Watch out when it gets to version 4
Proteus IV: https://en.wikipedia.org/wiki/Demon_Seed
60 publicly visible posts • joined 9 Jan 2015
Excellent tip, but if that doesn't work, it might be because the application is maximised (the Move option is then greyed out).
Practice on an application you can see on screen, but alt-space then afterwards an r will 'restore' the application to non-maximised. Then do alt-space and m etc as above.
A dangerous possible use if it does get up and running is as a lie detector?
Would it be any more reliable than the ones which have been debunked over the years as actually being stress detectors? The BS artists and fantasists can breeze through those?
I promise to think the truth, the whole truth and nothing but the truth...?
Don't get your hopes, up - nothing salacious! Can't remember if I have posted this before, but a woman who works at the same company as me was emailing her husband (who has same name as me) and her system picked up my internal address instead of his external one the first time and kept reusing it as default autosuggest.
First email I got was because she had booked return train tickets with the source destination the wrong way round and asking what could she do? I helpfully sent her the website link of the train company page where tickets can be adjusted if you have the right traveller info, thinking it was someone just asking for help. When she then wanted ME to change the tickets for her, I realised the mixup and set her right - she was most apologetic.
A few weeks later I got got an email suggesting a BBQ that weekend? I politely turned it down as I was in another city and that her husband might get jealous? She replied that she had realised her mistake as soon as she hit send and apologised again.
Another few weeks later, she emailed me to say she was going home sick as she had an upset stomach. I told her I was sorry she was not feeling well and that maybe the food at the BBQ may not have been cooked properly?
She was even more mortified by that exchange - I then pointed out that when Outlook (which is what we use at work) starts suggesting an entry, a little cross will appear at the far right of that line. Click that cross and Outlook won't suggest that one again until you have typed it in full again. Haven't had another email from her since, hopefully because the suggestion worked but maybe the stomach upset was more serious than we both thought?
The first one only lasted a few seconds because I got too excited and said "I've been waiting ages for one of these calls", when my other half handed me the phone saying it was someone from Openreach. Click... Doh!
I think they are on a timer because the next two hung up at 20 minutes, almost to the second, having made no meaningful progress. I've never been brave enough to let them actually get in to my network, just wasted their time by pretending to be doing things which take time. I know enough to know you have to be pretty good to be totally safe when letting someone run arbitary code. I haven't set up a VM on an isolated network segment yet, maybe when I retire I'll investigate some best practice disposable setups.
I just keep polite and misunderstand what they are saying or take it too literally:
Them - "Can you go to a device which you use to access the internet?"
Me - "Yes, no problem."
Them "What does it show on the screen?"
Me -"It's all black"
Them - "What do you mean"
Me - "It isn't switched on"
Them - "Switch it on please" (this is when you can both hear them get interested that they have someone compliant and also frustrated because they realise it will take a while).
Them - "What does it show on the screen?"
Me - "The news"
After a few more questions I give away that it is the TV, which I use to access the Internet to watch Netflix. Then I suggest I use a laptop?
Them - "What does it show?"
Me - "It's black - it's not switched on" (this is where the real frustration starts to creep in to their voice)
It takes ages to boot
I then pretend to try the websites like teamviewer which they want me to open. They all fail with a blocked content message. I then helpfully suggest that it might be due to it being my work laptop which I've been told has a lot of security 'stuff' on it, should I use my personal one?
I then do the "What does it show?" & "Black, it isn't switched on" and long time to boot loop again.
I'm not sure what happens next as that has been the 20 minute limit where they just hang up. I assume they just give up and move on to the next attempt on their robocaller, but as long as I am not doing anything important, wasting their time gives me a little bit of pleasure.
I think giving them a bit of an adrenaline rush by allowing them to vent their anger is wrong - just keep them frustrated and depressed about how slow and thick these westerners can be (they have all had Indian accents, though the two I strung along were called Dave & Alex). They probably get paid by results, wasting their time will cause them stress, allowing them to vent will release it? Play the long game - give them ulcers or other stress related conditions!
I have a similar keyboard to the one reviewed, branded TECKNET. The keys have translucent inserts for the characters - the led lights shine through them.
The leds are the only bugbear on the keyboard. Who in their right mind wants flashing or strobing keyboards? When the key is accidently pressed to select a different lighting style (the ScrLK button), it takes 8 more presses to get back to the 'constantly on' option. Which I invariably overshoot because it has p'd me off and I'm bashing it :-)
I caught my 6-yr old son trying to log in to my system a few years back.
He was typing in a row of asterisks, because he thought that was what I was typing.
Can't trust anyone.
I have explained to him now he has his own setup how to create memorable passwords which are hard to crack.
Is that by number of boxes, capacity or cost?
Lots of wiggle/weasel room there - they could maybe get half the infrastructure from Huawei for 35% of the total cost?
Or install small non-Huawei kit in lots of locations with small capacity needs and then get beefier Huawei kit where it will actually be more cost effective in busier locations?
Bad targets drive bad behaviours?
...allowing them if the adverts can only be seen by people actually inside an enclosed phone booth? That would stop everyone else getting distracted by them?
The companies probably wouldn't want to deploy them with that condition though, which would prove they are just trying to get around the regs.
As well as maybe being able to pretend to be the original device, this would also be a denial of service - that original sim will stop working and the real IOT traffic which should be transferred will now either be lost or stuck?
