* Posts by a_yank_lurker

4138 publicly visible posts • joined 16 Nov 2013

Rhode Island sues HPE for making its DMV even more miserable

a_yank_lurker

"will know that Z needs to be included." - If that is the only part missing those would be some of the best specs from a government ever.

Arch Linux: In a world of polish, DIY never felt so good

a_yank_lurker

Arch Derivatives - Manjaro and Antergos

While Arch still uses the CLI to install there are two derivatives that use a graphical installer: Manjaro and Antergos. Of the two Antergos seems a little stabler.

The main point with Arch based distros is that it is a rolling release. New versions will be pushed out relatively quickly. One does need to pay attention, particularly AUR packages, to conflicts which are usually well documented.

Microsoft ends OEM sales of Windows 7 Pro and Windows 8.1

a_yank_lurker

Re: Too little too late.

For the last several years I have only used Slurp with any regularity with work kit. My personal kit is almost completely Slurp free. Only a couple of games that might not run under Wine are the only software that I have not been able to replace with something from the Arch Linux repositories; games I have not played in years and probably will not run on 'bloat 10.

The final blow was when Slurp "graciously" downloaded 4.6 Gigs of 'bloat 10 install files on a 'bloat 8.1 dual boat laptop. That was after a routine 'bloat update screwed the BIOS settings temporarily disabling the dual boot earlier. The 'bloat partition is not allowed on the Internet since then.

Coding will win you the election, narcissistic techies boasted to Hillary

a_yank_lurker

Birds of a feather

Narcissists supporting a narcissist, how revolting.

The problem is not learning a programming language such as Python or Ruby but learning to thinking logically and critically. These are skills that are in short supply. Math heavy fields are difficult partly because they require logical and detailed thinking to do well in them. Once that skill is mastered moving from one 'STEM' field is not very difficult. There are many good IT pros who have science or engineering degrees but they learned to think logically with an attention to detail. Skills that go well in IT.

Boffins coax non-superconductive stuff into dropping the 'non'

a_yank_lurker

Re: Sort of an self-hyped report

Manipulating heat and cooling cycles and rates to achieve desired mechanical properties is well known in metallurgy. This is taking that idea and seeing if it can work to manipulate electrical properties. The hardest part is proving it can be done reliably.

Nymaim malware got a major 'upgrade', says Verint

a_yank_lurker

Macros

" arrived as a macro in a compromised Word document." - Macros are like Flash, a good idea once that has outlived its usefulness and should put out to the pasture. The one thing both are best at is being a malware vector.

Cheap, lousy tablets are killing the whole market says IDC

a_yank_lurker

Most users will probably a low to mid price phone, tablet, laptop, and desktop more than adequate for their needs. Except for a phone these devices should last several years with OS support being the biggest problem.

Google drops a zero-day on Microsoft: Web giant goes public with bug exploited by hackers

a_yank_lurker

Slurp is having a bad week?

First atom tables and now an active, unrelated exploit of 'bloat. It's been too quiet on the bug front for Slurp recently. Waiting for the next nasty to come out.

As far as Slurp being able to patch a bug, they will screw it up at least a couple times before getting it sort of right.

No nudes, bloated apps, Android sucks and 497 other complaints about Apple to the FTC

a_yank_lurker

Re: @ big_D, et al.

US monopoly rules are usually applied when the total market share is so large the company can control the market. Fruit does not dominate the US mobile market like Slurp dominates the desktop OS market. While Fruit maybe the largest single manufacturer of devices there is plenty of competition from Android devices and Android devices outsell Fruity devices by a wide margin in the US.

These complaints could spur a product recall but that is about as far as it will go.

By comparison Slurp has something like 85 - 90+% of the desktop market depending on whose numbers you believe. Thus, any decision by Slurp could potentially distort the market and harm consumers. This could get an almost bright spark to look to see if they are abusing their monopoly position.

Facebook ads in race claim

a_yank_lurker

Re: standard advertising practices

The issue appears to be whether advertiser decides to using affinities for certain types of ads illegally. Some ad types do make some sense to target more specific demographics such as adult diapers for the incontinent who are typically elderly or baby formula to parents of infants. However, various non-discrimination laws have to be obeyed for some ads such as for housing.

Windows Atom Tables popped by security researchers

a_yank_lurker

Re: Firewalls to block the downloading of executables?

@David Roberts - The short answer - No. Users will need to run new executables from time to time and it is fairly easy to hide executables in other code (Office macros for example). Users and admins will have a hard time with setting up the rules correctly at the local firewall level.

a_yank_lurker

Re: Super cool name!

