* Posts by hayzoos

401 publicly visible posts • joined 2 Jul 2014

Page:

Twitter's lawsuit against anti-hate-speech crusaders gets SLAPPed out of court

hayzoos

Re: Elmo Fails again!

Free speech, free as in ______ ?

Free as in free for me, not for you.

First release candidate of Linux kernel 6.9 looks 'fairly normal,' says Torvalds

hayzoos

NTFS/Linux permissions

Does root map to administrator? What could map to Windows system account? Many possible ways around the problem and make a complete mess of the ACLs when handed back to Windows.

Air National Guardsman Teixeira to admit he was Pentagon files leaker

hayzoos

Well there's your problem

"was observed viewing intelligence content on TS-SCI websites"

Who thought making such restricted information so readily available on a system designed to easily "share" information was a good idea? Access control is at best a bolt-on afterthought in an HTML based system. You know damn well that the very same core as the WWW was used as the starting point to build these "TS-SCI websites" using web developers familiar with the current HTML tech so these websites are probably of similar technical quality.

HDMI Forum 'blocks AMD open sourcing its 2.1 drivers'

hayzoos

Re: Does AMD

I'm too lazy to go look it up, but my guess is HDMI 2.1 is not an open standard in the same sense which would be compatible with AMD open sourcing it's drivers. In other words HDMI Forum wants it's fees and that might be in jeopardy if AMD open sources it's drivers.

Americans wake to widespread AT&T cellular outages

hayzoos

AT&T sucks - I have no choice

I have been a victim of AT&T for years going on decades. I had resisted the fad of first holding a brick to the side of the face from mouth to ear, and later doing the same with a Star Trek communicator-esque flip phone. My employer back then had decided all support roles were required to be reachable anywhere including me which worked within a space where cellphones were verboten. They issued me a Motorola flip phone with service by Verizon. Then after the numerous "me too" company issued cellphone requests became burdensome, they changed to reimbursement. After having the Verizon phone for what I considered a long trial period, I had found that stomping grounds were poorly served by Verizon but well served by AT&T this included my mother's house where Verizon phones killed their batteries trying to find a tower. I visit mom often enough that it matters. So when I had to contract for my own cellphone service at the company's expense I chose AT&T in order to be somewhat useful.

Even at home AT&T had better signal than Verizon, more "bars" in general and I could go to the basement without losing a call. It was almost better than tolerable back then. When AT&T began building it's 5G system, signal at my place began to degrade. At times worse than Verizon had been. At mom's Verizon was still non-existent but AT&T was degrading as well, sometimes no signal, sometimes poor call quality, sometimes dropped calls. To this day it has only marginally improved. BTW I am determined to stick with my "grandfatherd" "loyalty" plan which is only 4G but avoids the 5G tax. As I hear from others 5G in my area is hardly an improvement even non-existent in some spots. I have no choice, I could go with a MVNO but that does not change the service coverage, but maybe time to check into the option again for other reasons.

AT&T does provide excellent customer dis-service though. Calls to complain connect quickly and are auto answered promptly with the finest examples of maladjusted proprietary hold "music" audio. These calls do not drop either while on hold. Many times the calls will even stay connected through multiple transfers to different departments where audio quality is remarkably diminishing at each transfer. Other times a transfer goes to an anechonic chamber where the silence is deafening or possibly the fates will decide the call should just drop. All the while the voices on the other end are frequently accented perfectly mismatched to one which will not be intelligible to the caller.

The fixes presented during these calls involve, restarting the phone, shut down removing and cleaning the SIM reinstalling and powering up, refresh the account provisioning and pushing related config to the phone, issuing a new SIM, use WiFi calling, try on another phone, unplug it and plug it back in, try holding it differently, fully drain and recharge the battery, fully charge the battery and redrain the battery, remove the protective cover, remove the screen protector, remove both the protective cover and screen protector, try from outside, try from the attic, try from atop the chimney, cut down the neighbor's tree, cut down the neighbor's house, cut down the neighbor's SUV, does the neighbor have a windmill, does the neighbor have solar panels, does the neighbor have a daughter, power off and then power on the house, sunspots, moonspots, leprechauns, ok try that and give it a day or so and call back for more help if that does not work. Please take the survey at the end of the call.

