the only video Sanger was shown, how could he describe that they were reading sporting scores and chatting to girlfriends, before starting work and describing what they were wearing? :-S

Chrome sends old Macs on permanent Safari: Browser bricks itself

big_D Silver badge

Re: One in twenty users?

@doubelayer except for those one machines that are no longer compatible with new versions. Mine is on Lion, because that is the last version that it can run, it can't run anything newer... The hardware is still fine, it is just very insecure under OS X. Under Windows 7, it still gets monthly security updates.

big_D Silver badge

Re: One in twenty users?

Mine is still on Lion, as that is the last version that supports the hardware... But it spends most of its time in Windows these days, as Windows still gets support.

On Kaspersky’s 'transparency tour' the truth was clear as mud

big_D Silver badge

Re: " … it won’t be long before Kaspersky is recognised as an Uber-style disruptor …"

I don't think Kaspersky want to be tainted with that brush, they have enough problems as it is!

big_D Silver badge

Re: Well the big difference is...

@Christian the German Government won't protect you from themselves! :-D

The courts have twice told them that the Bundestrojaner is illegal... But they are trying to push through yet another law to allow them to use such technology (I believe Bayern / Bavaria has already "legalised" it, although there is still the opportunity to bring that before the Constitutional Court AFAIK).

big_D Silver badge

Re: But...

They got into trouble in Germany as well, because they marked the "Bundestrojaner" (State Trojan, a program used by the BND and police to infiltrate PCs of suspects) as malware, which didn't go down well in political circles.

So you're doing an IoT project. Cute. Let's start with the basics: Security

big_D Silver badge

Re: The biggest problem

@JohnFen as I said, after 2 years, it becomes a plain dumb TV... So why bother buying it "smart" in the firsrt place?

I'd stick to buying dumb and adding cheap intelligent boxes where necessary.

big_D Silver badge

The biggest problem

Is that we are moving from a solid product world, where non-intelligent devices last decades, to an IoT world, where you may get 6 months support, if you are lucky.

In industry, you are working on 10 to 20 year amortization timescales. Very little in the way of IoT is going to get support on that timescale.

The same for consumer products, a fridge or TV is something you buy in decade timescales, yet you are lucky if you get security updates for your TV after 2 years... So, after 2 years, it either becomes a dumb-TV or a security risk.

Amazon, eBay and pals agree to Europe's other GDPR: Generally Dangerous Products Removed from websites

big_D Silver badge

Re: Well

See, there is always a silver lining.

big_D Silver badge

Re: Define Dangerous Please

There are plenty of regulations out there that define what dangerous is.

The certification for sale of most types of good (food, electrical, clothing, children's toys etc.) ensure that the products have been legally declared safe (CE mark, for example).

But a lot of clothing and toys still get through that are either toxic or downright dangerous (kids' cuddly toys that have stiff wires in them that can poke through and cause injury or the use of lead base paints, for example).

big_D Silver badge

Re: Dangerous?

Things like the helmets would not be legal for sale on the sites, because they don't carry the EU certification. This has always been a problem, long before Internet sales. The same helmet is available with or without the ECU mark. The one with is legal in Europe, the one without is a grey import and is illegal, because it doesn't contain the right certification. The problem is, the average copper on the street can't tell the difference between a certified Shoei or Arai and a fake, so he has to go by the certification mark (even if it is faked), so a US DOT approved one is illegal...

Anything electrical without a CE certification, for example. Products for children that have been tested and proven to contain toxic substances or metal spikes (last year in Germany several cuddly toys were removed from sale because they were either toxic, poorly manufactured (heads came off and babies could ingest the foam) or were stiffened with metal wires that could cause injury).

Clothing or upholstery that isn't fire retardent (and tested) to EU standards would be another area.

IoT dolls have also been removed, because they break EU privacy laws (know security weaknesses that allow hackers to listen in on the kids or speak directly to them). A kids watch was also removed out of privacy grounds, because parents could listen in on the kids when they were at school, this broke the pirvacy of other children and of the teachers. The parent would need to get the written permission of everybody the kid came in contact with, before they could evesdrop on the kid.

Qualcomm still serious about Windows 10 on Arm: Engineers work on '12W' Snapdragon 1000

big_D Silver badge

Re: If ARM is so good

Exactly Richard,

the HP x2 that was released earlier this year came with 4GB RAM and 8GB RAM and a Snapdragon 835, hardly 800Mhz and 1GB RAM...

