"will know that Z needs to be included." - If that is the only part missing those would be some of the best specs from a government ever.
Posts by a_yank_lurker
4138 publicly visible posts • joined 16 Nov 2013
Page:
Rhode Island sues HPE for making its DMV even more miserable
Arch Linux: In a world of polish, DIY never felt so good
Arch Derivatives - Manjaro and Antergos
While Arch still uses the CLI to install there are two derivatives that use a graphical installer: Manjaro and Antergos. Of the two Antergos seems a little stabler.
The main point with Arch based distros is that it is a rolling release. New versions will be pushed out relatively quickly. One does need to pay attention, particularly AUR packages, to conflicts which are usually well documented.
Microsoft ends OEM sales of Windows 7 Pro and Windows 8.1
Re: Too little too late.
For the last several years I have only used Slurp with any regularity with work kit. My personal kit is almost completely Slurp free. Only a couple of games that might not run under Wine are the only software that I have not been able to replace with something from the Arch Linux repositories; games I have not played in years and probably will not run on 'bloat 10.
The final blow was when Slurp "graciously" downloaded 4.6 Gigs of 'bloat 10 install files on a 'bloat 8.1 dual boat laptop. That was after a routine 'bloat update screwed the BIOS settings temporarily disabling the dual boot earlier. The 'bloat partition is not allowed on the Internet since then.
Coding will win you the election, narcissistic techies boasted to Hillary
Birds of a feather
Narcissists supporting a narcissist, how revolting.
The problem is not learning a programming language such as Python or Ruby but learning to thinking logically and critically. These are skills that are in short supply. Math heavy fields are difficult partly because they require logical and detailed thinking to do well in them. Once that skill is mastered moving from one 'STEM' field is not very difficult. There are many good IT pros who have science or engineering degrees but they learned to think logically with an attention to detail. Skills that go well in IT.
Boffins coax non-superconductive stuff into dropping the 'non'
Nymaim malware got a major 'upgrade', says Verint
Cheap, lousy tablets are killing the whole market says IDC
Google drops a zero-day on Microsoft: Web giant goes public with bug exploited by hackers
Slurp is having a bad week?
First atom tables and now an active, unrelated exploit of 'bloat. It's been too quiet on the bug front for Slurp recently. Waiting for the next nasty to come out.
As far as Slurp being able to patch a bug, they will screw it up at least a couple times before getting it sort of right.
No nudes, bloated apps, Android sucks and 497 other complaints about Apple to the FTC
Re: @ big_D, et al.
US monopoly rules are usually applied when the total market share is so large the company can control the market. Fruit does not dominate the US mobile market like Slurp dominates the desktop OS market. While Fruit maybe the largest single manufacturer of devices there is plenty of competition from Android devices and Android devices outsell Fruity devices by a wide margin in the US.
These complaints could spur a product recall but that is about as far as it will go.
By comparison Slurp has something like 85 - 90+% of the desktop market depending on whose numbers you believe. Thus, any decision by Slurp could potentially distort the market and harm consumers. This could get an almost bright spark to look to see if they are abusing their monopoly position.
Facebook ads in race claim
Re: standard advertising practices
The issue appears to be whether advertiser decides to using affinities for certain types of ads illegally. Some ad types do make some sense to target more specific demographics such as adult diapers for the incontinent who are typically elderly or baby formula to parents of infants. However, various non-discrimination laws have to be obeyed for some ads such as for housing.
Windows Atom Tables popped by security researchers
Re: Firewalls to block the downloading of executables?
@David Roberts - The short answer - No. Users will need to run new executables from time to time and it is fairly easy to hide executables in other code (Office macros for example). Users and admins will have a hard time with setting up the rules correctly at the local firewall level.
Re: Super cool name!
@Brewster's Angle Grinder - Originally all PCs were standalone, single user devices. Later local networks modified this somewhat but the network was isolated from the world. In both cases, the introduction of malware required physical access and disk to the machine/network. Windows is derived from DOS which was a fairly typical PC OS of the era. None of these OSes were designed for a large scale interactive system or the Internet. Thus, any of the PC OSes are likely to have some nasty attack vectors that could be impossible to properly patch. But since Windows is the only major PC OS still available it is likely to show these types of bugs.
Unix was designed for a large scale network from the beginning and current versions and derivatives have kept this design legacy. This means that the original design made some consideration for isolating users from administrators and limiting user capabilities. The assumption was not necessarily malicious users but incompetent users, if they had proper permissions, could take down the system with very serious consequences.