The online experience is equally wonderful. Second Factor Authentication or is that Multi-Factor Authentication, has become mandatory. I remember when username and pet's name were all that were required. Shortly after some high profile SIM jacking events they did provide an optional security code. And eventually the pet's name had to be longer than Dino then longer than Flipper then longer than Tralphaz so currently Mephistopheles looks very confused when I call them to the dinner bowl. Maybe I should use a more secure passphrase like Satan's Little Helper. The 2FA is very sophisticated and therefore secure, so I have been told in an accented voice. You an only receive the randomly generated code via SMS, but wait not just any SMS, only to a line number on the account's plan. My concerns of being unable to receive the code because of: 1) being out of coverage area yet have internet access; 2) having only one line on the plan but having a malfunction, pilfered, lost, destroyed device; 3) having internet access yet the cell service is down; or 4) other reasons I cannot disclose; have been politely and cheerfully dismissed.

Real fun ensued when attempting to login online when traveling and therefore using a VPN for a secure connection. The main website would appear just fine. The convoluted authentication workflow involved redirects to servers protected from hackers by denying connections from known VPNs. I found out through my own troubleshooting changing the pet's name yet again while on travel without the pet was not feasible. Many other websites had also begun using the very same hacker protection, so I now use an undetectable self-hosted VPN.

For the privilege of having to endure these fine levels of dis-service excellence one must be prepared to pay the piper, never mind the piper, no longer enough left after paying AT&T with rate increases at or above the rate of inflation.

On a related topic: New landline service is no longer available in this area. I only consider PSTN service to be landline. And even for those lucky enough to still have it or acquire it under extreme circumstances, the cost has risen to match or exceed cell service and reliability has degraded to cell service level or below. VOIP is not landline. Cable fixed line comes the closest, but requires power locally.

Cybercriminals are stealing iOS users' face scans to break into mobile banking accounts

hayzoos
Joke

Nothing wrong with that, just be sure to use reverse notation with each character also inverted left-to-right or right-to-left as appropriate. This will sufficiently encode said password to be unreadable unless viewed in a mirror. This also makes reading your password yourself easy when you need it if you have a mirror.

Twilio reminds users that Authy Desktop apps die in March – not in August

hayzoos

Another Bitwarden advantage is the extent of cross-platform support.

@Danie - How did you find 61 sites that use 2FA? I will not even tell you how few I have amongst hundreds of logins, it's pitiful.

And, according to Bitwarden's report on 2FA use, I have not missed enabling a single one. Sadly, not a single financial account offers anything more secure than SMS / email delivery of a TOTP. As it stands SMS TOTP delivery seems to be the "industry standard". What bothers me about this is: to generate the code delivered by SMS they have implemented most of what it would take to support "authenticator app" TOTP, yet they still wont do it.

Even worse is the uptake of anything more secure such as hardware keys. I wonder if passkey uptake will be any better.

So I have to wonder, Is the death of Authy Desktop really that big of a deal? Sadly, it may not be.

How artists can poison their pics with deadly Nightshade to deter AI scrapers

hayzoos

The difference is machine

"I see no difference between that and a machine learning system ingesting the same works."

Up until machine learning systems existed, application of copyright was well settled. Court cases were necessary when photocopiers came about and cassette tapes and VCRs etc. New technologies representing new ways of copying for new purposes. Since copyright sets boundaries of fair use granting the copyright holder the greater say of how their work can be copied, any new way of copying should be restricted by default until courts set the fair use boundary concerning the new way of copying.

In machine learning systems, it is not about just the output a copyright holder is concerned. A copyright holder expects all the non-machine learning system examples you have given as long as they are within the boundaries set for fair use or have been granted by the copyright holder. Since most of the copyrighted works existed prior to the explosion of machine learning systems, copyright holders never considered this manner of copying.

I am not okay with free-sale copying via machine learning systems as fair use by default. Machine learning systems are not people. Their benefit to society as a whole has yet to be demonstrated. Their detriment to society as a whole has yet to be demonstrated. I would rather assume the worse and not call forth the genie until being better prepared for the consequences or deciding not to call forth the genie at all if careful consideration shows that is the prudent path.

IT consultant fined for daring to expose shoddy security

hayzoos

Has anybody considered...

An "UN-ethical hacker" had already found the "password" and accessed all the data. Given the company is a service provider to other businesses, all those companies would have then suffered a data breach. Considering the case is being heard in Germany, it would be safe to assume that large numbers of this company's business customers are European based or serving Europeans therefore falling under the GDPR.

