Re: Good but...
Of course it is, but it serves two main purposes:
1. Joe Public feels reassured that the authorities are cracking down on this sort of activity.
2. It sends a signal to the ne'er-do-wells that the authorities will find you.
237 publicly visible posts • joined 17 Feb 2010
I've only had a quick look for long-life certificates, but one of GlobalSign's root certificates expires on...
Tue, 19 Jan 2038 03:14:07 GMT
Spooky!
Surely this FCC will be Plaid? (what are we going to call it once it's built? It won't be the Future Collider...)
Seriously though, it often strikes me that we haven't 'discovered' Dark Matter because we don't actually know what we're looking for or how to detect it despite some of the best boffins on the planet using all their collective brain cells to try.
I don't disagree that there were 'better' programming languages by 1981, but the beauty of BASIC was that it appeared to the layman that you could write programs in plain English and they would (mostly) just work. Although admittedly 'Syntax error at line 30' isn't the most informative of error messages!
I'm pretty sure there were other language ROMs you could plug in to your Beeb if you wanted C, Pascal, Forth etc, but I don't think they were aimed at 'beginner' programmers.
Wireless was refusing to work on my laptop the other day. A quick dive into Device Manager, disable then re-enable the wireless adapter worked for me.
Checking Windows Update, I do have both '228 and '375 installed.
Wireless is normally pretty faultless, but it could have been a coincidence...
My son's sleep pattern started to deteriorate during 2020, when he was about 14. After several false starts with medical professionals, he was finally diagnosed with delayed phase sleep wake disorder. He usually goes to bed at ~11pm, but is never asleep before 3am*. We have to wake him at 12.30 to try and keep some routine in his life otherwise his sleep could end up all over the place.
One of the treatments suggested by a sleep doctor actually made his sleep patterns worse.
There is a risk that he could fall into a 'Non-24 hour' sleep cycle, there is also a slim chance he will grow out of it.
He's also been diagnosed with ADHD, but it's not clear if the two are related.
* Yes, we've done all the screens off, no blue light etc. His bedroom is as dark as we can make it. He just lies there in bed and can't sleep.
Open source hardware would be good.
Would that be the hardware that a certain company dissed using riscv-basics.com?
V.
Going OT for a bit...
It's a bit like certain drivers not using their indicators (blinkers). I think they assume that you are telepathic and automatically know which way they want to go. They think they don't need to use their indicators because they already know where they're going...
That reminds me of the BBC network we had at our school. It wasn't Econet, but very similar.
A friend of mine (yes, really, it wasn't me) reverse engineered the sideways ROM for the network and it turned out that user authentication happened on the client - it looked up a four character (!) password in a special file on the server based on your user number. Cue various students using teacher logins and kicking other users off their machines remotely...
V.
As a right-pondian I worry about the US-ification of almost everything. Having been a regular visitor to ElReg since 199x, I am disappointed. My tutting shall become slightly louder, lest I disturb anyone from their Times crossword...
'I realised that this also means El Reg is now likely to visit the horrors of "thru" and "pants" on me, and even worse - may well start using Americanisms that are either unknown to me, or which have referents unknown to me, or which have the opposite meaning to that which I'd expect.'
I expect there are some who could care less...
The one with the Kentish hops, please -->
I think that was Happy Eater.
There has to be a trade off between ease of use, convenience and security.
Air-gapped data is secure, but convenient? No.
Time-based 2FA (e.g. Google Authenticator) is probably one of the best compromises, but can be MITM-ed.
SMS-based 2FA can also be MITM-ed.
A hardware (U2F/FIDO) key is probably the most secure, but less convenient to use. And it can be lost...
I think the best option is continuously educating the user, but that is often seen more as a cost than a benefit to the company.
You, sir, are a genius!
That will use up all those pesky carbon atoms so they don't combine with two (or occasionally just one) oxygen atoms and venting into the atmosphere.
Just one teeny tiny problem. What do we then do with this CH4 to release the stored energy?
(spoilt for choice on the icon with this one -->)
I'm not sure a Google Authenticator style 2FA would have stopped them. According to the article the login credentials are sent instantly from the fake login page via Telegram. Assuming the fake login page also then asks for the 2FA code, the man in the middle has a (max 30 second) window of opportunity to capture and use that 2FA code to login.
I've noticed they are very fussy with SPF records. I've had various issued, including someone complain that I don't reply to their emails (because their SPF record is slightly wrong). I never even get the emails (not even in the Spam folder). They (and I) use Google Workspace...
I loved the file save method in RISC OS - you just dragged the save file icon to the folder (directory) you wanted it in. Even now, there are many Windows apps where the file save dialog doesn't seem to remember what folder you were using last, and you have to click through multiple levels to get to the folder you want.