That said, the problem is still going to be legacy applications. Store apps can be compiled in ARM 32-bit and ARM 64-bit, which means they should run reasonably well. But legacy code is restricted to x86 32-bit code - MS and Qualcomm have announced that they have no plans at the current time to run x64 code under emulation.

The reports I've seen so far have said that Store apps are a mixed bag, but x86 legacy code emulation makes an Intel Atom look like a speed demon...

That means it is technically possible to run x86 code, but you wouldn't want to use it for anything you have to interact with or need quick answers from. Which in end effect means that if you can survive on Store apps that have been cross-compiled to ARM, you will have a reasonable experience, but if you rely on non-Store apps or the Store apps you need aren't ARMed, you will be better off looking at an Intel machine for the foreseeable future.

big_D Silver badge

Re: If ARM is so good

Longer battery life? I spent 2 days working offsite and didn't need to recharge my Lenovo L480. When I was finished with 2 working days, there was still around 20% battery life.

Given that I could have charged the laptop in the office or in the hotel (it was new and I wanted to see how long the battery would last), I doubt many people really need 20+ hour battery life on a daily basis or go on trips that mean they are so long without access to a power socket - and if they are, then it will probably mean that they need power for a lot longer than an ARM laptop would provide.

I'm guessing that most users are either no longer than 2 days without power or they are weeks or months without power. I would think that there are relatively few use cases that fall between the two scenarios.

India tells its banks to get Windows XP off ATMs – in 2019!

big_D Silver badge

Re: No reason..

And XP Embedded had a longer service history, SP3 ran out in 2016 and the 2009 update packet runs out of support in January 2019...

Without knowning exactly which version of Windows XP they are using, it is hard to tell how severe the problem is. That said, they should already have moved or be in the middle of moving to a more modern platform.

big_D Silver badge

Re: Have a cup of WINE

ATMs generally use a very locked down version of Windows Emedded.

There are equivalent Embedded Linuxes, but they don't generally support WINE, as they are as pared back as possible to reduce their exposure. So you would need to add the packages manually and maintain them manually.

big_D Silver badge
Paris Hilton

Re: It might not be a big deal

We are talking about banks here, they have such a wonderful history on their security, so of course it is all locked down... :-D

big_D Silver badge

Re: Question?

Support for the last release of XP Embedded runs out in January 2019.

AFAIK, most ATMs use the Embedded version of XP, which, if it is using the 2009 service update is supported through January 2019. If it is using XP Embedded SP3, it was supported until January 2016 and Point of Sale version to April 2016.

Still not good, I just wanted to clarify.

Cops: Autonomous Uber driver may have been streaming The Voice before death crash

big_D Silver badge

Yes and no. At the end of the day, the systems are still being tested, so the safety driver should be able to take over if they note the car isn't reacting properly (i.e. hasn't seen an obstacle). If you are just waiting for the vehicle to says it hasn't seen something, you'll be waiting until after the thump, as seen here.

Also, if the vehicle says it can't cope, you need to already be aware of what is going on around you. You can't be distracted, concentrating on something else and expect to react in an emergency.

The driver was paid to do one job and she was loafing off when it counted...

I agree with you about Uber having turned off the on-board safety systems, but she was the driver, so it was still her responbility to react if the car obviously wasn't.

Pwned with '4 lines of code': Researchers warn SCADA systems are still hopelessly insecure

big_D Silver badge

Re: Company selling security consultancy find security flaws shocker

I think we have to be careful in separating things like cars and CNC machines, from critical infrastructure. while someone hacking a car is annoying, someone hacking say the electricity grid is far more serious.

So, hacking a car and causing it to swerve off the road (Fiat/Jeep by Charlie Miller 2015) or change the engine management, disable braking/ABS or disable the motor whilst the vehicle is in motion is only annoying? :-O

big_D Silver badge

Re: SCADA systems running windows

I don't even want to think what 80-year-old SCADA code might look like.

Where I live is famous for its red cloth. The local museum has several working looms, including an original Jaquard Loom, which they run off several metres of cloth every year during guided tours of the place. Very interesting.

big_D Silver badge

Re: Company selling security consultancy find security flaws shocker

My experience so far is that security is still often an afterthought. The other problem is, a lot of the IoT stuff is tacked onto existing hardware, which has often been in the production for over a decade, so it is irrelevant, whether the next generation hardware has some security baked in, the majority of industrial systems are unprotected by design.