This case would make an excellent distraction to such an event.

I think Modern Solutions should either provide proof of no massive data breach or face the consequences and unfortunately their business customers would have to face them as well.

What the AI copyright fights are truly about: Human labor versus endless machines

hayzoos

I have produced copyrighted work which I have published. I have not granted license for LLM training. It did not exist at the time. LLM is a new use case.

I have also not granted license for wholesale photocopying. It did exist at the time. But legal standards had been set that permission has to be granted for wholesale photocopying of a copyrighted work.

I think the similarities of the technologies I compared should be considered in determining whether LLM training should be considered fair use. I do not think LLM training is fair use.

I do not care how "infeasible" it may be for an AI outfit to seek out permissions and provide compensation if the copyright holders demand it, for the vast volumes of training content they require. That is their problem, not the copyright holders.

UK officials caught napping ahead of 2G and 3G doomsday

hayzoos

opportunity knocks

2G/3G sunset consultant - since in-house IT are simply not paid enough to bother listening to.

Google pencils in limited third-party cookie purge for January

hayzoos

Re: Naturally...

Mentioned in the article, google needed a replacement before disablung 3rd party cookies.

I accepr all cookies, and promptly discard them when I leave. Same effect as blocking from my point of view.

I also block scripts by default and only enable those needed for a site to work. How much I enable depends on how much I need to need to use the site.

Google is getting far more pervasive, not good.

Bank's datacenter died after travelling back in time to 1970

hayzoos

Re: Remember those batteries

I remember those "non-replaceable" ones well. At a job from decades ago one had died. For both budget and user sentiment for the computer which had been upgraded to Windows 95, I could not properly fix it. I implemented a new procedure. Do not turn off the "hard drive" (box under the "computer" (box with the screen on the front)). On power failures or other cause of powering off the "hard drive", I followed my part of the procedure. I set the time according to Timex (a handy-dandy device worn on the wrist) and re-entered BIOS parameters such as hard drive geometry according to notes I had previously made on an Ampad and a No. 2 stylus - actually from a backup made on a Xerox. The last step on those note was a reminder to fix the time on the coffee maker and the security camera VCR.

This particular computer was also the one which caused me to realize that Windows 95 had a bug related to long uptimes. Windows update not yet being invented, let alone evolving to a reboot second Wednesday of the month. Windows 95 was actually a lot more stable in retrospect if you kept it off the internet.

Polish train maker denies claims its software bricked rolling stock maintained by competitor

hayzoos

Re: If you expect products to last, then products should come with warranties that you can use.

Well built products do not need warranties. I have a clothes dryer built long ago, before the internet. Parts to repair it are still available. I have replaced... motor, heating elements (twice), rear drum bearing (thrice), front drum glides, drive belt (twice), lint catching screen. It still does its job. It has no electronics. It does not spy.

I have other products in similar states. If they had warrantees, they long expired. I have replaced newer poorly designed appliances that failed with older used ones which can be repaired.

hayzoos

Re: DMCA

It is also because of DMCA that carrier unlocking a smartphone required an exception granted by the Library of Congress.

There were a number of technological "protections" which are considered for exceptions that are NOT providing protections to a copyrighted work.

Messed up metadata could be to blame for Microsoft's Windows printer woes

hayzoos

procrastination pays off again

I have a work laptop with Windows. I configured Windows Update to its least automatic setting and identify network connections as metered. It lives off internet more than on. Its primary purpose is to produce reports and print them. I would keep it off internet permanently except some customers will accept emailed reports. Also the company has chosen MS Office subscription which requires going on the internet periodically. I have been putting off applying the latest update since it hasn't been convenient. I guess that may be why I can still print the reports.

Systemd 255 is here with improved UKI support

hayzoos

I'll stick with a kernel panic message, thank you.

Adopting a BSOD is simply amusing. Dictating filesystem structure of the underlying OS?!? What next? Will we have to look for hosts in some subfolder under Systemd/WINDOWS/SYSTEM32/ since they will no longer be called directories?

What frustrates me the most about systemd is application dependency - real or imagined. You have apps checking for systemd on way or another during install or execution, but not truly needing systemd to execute. Then there are apps which become snap package only. There are people out there spending time on making snap packages work without the snap system and without systemd. Build from source you say? The source build environments have become equally bloated and convoluted. Rube Goldberg would be proud.