@Brewster's Angle Grinder - Originally all PCs were standalone, single user devices. Later local networks modified this somewhat but the network was isolated from the world. In both cases, the introduction of malware required physical access and disk to the machine/network. Windows is derived from DOS which was a fairly typical PC OS of the era. None of these OSes were designed for a large scale interactive system or the Internet. Thus, any of the PC OSes are likely to have some nasty attack vectors that could be impossible to properly patch. But since Windows is the only major PC OS still available it is likely to show these types of bugs.

Unix was designed for a large scale network from the beginning and current versions and derivatives have kept this design legacy. This means that the original design made some consideration for isolating users from administrators and limiting user capabilities. The assumption was not necessarily malicious users but incompetent users, if they had proper permissions, could take down the system with very serious consequences.

FBI reopens Hillary spillery

a_yank_lurker

@David 132 - Most commentators and many powerful elephants dispise Blowhard. Thus Trump can not count on a solid Senate if impeached; too many elephants are likely to vote to convict. Many believe the opposite is true of Felon. The donkeys in the Senate would never convict her and many elephants would to be cowardly to vote for conviction no matter how serious the charges.

a_yank_lurker

Re: Anthony Weiner?

The Weiner strikes back.

'Hacker' accused of idiotic plan to defraud bank out of $1.5 million

a_yank_lurker

Re: Well, no one ever said crooks had to be smart...

He is stupid enough to a Congress critter.

Researchers expose Mirai vuln that could be used to hack back against botnet

a_yank_lurker

Re: there is another way... governmental recall of the devices

That would be the quickest way to shake up IoT. Have all the devices recalled at least nationally however it would really be nice if the hammer dropped worldwide on the same day.

Lenovo downward dogs with Yoga BIOS update supporting Linux installs

a_yank_lurker

Re: Microsoft..

@Streaky - Slurp is quite possibly a criminal enterprise if any competent DA would care to look with their abusive 'bloat 10 garbage. Whether Lenovo conspired with Slurp or did this on their own is hard to tell. Both are quite likely given the sleaziness of both.

a_yank_lurker

Re: How about testing it ?

Lenovo probably decided that no one wants to use Linux unless it is preinstalled. Ignoring that many older machines get Linux and many new machines will get 'bloat wiped ASAP.

NYSE halts trading in Violin Memory shares

a_yank_lurker

@Steve the Cynic - Very true about the difference between being listed on an exchange and OTC. The possible problem Violin faces if delisted would be what are the loan requirements. If they require being listed on a recognized exchange NYSE delisting could be disastrous.

So long Vine, your six seconds of internet fame are over

a_yank_lurker

Next

Will Twitter also wither on the vine also?

What has 500,000 thumbs and is no longer being sued by HP? Panasonic

a_yank_lurker

Re: Really??

It's a rather old suit. But the major complaint is price fixing which affects everyone buying a dvd burner/reader. Notice that plaintiffs include retailers not just OEMs.

Judge orders FBI to reveal whether White House launched 'Tor pedo' torpedo exploits

a_yank_lurker

Re: This just got "interesting"....

There have several infamous pedophila cases in the US were the "evidence" only existed in the minds of the prosecutors, the press, and their lackeys. Many innocent people were convicted in the hysteria. I am wary when prosecutors seem to be looking out for their careers and not justice.

For the record, the only information I have on these cases is from news reports. So I have real idea if the defendants are actually guilty.

a_yank_lurker

Re: This just got "interesting"....

Blackstone was commenting that a respect justice system tries to only convict the guilty and never the innocent. He realized that one faces either a high rate of false negatives (guilty getting off) and a high rate of false positives (innocent being convicted). He said on should opt for a system that produces many more false negatives than false positives. This is implied in the US Bill of Rights. It does not matter what the crime is this should still be true.

Also, while possessing child pornography is a crime one is overlooking that the website is operated by someone. Often these cases go after the low level people because the cases are easier to build and prosecute. One sees a similar pattern with drug cases, users and minor distributors are often busted but the major dealers often are not touched for years.

a_yank_lurker

Re: This just got "interesting"....

The problem in many cases is the feral's use of entrapment techniques and hacking. If they hacked the box who is to say they did not plant some of the evidence. The ferals are known to use some rather sleazy if not criminal tactics to get a conviction.

Relying on someone visiting a site is always problematic because of the reasonable possibility of fat-finger syndrome coupled with erratic-spelling syndrome. Plus, finding something on a computer does not absolute prove who did it only that someone did, see several of the rulings in the various Prenda cases.