I agree, however, that the wording from Godfrey is a little misleading, there is certainly some work going on in this area, but you only have to look at the **** that is coming out today in cars, for example, where they are online, but the CANBUS is still pretty much unprotected! Industrial PLCs aren't much better, in my experience.

But their attack requires local access. Physical security is as important as cyber security in these situations. If you can just walk in and install a box on a critical infrastructure, cyber security is the least of your woirries

We don't know what their remit was. And getting through the firewall and hacking a PC on the network isn't that hard, but might have been outside the remit for the case in question, which would have made it illegal try such a scenario.

It is also not a "local" attack, which means on the device(s) in question, it was an attack within the network, so internal but not local.

And the industrial networks tend to be very fragile. I worked for a company producing vulnderability scanners and they had extra documentation and modes for scanning SCADA and PLC networks, so that you don't bring them crashing down during an initial scan. Their systems started in a "light touch" mode and gradually worked up. It was also recommended that the customer make a replica of their production environment to test on, before scanning the real thing.

big_D Silver badge
Facepalm

Re: Bonsai Penguins aren't all they're cracked up to be...

@AC I've also seen companies rolling out new servers (2015/2016) with the software still running under "SUSE 7.0" from the turn of the century, because they had some libraries that "just worked" an no upgrade path, so they carried on with SUSE 7.0 on new production hardware for their customers, until the software stopped working with newer generations of hardware, where the old RAID controllers were no longer available and the drivers wouldn't work with current generation controllers... Then they had to invest in re-engineering the libraries.

But the attitude was "it's Linux, it is secure, it doesn't need patching."

Apple takes $9m kick down under after bricking iPhones

big_D Silver badge

@SuccessCase in that case, if they can't guarantee the authenticity of the fingerprint reader, you deactivate the reader, you don't brick the whole device.

Cardiff chap chucks challenge at chops*-checking cops

big_D Silver badge

Re: Good Luck

The German states are currently implementing their own version of pre-crime.

They are granting the police the right to listen in on conversations (including implanting a trojan on suspects devices to intercept communications, before they are encrypted) of people who "might" be thinking of committing a crime. They can also imprison suspects for up to 70 days without charge.

Bavaria has implemented it, Lower Saxony is planning on it (law will be refined over the summer recess and voted on when they come back from their summer holiday) and Meck Pomm and a few others are thinking of enacting similar powers to their police forces.

Microsoft reveals which Windows bugs it might decide not to fix

big_D Silver badge

Re: Duty of care

And this document explains the rules MS have used since I can remember. You need to then apply that to duty of care.

The process is about using the resources they have to fix the problems that matter in a timely manner. The question is, of course, whether that falls within duty of care. This gives more transparency into the process they use, it doesn't affect the process itself.

And it says that problems that have a high priority will be fixed ASAP and problems that have little or no security risk will be put to one side until there is time to deal with them, or incorporate it into the next release.

big_D Silver badge

Re: Pay more, get less

This has been standard practice for decades.

Back in the old Technet CD days, when there were only 10s of thousands of reported issues, you go to see them and there was a report on whether the issue was being addressed or not.

Some bugs have littlle or no security impact. For example an escalation bug that can only be used when sitting at a machine and using a very complex set of criteria would affect practically nobody, but require, say, a few hundred man hours to fix. That isn't something that they will want to fix, as long as no other method is found to escalate the bug to a higher priority. If somebody has physical access to the machine, they probably don't need the exploit anyway. This would then be looked at, as to whether it will be fixed in a future version, because it isn't urgent and there are better things to spend time on, for example, remote execution and drive-by exploits that are serious and likely to be actively exploited.

If MS had an infinite number of developers and infinite money, they could fix every bug. But with finite resources, you need to use the resources where it matters most.

They are just setting out the parameters they use to determine which problems are important enough to fix immediatly, in the near term, in the long term or never so that researchers can understand how the reporting system works - and whether they are likely to get a bug bounty for their work.

Windows Server 2008 SP2 gets new support model

big_D Silver badge

Re: Rollups suck...

Yes and no... As a user, I love roll-ups. I've been saying for years that Windows should have them. It makes setting up a new PC much easier - one or 2 patches and you're done, not 150 patches, reboot, 120 patches, reboot, 10 patches, reboot, 20 patches, reboot, 40 patches, reboot... Until all the patches for the last 10 years have been installed.

On the other hand, having the option to go roll-up or individual for machines with a delicate software stack would be better.