I installed Slackware to get away from systemd. Not quite. I looked into Linux from scratch, that project has also been infected. I have even heard of forking systemd to BSD and MAC worlds. Incredible! It is even worse than I thought.

Attack on direct debit provider London & Zurich leaves customers with 6-figure backlogs

hayzoos

Fully tested backups and affordability

So often backups are not tested. Some get lucky and have a good backup, then realize the time to restore is far more than anticipated. Proper backups should be tailored to the workloads and that includes the restore process and include a consideration for tolerable downtime.

The smaller customers who may be at risk of going under are with L&Z because of affordability, but maybe they cannot afford direct debit at all. But it is all the rage.

How to give Windows Hello the finger and login as someone on their stolen laptop

hayzoos

Re: Hardware or software

Fingerprints and the like, only good for Identification, not authentication. Who knew?

BTW - Also only good for ID are national numbers, insurance numbers, account numbers. Some of those even have ID in their names.

Stop misusing IDs as authenticators dammit.

Your password hygiene remains atrocious, says NordPass

hayzoos

I use simple passwords for low risk logins and poor interfaces for good passwords.

I use a password manager and generate the longest passwords a site will accept. Repeating criticism of many above... Why so short, or why accept a longer for setting but not for login? Duh.

The master password I use for the password manager is 48 characters. I memorized it in 8 character chunks. A while back I had upgraded from 24 characters.

I changed the master password earlier this year because of a weakness found in certain Key Derivation Functions amplified when using a low iteration count. This was necessary because I started using the password manager long ago and recommendations changed since then.

FTC interrupts Copyright Office probe to flip out over potential AI fraud, abuse

hayzoos

All rights reserved

You really do not need to state anything in a copyright notice, the laws take care of that. Even the often included "All rights reserved" is not quite accurate. Traditionally, copyrighted works were intended for consumption by human subjects and frequently for monetary compensation. Legal precedent around copyright tradition is well established yet not complete. Now the new technologies of AI/ML are upending those traditions. There are parallels to the traditions and there are tangents. In legal terms those parallels may only be similarities and not due the same fair use treatment. The tangents may be given a pass or prohibited as fair use. The courts' opinions are what matter here.

Meta, YouTube face criminal spying complaints in Ireland

hayzoos

Re: Blocking unwanted connections with a hosts file

I thought modern browsers implement their own DNS client which may ignore the hosts file. Same goes for Certificate stores. Why reinvent the wheel? Follow the money.

It's perfectly legal for cars to harvest your texts, call logs

hayzoos

Re: Why not use a satnav app?

I have no trouble using my waterproof phone in the rain. When using satnav, I usually download all expected areas of travel and quite a large surrounding area. I have little need to interact beyond glancing at the screen while under way on most trips. A headset can function for calls. Touch compatible gloves work for hand protection.

A phone can function well as satnav for motorcycle trips if properly spec'ed and equipped.

hayzoos

Re: Old car, for the win!

Same here. I no longer have to charge my phone as much since I have very limited apps on my phone which does wonders for battery life. I have installed a cheap car radio and use the handsfree feature, but It is incapable of "callerID". It has no reading aloud text unless the phone provides the audio stream. I cannot guarantee it does not log calls, but I doubt it due to its lack of message or contacts access.

Another benefit of the old car along similar lines is the lack of a "black box" to record speed, acceleration, deceleration, cornering, etc. with no use to the driver/owner. I imagine the newer versions of these "black boxes" also includes GPS location and a host of other data points.

Scarlett Johansson sics lawyers on AI biz that cloned her for an ad

hayzoos

Re: What gets me..

With all due respect.....

Your opinion sucks.

But all is good because I prefaced it "With all due respect".

attribution: Will Ferrell - Taledega Nights: the ballad of Ricky Bobby

US government's Login.gov turns frown upside down, now smiles on facial recognition

hayzoos

So wrong

Biometrics can only be used as an identifier like a username, or IRL a name. NIST IAL2 was mentioned in the article, Without anything else, just having a biometric match is really only IAL0 - no confidence the identity is authentic. Even IAL1 (some confidence the identity is authentic) is a stretch and IAL2 (high confidence the identity is authentic) is way beyond what a biometric can do.

To raise the level of confidence in the identity, authentication is required. Stronger authentication achieves higher confidence in the identity. A biometric as an authenticator of an identity is weak. A biometric can be added to other authenticators for multifactor authentication to improve authentication.