Not an expert on this type of thing, but can that sim be brought back online with the original details or will someone have to physically put another one in? The second will be a major PITA, but the first could result in a tug-of-war, unless extra security is put in place? Plus what's the betting that the attacker would be the one to ask for extra security and the original owner then won't be able to get it back?
I think police are already allowed to take finger prints forcibly?
Are they then allowed to make gummy fingers from those images to attempt to unlock phones?
Obviously there are time limits involved, but just curious if they did get evidence via that method if it would be admissible?
...once identified as bogus, why not just black hole them so that nobody ever sees the content those accounts produce?
Maybe that way the scammers are less likely to move on to new accounts with a window of opportunity to rip off people before they get banned and they can also be used as a kind of honey pot (content on those accounts is highly dubious so that content being posted on another account is also more likely to be dodgy too)?
Or maybe they only ever use the accounts for a few hours anyway - based on the numbers, there has got to be some kind of automation in use there for sure? Why not have a grace period after creation of an account where certain functions are not allowed or throttled. A proper business can wait a day or two to get their new name up and running before they pump out dozens of tweets/posts/blogs - scammers might actually get affected?
There would be the added benefit of being able to track accounts which search for the content to check it is actually there - or do scammers not have test teams?
Will they be able to test what happens if someone paints a curving central road line up to a painted-on tunnel entrance on a brick wall?
The correct result should be that Road Runners can pass straight through the wall, but coyotes must either be splatted against the bricks or be run over by a truck coming through the fake tunnel.
I did some work once in a big data centre with a 30 second warning before 10 tons of CO2 would be released.
We were told if the alarm went off, don't walk to the exit - run as fast as you can, if the underfloor CO2 horns started blasting out the gas, the floor will resemble a Raiders of the Lost Ark scene, with tiles lifting up.
Luckily I was with someone when the lights on one end wall started flashing and a bell rang - it was just to let the site engineer know his desk phone was ringing in his office outside the hall.
"I do like YYYY MM DD HH MM SS. "
We had a bug in a script which did a very similar thing to what you did (and a very easy mistake for humans to make) - the log file showed all updates at 7 minutes past the hour, none for any other minute.
It was July - We needed to use MI instead of MM for the minutes mask :-)
or at the least the building blocks for them are all starting to come together?
Add this to the Slaughterbots (https://autonomousweapons.org/slaughterbots/) and they will know just which wall to blow a hole in to get to us :-(
They aren't real yet in case anyone gets immediately worried. Maybe we all need to practice crawling around on all fours like a bobcat so the AIs will ignore us?
1. The machine learning algorithm gets trained using an existing set of known styles of video.
2. Deploy to live and start rejecting new videos which match criteria (I assume maybe the accounts also get flagged as potential producers of dodgy material and get suspended, rather than having special forces sent to where the user is logged on?).
3. Dodgy uploader uploads their latest video using fresh account.
4. Dodgy uploader gets told their video has been rejected.
5. Dodgy uploader contacts their film director/editor to tell them their latest style has been compromised.
6. Dodgy director/editor moves on to a new style, and gives video to uploader. Go to 3
7. When a human sees an example of new style, reports it. Goto 1
8. So eventually, based on the above rules, we will have every publishing/film style ever used by these people? Black & White silent movies, French New Wave, Manga, etc. etc. and then they will have to give up? Is that the theory? Looking forward to their version of Carry on up the Khyber btw.
They could get their data back from backups without any loss. The meets the Recovery Point Objective.
They couldn't get it back in time to continue normal operation though. So was their Recovery Time Objective wrong (of course everyone can wait a week, I don't want to pay extra to get it back in 2 hours!) or was the recovery procedure unable to meet the RTO? Which if it is a supplier could result in a claim?
That was my first thought but then I realised that now those people no longer have their hint accessible - if they forget the password they are bu99ered?
Wouldn't it have been better to prompt for a new hint next time they used the machine as it was wiping the old one - at the point the user has just successfully entered the password?
Don't forget that they will want to know your telephone number and will probably be able to read the messages sent to it even if you left it at home and so can access any 2FA code to get access to the sites that they want?
Same with emails.
The securefobs will need a bit more work - like an arrangement with the manufacturers to have a method of reproducing the required code by detailing the serial number of the keyfob? If you leave that at home then you might be slightly better off.
When we move to iris scans, we will probably have to send them an eyeball!
http://www.computerweekly.com/news/450303913/Insurance-brokers-count-cost-of-lost-business-as-SSP-SaaS-platform-outage-enters-second-week
That one was originally said to have been caused by a power problem, but it went on for ages.
Is the HP kit or Support an issue or is it because there are so many of them about that there is more chance of a high profile story cropping up? Bit like when a 'self-driving' electric car has a problem it seems to be more often than not a Tesla?
I remember in the days of CRT monitors when someone had their screen replaced because the picture used to wobble.
The new one started to do the same after a short time - they had put their electric fan back next to it again after moving it away for a while when the replacement was put in.
Doh!
Yes - was my first thought: why 20 minutes? Is there an equivalent set of words that will deliver all the building blocks? Bit like The quick brown fox jumped over the lazy log uses all the letters in an alphabet for typing practice. If yes, how easy to social engineer a few phrases to get that minimum number out?