Other than a confession, I doubt only a few online child pornography cases are all that solid. IP addresses only point to account owner not a specific user. Evidence on a hard drive only proves someone did visit a site but still who visited is not absolutely provable especially when multiple people have access to the computer. An having access to a computer does not mean you know what is in every file on the system especially in multi-user situation. Sad but I think realistic assessment. Also, remember Blackstone's comment "It is better that ten guilty persons escape than that one innocent suffer". Make sure the person is actually guilty and do not engage in a witch hunt.

LinkedIn, Dropbox hack suspect named as Yevgeniy Nikulin by US prosecutors

a_yank_lurker

Re: Location

It depends on the various extradition treaties and how much effort the Russian government puts in to defend him. If the Russians can force the ferals to show their hand they might show how pathetic a hand the ferals really have to the world.

There is has been a lot of jawboning over here about how every major hack has a Russian or the Russian government behind it. Often the allegations are made off the record with no evidence offered. So I imagine the Russians are looking for a case to embarrass the ferals.

It's nearly 2017 and JPEGs, PDFs, font files can hijack your Apple Mac, iPhone, iPad

a_yank_lurker

Re: Cupertino is ...

With Linux, if vendors follow Apple's route then definitely yes. But if the vendors support multiple distro families (Ubuntu, Debian, Arch, Slack, Red Hat/Fedora, etc) then it will be somewhat more difficult. Also, if the vendors follow the basic Unix practice of splitting user accounts from admin accounts that will limit the possible damage.

Linux should be getting attention because of its server dominance now from the hackers.

a_yank_lurker

Re: Cupertino is ...

It will be hard to sink that low.

Finally, that tech fad's over: Smartwatch sales tank more than 50%

a_yank_lurker

Niche Device

Smartwatches seemed to be a niche device as they would be mediocre at what they do compared to other devices. There are a few situations were they are likely to be the best choice because of what they combine into one device but not many people will be in those situations.

Murder in the Library of Congress

a_yank_lurker

Re: And how does that affect you?

The demand for most copyrighted material is concentrated in relatively short period of time, from a few months to a few years depending the type of work. By about 10 or 15 years there will be virtually no sales. It does not matter how well the sales were at there peak. The lengthy copyrights will only "benefit" a very small number of creators.

Hacktivist crew claims it launched last week's DDoS mega-attack

a_yank_lurker

Re: IoT

" Kettles, Coffee makers, fridges, Smart TVs (Proof of concept announced but not yet published), Media boxes, thermostats, doorbells, Your kid's toys." - Can anyone give me a logical reason why any of these devices ever need web access. I can see some possible value for CCTV/webcam remote monitoring of infrastructure but not for most people.

Every LTE call, text, can be intercepted, blacked out, hacker finds

a_yank_lurker

Re: I'm near retirement age and what is this

The conferences seem to be useful because well done research is presented to the public. And some of the more interesting bits are widely reported. The problems are partly design related, implementation related, and user related. Combined with a tendency of beancounters to undervalue solid security it tends to get done in spasms.

AT&T buys Time Warner for US$85.4bn or 1.25 Dell-EMCs

a_yank_lurker

Re: Feeling here

The backend admin staff usually has the most functional overlap between merged companies once the backend processes are harmonized. So the beancounters should be worried.

Pacemaker maker St Jude faces new security flaw claims from biz short-selling its stock

a_yank_lurker

Re: different view

There laws on the books that can be used against the two companies if the local feral DA is willing to go after them. The problem is the feral DA is apparently not interested in the case and his chain of command is not willing to make him do his job up to Obama.

a_yank_lurker

Re: Surely this is almost the definition of insider trading?

Short answer - No. This stock manipulation fraud, a related but different beast. In this case it is outsiders trying to manipulate the stock price to make a tidy profit by feeding the rumor mill. Since most brokers and traders are not that computer savvy nor understand computer security they might be susceptible to panic selling if there are well publicized "reports" of a serious flaw or a badly overhyped flaw. Even it there is a flaw, the manipulators only report a working range of 7 feet/2 meters.which means any attack using these flaws would probably be investigated as (attempted) premeditated murder. A murderer may be better off using a knife or gun at that distance because neither require any hacking skills.

Judge nailed for trying to bribe Fed with fizzy water (aka Bud Light)

a_yank_lurker

Re: Bud Light is beer?

Good US beers are about 6% or so alcohol unless the state law limits the alcohol content. However they are called craft beers and are made by smaller breweries who take pride in making a quality product. The mass market "beer" aka piss-water has no quality just a lot of money spent on ads.

a_yank_lurker

Re: "Bribing" ?!?