In security circles this process is called I&A (idebtification and authentication). First an identity is presented like a name, SSN, a biometric, a username, or account number. If no further steps are taken, then you have achieved IAL0 - no confidence. If some level of authentication is performed such as presentation of a pin, or a password, or a secret handshake, or a key..., then IAL1 is achieved - some confidence. To go to IAL2, some strong authentication is required, either a proven strong single authentication factor like a hardware token or multifactor like a password and a token or a pin and an SMS delivered one-time code.

So many get this wrong.

Dropbox limits ‘all the storage you need’ unlimited plan, blames abusive users

hayzoos

Re: the company saw more of this abusive behavior

One could argue that a speed limit is a limit.

But when an ISP is advertising unlimited plans and at the same time advertising the fastest internet they are walking that false advertising line over the line.

Why these cloud-connected 3D printers started making junk all by themselves

hayzoos

Re: Sounds like this cloud thing was programmed as if it was a local server

A feature which is on by default is not optional. In this case "not connected to the cloud" is the optional feature.

30 years on, Debian is at the heart of the world's most successful Linux distros

hayzoos

Re: POLL anyone?

Most distros offer a bootable live CD/USB package. Very good for a trial run to see if there are any hardware issues. Many of those also provide an install option from the live version.

Since you have stated that Windows is just being a VM host for your setup, the live option is a very good next step for you. If you do not like it you can just reboot.

I think you are closer to Linux only than you give yourself credit for. I had to find alternatives for a couple of Windows apps before I could fully switch to Linux.

Google 'wiretapped' tax websites with visitor traffic trackers, lawsuit claims

hayzoos

Google is nearly everywhere

An informal survey of my important bookmarked sites has google in various hostnames on over 90% of them. I use a handful of tools manage third party content on sites I visit. I have seen functionality of sites requiring more and more of Google hosts' content. Google has a multitude of products/services for the website operator to integrate.

P.S. also present on www.irs.gov

Bank of Ireland outage sees customers queue for 'free' cash – or maybe any cash

hayzoos

Re: It's a bank, of course it's not free money

I guess that I am less impatient than you. The local sewage authority offers a 5% discount if an account is paid a year in advance. This is available any time but rate increases (far and few) make the account credit diminish faster but the discount is given up front. Once a relative decided they were going to help financially by paying for a year of my sewage bill anonymously. I noticed the credit right away, but continued to pay my regular amount waiting for the correction of the assumed error. It was well over two years before my wife had found out somehow and confirmed that it was not an error. I then allowed the credit balance to do it's thing. Of course, during that "year" of credit balance a rare rate increase took effect. Since rate increases have happened only a couple of times in the 25 years I have lived here, it seems they may be on a decade cycle.

So much for CAPTCHA then – bots can complete them quicker than humans

hayzoos

Re: had one today

In order to have culture appropriate CAPTCHA your culture will have to endure self driving vehicles.

Shifting to two-factor auth is hard to do. GitHub recommends the long game

hayzoos

weak 2FA

Is weak 2FA even worth the cons? Lost access to email or phone is a problem. I work in areas without cell services and cannot login when 2FA is only SMS. Implementations are shit. 30 second lifetime of the 2FA code, usually expired by the time it is received. SMS nor email is supposed to be instantaneous nor even quick. Recovery methods that completely circumvent any protection the 2FA provides.

email is not as insecure as it used to be as generally since connections between clients and servers and server to server tend to be encrypted and additional hops on relays to get from domain to domain are nearly non-existent. SMS on the other hand is relatively immature and has not implemented much in the way of security.

I have researched the server side of TOTP and there is not that much more work to implement support for an authenticator app if email or SMS delivery of the TOTP has been implemented. Good enough is not good enough and far better does not require far more effort. Even then, poor implementation could still negate the whole.

I prefer U2F but {whiny voice}"that is just too hard"

Middleweight champ MX Linux 23 delivers knockout punch

hayzoos

systemd is not an just init system anymore MX Linux is a systemd Linux

If systemd were just an init system, it would not be so reviled. It is the fact that systemd has taken over so much more that it is avoided by so many. It has not only taken over various means of functionality, but also ways of doing things. It is doing things in a more "MS Windows-like" way both in a technical sense and conceptually. It has managed to become a dependency in more than one area of functionality.