FBI reopens Hillary spillery
@David 132 - Most commentators and many powerful elephants dispise Blowhard. Thus Trump can not count on a solid Senate if impeached; too many elephants are likely to vote to convict. Many believe the opposite is true of Felon. The donkeys in the Senate would never convict her and many elephants would to be cowardly to vote for conviction no matter how serious the charges.
'Hacker' accused of idiotic plan to defraud bank out of $1.5 million
Researchers expose Mirai vuln that could be used to hack back against botnet
Lenovo downward dogs with Yoga BIOS update supporting Linux installs
NYSE halts trading in Violin Memory shares
So long Vine, your six seconds of internet fame are over
What has 500,000 thumbs and is no longer being sued by HP? Panasonic
Judge orders FBI to reveal whether White House launched 'Tor pedo' torpedo exploits
Re: This just got "interesting"....
There have several infamous pedophila cases in the US were the "evidence" only existed in the minds of the prosecutors, the press, and their lackeys. Many innocent people were convicted in the hysteria. I am wary when prosecutors seem to be looking out for their careers and not justice.
For the record, the only information I have on these cases is from news reports. So I have real idea if the defendants are actually guilty.
Re: This just got "interesting"....
Blackstone was commenting that a respect justice system tries to only convict the guilty and never the innocent. He realized that one faces either a high rate of false negatives (guilty getting off) and a high rate of false positives (innocent being convicted). He said on should opt for a system that produces many more false negatives than false positives. This is implied in the US Bill of Rights. It does not matter what the crime is this should still be true.
Also, while possessing child pornography is a crime one is overlooking that the website is operated by someone. Often these cases go after the low level people because the cases are easier to build and prosecute. One sees a similar pattern with drug cases, users and minor distributors are often busted but the major dealers often are not touched for years.
Re: This just got "interesting"....
The problem in many cases is the feral's use of entrapment techniques and hacking. If they hacked the box who is to say they did not plant some of the evidence. The ferals are known to use some rather sleazy if not criminal tactics to get a conviction.
Relying on someone visiting a site is always problematic because of the reasonable possibility of fat-finger syndrome coupled with erratic-spelling syndrome. Plus, finding something on a computer does not absolute prove who did it only that someone did, see several of the rulings in the various Prenda cases.
Other than a confession, I doubt only a few online child pornography cases are all that solid. IP addresses only point to account owner not a specific user. Evidence on a hard drive only proves someone did visit a site but still who visited is not absolutely provable especially when multiple people have access to the computer. An having access to a computer does not mean you know what is in every file on the system especially in multi-user situation. Sad but I think realistic assessment. Also, remember Blackstone's comment "It is better that ten guilty persons escape than that one innocent suffer". Make sure the person is actually guilty and do not engage in a witch hunt.
LinkedIn, Dropbox hack suspect named as Yevgeniy Nikulin by US prosecutors
Re: Location
It depends on the various extradition treaties and how much effort the Russian government puts in to defend him. If the Russians can force the ferals to show their hand they might show how pathetic a hand the ferals really have to the world.
There is has been a lot of jawboning over here about how every major hack has a Russian or the Russian government behind it. Often the allegations are made off the record with no evidence offered. So I imagine the Russians are looking for a case to embarrass the ferals.
It's nearly 2017 and JPEGs, PDFs, font files can hijack your Apple Mac, iPhone, iPad
Re: Cupertino is ...
With Linux, if vendors follow Apple's route then definitely yes. But if the vendors support multiple distro families (Ubuntu, Debian, Arch, Slack, Red Hat/Fedora, etc) then it will be somewhat more difficult. Also, if the vendors follow the basic Unix practice of splitting user accounts from admin accounts that will limit the possible damage.
Linux should be getting attention because of its server dominance now from the hackers.
Finally, that tech fad's over: Smartwatch sales tank more than 50%
Murder in the Library of Congress
Re: And how does that affect you?
The demand for most copyrighted material is concentrated in relatively short period of time, from a few months to a few years depending the type of work. By about 10 or 15 years there will be virtually no sales. It does not matter how well the sales were at there peak. The lengthy copyrights will only "benefit" a very small number of creators.
Hacktivist crew claims it launched last week's DDoS mega-attack
Re: IoT
" Kettles, Coffee makers, fridges, Smart TVs (Proof of concept announced but not yet published), Media boxes, thermostats, doorbells, Your kid's toys." - Can anyone give me a logical reason why any of these devices ever need web access. I can see some possible value for CCTV/webcam remote monitoring of infrastructure but not for most people.