Butt Light has the same relationship to real beer as incoming sewage does to drinking water.

Today the web was broken by countless hacked devices – your 60-second summary

a_yank_lurker

Re: Maybe..

I doubt any legislative action will actually be all that effective. The average Congress critter is not noted for critical thinking skills but emotional pandering.

Security is hard to do even when users are reasonably proactive. To many IoT devices ignore proper security because they make it difficult to update the device even for proactive users. This could be fixed, possibly without any new legislation. Use the existing defective product recall laws on the books since these are defective devices. After a certain period of time and genuine effort then nail the manufacturers with fines for selling and refusing to fix defective products.

No matter who becomes US president, America's tech giants are going to be quids in

a_yank_lurker

Re: Cameroon 38%

"In the end, only people pay taxes, not corporations." - Exactly, all taxes paid by corporations are buried in the final price. The problem with the US income tax system is its use for nudging various programs through tax deductions and its inherent, excessive complexity.

Meet the slimeballs who are openly sabotaging Virgin Media

a_yank_lurker

Don't give snail mail any ideas

Hush, the snail mail service may get ideas about using escargot to hinder the competition.

Hapless Network Rail contractors KO broadband in Uxbridge

a_yank_lurker

"Nothing to do with the cloud, where ever it may be data needs to be accessed to be processed. If you can't access it it doesn't matter where you process it." - If the data is local to you then you can process it. The issue noted is users may not be able to access remote, cloudy data whether it is on an internal company network in the "cloud".

SHA3-256 is quantum-proof, should last billions of years

a_yank_lurker

@Lee D - Cryptography has been an arms race between the strength the of the encryption and means to break them. Combined with various mistakes and hardware limitations your observation that the current encryption methods will be obsolete in the a few years is spot on.

Also, people need to remember that encryption does not need to protect information forever but for a period long enough for it to become essentially useless. This is time period that can range from a few minutes or hours to a few years.

Microsoft tries, fails to crush 'gender bias' lawsuit brought by its own women engineers

a_yank_lurker

Re: Always a one-sided story

The issue is whether Slurp has enough real evidence to have case tossed. The judge ruled they so far have not shown enough. Given the arrogance of Slurp and their incompetent (more accurately criminal) HR systems there is a very real possibility these suits have merit.

Democralypse Now? US election first battle in new age of cyberwarfare

a_yank_lurker

Re: General uptick in Villainous Russian stories lately.

@LeeE - Historically those that fear a power shift and refuse to truly address the internal national problems have use the threat of war to divert attention from their failures. It seems like every major hack is now attributed to either the Russian, Chinese, or NORKS when Occam's Razor would suggest most of the hacks were abetted by internal target incompetence. The incompetence in many cases may be the primary cause of these hacks.

a_yank_lurker

Re: Democracy...?

@andrewj - So we have to very biased, lying, and inaccurate sources the US media and the Russians. The question is which one is lying less?

US reactor breaks fusion record – then runs out of cash and shuts down

a_yank_lurker

Re: Why spend billions?

We definitely have plenty and it would improve the human race in so many ways.

Mysterious algorithms, black-box AI recruiters are binning our résumés

a_yank_lurker

HR = lowest end of the IQ curve

The problem with any screening system involving HR is the total stupidity of HR. Applications are nothing more than buzzword bingo not a competent review of skills against requirements.

Sweet, vulnerable IoT devices compromised 6 min after going online

a_yank_lurker

Re: How Bitcoin might help fix the Internet of Things.

The basic question to ask is how is the device set up. The manufacturer controls the initial set up routines not the user. Also, how much control does the user have over the device to do updates.

Salesforce rules out Twitter bid

a_yank_lurker

Losing 100m/quarter

No company can continue to lose money, they will eventually run out. Twitter is not quite at death's door if they can reduce their costs enough they can survive. However, when several profitable companies looked more closely they did not like what they saw and publicly backed away. That would indicate Twitter has more problems below the surface which could easily sink them.

Netflix reminds password re-users to run a reset

a_yank_lurker

Someone is awake

Netflix seems to realize that users may not be aware of a breach and are being proactive - a very commendable act.

Cisco president: One 'hiccup' and 'boom' – AWS is 'gone'

a_yank_lurker

A bit of envy

According to Amazon's published financials the company is profitable with or without AWS. And AWS is their most profitable division. Amazon seems to be growing in both total customers and profitable ways to separate the customers' money for various product and services. Amazon is originally a retailer and is used to retail markups which are not all that high. Cisco and other kit manufacturers are not used to retail style margins so they do not understand how Amazon or AWS can be profitable or how any retailer survives.