A Linux OS can be 100% systemd free. A Linux OS can be full on systemd. There is a third wide ranging systemd variety of Linux OS, less than full systemd in order to deal with dependencies. Because MX Linux does not use systemd init, it falls into the third category, barely. MX Linux is a systemd Linux OS on all other counts, and that matters more than systemd just not being the active init.

I do not think there is any Linux OS which cannot have systemd added 100% with relative ease. On the other hand taking a systemd Linux and removing systemd ranges from not to hard to nearly impossible. The systemd cancer is beginning to take hold even in Windows through WSL. There are efforts to emulate systemd through compatibility deamons on BSDs to allow some Linux origin software to run.

It is the dependencies on systemd which are making matters worse. I have been able to overcome some of the supposed dependencies by manually installing a "service". But other dependencies are far greater and would require a rip and replace of a major part of a package and possibly easier to rewrite the whole package. Software dependency on systemd has to be considered part of the cancer.

There should be an organized effort to make software and Linux "systemd not required"

Google's browser security plan slammed as dangerous, terrible, DRM for websites

hayzoos

Re: Scraping

You do not need an account to download the Linux kernel. The Linux kernel is copyrighted (held by numerous contributors). It's components are generally licensed under GPL2 or a compatible license. You cannot simply download it and do with it as you please, you must follow the license. Copyright laws are what make the licenses' restrictions legally binding. It is protected without a login. And it is publicly accessible.

What you are proposing is that things that need to be protected can only be by restricting access from the public. I want to share some of my creative works publicly, with limits. Copyright and other IP laws allow me to do so and place those limits.

Being publicly visible and being in the public domain are entirely two different things.

hayzoos

Re: Scraping

I generally agree with WEI being a bad idea. A very bad idea.

I do disagree with the concept that anything posted to the web is public information and anyone can do anything they wish with it. IP/Copyright laws are to allow one to make their content publicly releasable and retain control of the use of said content.

Going to extremes such as "information just wants to be free" or "DVD regions" just sets up a situation where compromise cannot be achieved.

Do not forget that open source relies on copyright in order to be free.

Slackware wasn't the first Linux distro, but it's the oldest still alive and kicking

hayzoos

late comer to Slackware

I dabbled with many an OS over the years (too many since 1978). Windows brought in the living money so that is where I spent most of that time. On my personal machines I also used Windows out of bad habit. I did try others from time to time to break the habit, but never happened across Slackware, Slax and Porteus were close. At one point I had committed myself to use Linux starting dual boot with Mandrake from CDs I purchased. That was the dial-up era and CDs via post was faster than downloading. I gave up again when my ISP refused to disclose configuration changes they had made to their pppd to support Windows connections.

When Slackware 15.0 release was announced, I made the jump. Prior to that I went to Mint when Windows 7 went EOL. I was not aware of systemd. Too much of Mint just wasn't right because of systemd when i was poking around under the hood. Slackware is much closer to the *nix I had used before. systemd may not be installed, but it leaves its mark through other softwares' phantom systemd dependencies. It does use elogind from systemd. It could be changed to be more pure non-systemd, but it is systemd-free enough for me. You can even install systemd if you like, Slackware is that flexible.

I have been installing Slackware 15.0-64 from the "live" version. I am comfortable enough with it for the friends and family installs.

May the Slack be with you.

Google toys with internet air-gap for some staff PCs

hayzoos

Hahahaha, uh, hahahaha, eh, oh.

Only two separate networks? I knew of at least nine and I was not privy to how many there were, even though I was part of the security department. On top of that, I am speaking of separate hardware networks. Many of these other networks were operating in separate TEMPEST approved spaces. That's when air gap meant absolutely no connection. Even back then there was talk of allowing other networks at the desks on separate machines. The beginning of the long slippery slope.

Linux has nearly half of the desktop OS Linux market

hayzoos

Re: I’d imagine that

The only significant Linux variant is systemd and it is a moving target kinda like Windows in a lot of ways. GNU/Linux without systemd requirements can be a single target for a develpoer. Targeting non-systemd GNU/Linux should also work on a systemd GNU/Linux until it diverges too far (not if, but when). Granted, there are different package systems but there are also for Windows (I supported Windows from v3.0 to reluctantly current.) There is not that much difference in the package systems, I know this because I have manually extracted from .debs and .rpms to install software on my machine when a slackbuild does not exist. I have even installed supposed systemd required software without systemd, it only looks for systemd indicators or uses systemd service system (aka daemons outside of systemd). Vast amounts of Windows software also erroneously claims the need for "admin rights" but in reality does not. Developer laziness is a major factor in all of this.