Every LTE call, text, can be intercepted, blacked out, hacker finds
Re: I'm near retirement age and what is this
The conferences seem to be useful because well done research is presented to the public. And some of the more interesting bits are widely reported. The problems are partly design related, implementation related, and user related. Combined with a tendency of beancounters to undervalue solid security it tends to get done in spasms.
AT&T buys Time Warner for US$85.4bn or 1.25 Dell-EMCs
Pacemaker maker St Jude faces new security flaw claims from biz short-selling its stock
Re: Surely this is almost the definition of insider trading?
Short answer - No. This stock manipulation fraud, a related but different beast. In this case it is outsiders trying to manipulate the stock price to make a tidy profit by feeding the rumor mill. Since most brokers and traders are not that computer savvy nor understand computer security they might be susceptible to panic selling if there are well publicized "reports" of a serious flaw or a badly overhyped flaw. Even it there is a flaw, the manipulators only report a working range of 7 feet/2 meters.which means any attack using these flaws would probably be investigated as (attempted) premeditated murder. A murderer may be better off using a knife or gun at that distance because neither require any hacking skills.
Judge nailed for trying to bribe Fed with fizzy water (aka Bud Light)
Re: Bud Light is beer?
Good US beers are about 6% or so alcohol unless the state law limits the alcohol content. However they are called craft beers and are made by smaller breweries who take pride in making a quality product. The mass market "beer" aka piss-water has no quality just a lot of money spent on ads.
Today the web was broken by countless hacked devices – your 60-second summary
Re: Maybe..
I doubt any legislative action will actually be all that effective. The average Congress critter is not noted for critical thinking skills but emotional pandering.
Security is hard to do even when users are reasonably proactive. To many IoT devices ignore proper security because they make it difficult to update the device even for proactive users. This could be fixed, possibly without any new legislation. Use the existing defective product recall laws on the books since these are defective devices. After a certain period of time and genuine effort then nail the manufacturers with fines for selling and refusing to fix defective products.
No matter who becomes US president, America's tech giants are going to be quids in
Meet the slimeballs who are openly sabotaging Virgin Media
Hapless Network Rail contractors KO broadband in Uxbridge
"Nothing to do with the cloud, where ever it may be data needs to be accessed to be processed. If you can't access it it doesn't matter where you process it." - If the data is local to you then you can process it. The issue noted is users may not be able to access remote, cloudy data whether it is on an internal company network in the "cloud".
SHA3-256 is quantum-proof, should last billions of years
@Lee D - Cryptography has been an arms race between the strength the of the encryption and means to break them. Combined with various mistakes and hardware limitations your observation that the current encryption methods will be obsolete in the a few years is spot on.
Also, people need to remember that encryption does not need to protect information forever but for a period long enough for it to become essentially useless. This is time period that can range from a few minutes or hours to a few years.
Microsoft tries, fails to crush 'gender bias' lawsuit brought by its own women engineers
Re: Always a one-sided story
The issue is whether Slurp has enough real evidence to have case tossed. The judge ruled they so far have not shown enough. Given the arrogance of Slurp and their incompetent (more accurately criminal) HR systems there is a very real possibility these suits have merit.
Democralypse Now? US election first battle in new age of cyberwarfare
Re: General uptick in Villainous Russian stories lately.
@LeeE - Historically those that fear a power shift and refuse to truly address the internal national problems have use the threat of war to divert attention from their failures. It seems like every major hack is now attributed to either the Russian, Chinese, or NORKS when Occam's Razor would suggest most of the hacks were abetted by internal target incompetence. The incompetence in many cases may be the primary cause of these hacks.
US reactor breaks fusion record – then runs out of cash and shuts down
Mysterious algorithms, black-box AI recruiters are binning our résumés
Sweet, vulnerable IoT devices compromised 6 min after going online
Salesforce rules out Twitter bid
Losing 100m/quarter
No company can continue to lose money, they will eventually run out. Twitter is not quite at death's door if they can reduce their costs enough they can survive. However, when several profitable companies looked more closely they did not like what they saw and publicly backed away. That would indicate Twitter has more problems below the surface which could easily sink them.
Netflix reminds password re-users to run a reset
Cisco president: One 'hiccup' and 'boom' – AWS is 'gone'
A bit of envy
According to Amazon's published financials the company is profitable with or without AWS. And AWS is their most profitable division. Amazon seems to be growing in both total customers and profitable ways to separate the customers' money for various product and services. Amazon is originally a retailer and is used to retail markups which are not all that high. Cisco and other kit manufacturers are not used to retail style margins so they do not understand how Amazon or AWS can be profitable or how any retailer survives.