I can take an application's binaries compiled on my system, for my system (Slackware 15.0) and install it on a systemd Mint installation, provided I compile with the same kernel version and compatible library versions.

Windows application binaries have a somewhat smaller target of kernel versions and library versions but it is still a factor. Lazy developers had coded windows version checks for NT based Windows to halt on "Windows 9"x systems originally meaning Windows 95, 98, and ME. This was a major factor in Windows jumping from version 8 to 10 and skipping 9,

Three signs that Wayland is becoming the favored way to get a GUI on Linux

hayzoos

Re: "if it does its job correctly, the user [..] might never know they were using it"

I also use Slackware. Wayland is present but an option that I periodically evaluate. I have not yet been sold. I have not yet been completely turned off.

On systemd, it may not be present, but it has left it's mark. In order to provide a reasonable selection of tools, it has implemented workarounds to appease various packages. I have successfully installed packages which supposedly require systemd, but only require "infrastructure" of systemd. Lest us not forget that Slackware uses elogind as a workaround for hard-coding for systemd dependencies.

"Maintaining sysvinit would be less effort than dealing with systemd related problems by many, many orders of magnitude." -volkerdi 08-16-2012, 04:42 PM post #164 to thread Slackware and systemd on linusquestions.org

hayzoos

I agree

I have tried Wayland and will try it again. I have also performed some research. Is seems to me that the biggest difference is that Wayland does not do network display. At this point in time, that will not stop me from using it. But, I have in the past used X network display capabilities. So, I have hesitance to using a display technology lacking the network capability as efficient as X has achieved.

On the other hand, X development is lagging. I am not looking for the new shiny. I am concerned about security. I am concerned about keeping up with display hardware.

Change happens naturally, you have to live with it. Change for change sake as said is useless. There is also change for monetary sake. If the change is only for the monetary benefit of the driver of change, then that is even worse than change for change sake.

Europe sets out to squeeze every last drop of power from supercomputers

hayzoos

And the answer is 42.

Google searchers from years past can get paid for pilfered privacy

hayzoos

Re: Huh?

A "single site search" is relevant in that the query information is already known to be associated with the particular client. It is only known to a different site in a search for third party sites when the client follows the provided links and it is included in the referrer.

I am viewing the process from a step before the form being filled and returned to the server. I am viewing it from the blank form being presented to the browser. A search provider for third party sites concerned with privacy should really not set up the browser to fail.

The browser does not decide to use a GET method for the search form. The server provides the form with the GET method. The server is where it is known that third party links will be provided. So, yes a POST method search form is what the server needs to provide to the browser. GET and POST are not seamlessly interchangeable so the browser cannot just simply use POST instead, the server has to be prepared for a POST and the best way is to present a POST method at the time of form delivery to the client.

The browser can alter the referrer prior to making the request to the third party server.

Google search is using the GET method knowing full well that most links provided to the query will be third party and will result in a referrer with the query embedded. Leaving it up to the browser entirely to prevent the query from being seen by the link destination server.

The second part is the browser does have a role. It is permitted to change the referrer. There are rules it is supposed to follow and ones it should. Implementing those rules pertaining to sensitivity of information is challenging for the browser. The only way to be sure is to always strip the query portion from the referrer if the link is going to a different server or domain.

As far as I know, Google is still the search leader and now the browser leader.

Google is not the only search provider guilty of setting up the search result to include the query so a referrer with the query will be presented to a third party. Nor is Google the only browser provider guilty of sending the search query off to a third party by design.

Times have changed and it has been realised that more information is sensitive than previously thought. Google would prefer that we keep doing things the old way as long as possible.

hayzoos

Re: Huh?

The difference is your example is a single site search. The search string is already known by the server where the links take it. Also, your example is a URL, which differs from a referrer string.

In the case of a Google search, the destination site when following a link is not (usually) google.com, but a site which matched the search. That site only gets the search string if provided by the referrer string.

There are two points where the referrer string is controlled. First, the referring server generates the string. Second, the browser can modify the string before presenting it to the destination server.

Google is now frequently representing both the search server and the browser. Most people just accept the defaults which will result in the search terms being in the referrer string.

Now, for the $32 million dollar question. My top of the head math tells me the estimated individual share is optimistic by maybe an order of magnitude. Seventy or so cents seems more like it unless there are far fewer Google users than I am thinking.

Gen Z and Millennials don't know what their colleagues are talking about half the time

hayzoos

Re: Communication

I hope not the ping of death.

Microsoft’s Azure mishap betrays an industry blind to a big problem

hayzoos

tip of the iceberg

The copying or emulation of complex systems goes far and wide. non-exhaustive list: automobiles, "smart" products, IOT products, websites, "customer" "support", tax systems, non-smart electronically controlled devices, soft-touch on/off switches, healthcare systems.

Some of the problem comes from intelligent people egotistically showing their cleverness. The less intelligent are the copiers of the complex.

This is a far cry from the cleverness of simplicity. Instead of creating a Rube Goldberg contraption, create a system to produce a result with the least resource consumption. This concept used to be the gold standard. What happened?

hayzoos

Re: Industry wide phenomenon

I think your assessment is somewhat accurate. But, a lot of this also comes from lack of experience. The trend is to dump the experienced and hire the fresh out of university or tech school lower cost bright youngun's. So I think it is an industry wide problem. Azure is the canary in the mine though.

Boss put project on progress bar timeline: three months … four … actually NOW!

hayzoos

Telecom Industry Standards

Experienced similar telecom shenanigans multiple times in multiple jobs. First job out of university I managed to work my way up to Head of IT (only 25 people in corp office, single step up from bottom rung). This set me up to oversee the tech aspects of the office move 40 miles from the then current location. This involved seven phone/fax/modem lines, and a small capacity DID trunk line. Bell of PA which was becoming Bell Atlantic - PA which later became Verizon - PA all formerly known as Ma Bell under AT&T said they could only provide four POTS lines and the DID trunk line with a 2 week delay for the additional three POTS lines. I had to do some quick learning of the advanced configuration of the Merlin Legend phone system and came up with a workable solution. No more dedicated lines! All incoming would be on the DID trunk and outgoing from a shared pool of POTS lines whose use I could configure in the system far more simple actually. It turns out the existing configuration was advanced and complex because it grew ad-hoc from two POTS lines phone and fax with published numbers and rollover and dedicated modem and all going away because those numbers could not follow our move. But the DID trunk numbers could because they were regional and the move was within the region.

A number of years later I was with another company a hundred or so miles away. We were a private payphone (as a service) company as opposed to phone company payphones. We were servicing one of our rapidly expanding convenience store customer's new locations in the same area of my previous job's office. We were required to provide four payphones each requiring a POTS line. The store itself required about 8 lines. We had our order of four lines in and confirmed to be live no less than ten days before store opening. Then the customer put their order in with Verizon - PA which did not have eight available lines. Verizon gave them two lines from our order, without notice. Our crew was there to install and connect the payphones ten days before opening. They called me because there were only two lines with our name on them. I called Verizon and this is when I found out what had happened. We were obligated under contract to have four working payphones five days prior to opening. That requirement was reduce to two in this situation. Funny thing though, somehow, without us pressuring them, Verizon came through with our two additional lines six days prior. I think somebody with our customer knew somebody at Verizon who could make it happen.

Not enough lines, happened many times. Now no new ones going in, you have to wait for Widow Smith's line to become available.

Meta tells staff to return to office three days a week

hayzoos

Re: Why can't each group decide?

"Is there anyone more out of touch with reality and clouded by their own narcissism?"

There is a good chance the answer is yes. I can think of a few. But, Zuck does put in a strong showing.

Watchdog calls for automatic braking to be standard in cars

hayzoos

Re: About as effective as TPMS

Excellent idea, but the warning lights have been designed to overcome that mole whack. Observe when you turn the key to the "run" position, the lights will illuminate for a set duration then go out. Then as you start the vehicle they may illuminate again briefly and go out. This is describing "normal" operation when all monitored systems are within operating parameters. If any system is outside of "normal" operating parameters the lights will not go out.

I feel like a combination of Mr. Spock and Mr. Scott in describing this behavior.

Of course you can do as I and ignore (sort of) the light and it will eventually burn out (incandescent) and the inspection mechanic never notices the light does not illuminate initially as it should. I do know the cause and it involves a discontinued part only used on the 1996 model year F-150 inline 6 cylinder, AKA sort of rare even for scrapyard parts.

Page: