Previously?
So is this a different breach to the one they disclosed on September 15th?
https://justice.oregon.gov/consumer/DataBreach/Home/GetBreach/905485622
645 publicly visible posts • joined 21 Aug 2009
So is this a different breach to the one they disclosed on September 15th?
https://justice.oregon.gov/consumer/DataBreach/Home/GetBreach/905485622
The early 1900 series computers had (possibly germanium) transistor memory and nil cores, and they were obsolete by the mid to late 70s (despite the ravings of people who used them).
In 1987 Computer Weekly ran a "Win-A-Computer" competition for schools. The entry I was involved in didn't come first, but as a "consolation" prize, an (IIRC) bakery company who was disposing of their ICT 1902T offered it to our school. It was the time of my "A" levels (the award ceremony was the day of my Physics exam), so I never saw it arrive at the start of the next term, but my brother did. It was never got to work properly, and when my brother left he took the core store box with him. It's now with The National Museum of Computing.
I was visiting a government establishment that had problems with its PDP-11 (yes, that long ago).
It was the sort of place where they had two different colours of line printer paper - one for secure state, and one for when they had visitors, and all the secure printout had to be locked away before we were allowed in.
We read in the memory diagnostics paper tape and ran it. It was unclear whether it was a memory board problem or the backplane, so we turned the computer off, unplugged the memory board, moved it to a different slot, turned the computer back on, toggled in the load address on the front panel and ran the diagnostics again. At this point one of the locals asked why we hadn't re-loaded the paper tape. "It's core store" we answered "non volatile". At which point panic took hold. "You mean that the top secret contents of memory don't get lost when we power off?"
We went away with after giving them the instruction that could be toggled in to wipe memory ("MOV -(PC) -(PC)" IIRC) and leaving them to re-write their procedures without making it too obvious that they had previously had a gaping hole in them.
Yesterday one of my cow-orkers was running vimdiff inside screen over ssh when it "hung". I went over, first tried ^L (as you do), but that didn't help. ^Q did, however. I then had to explain XON / XOFF. Coincidentally I'm just reading ESR's Things Every Hacker Once Knew.
It's not quite as simple as that. At one place from which I connect to my VPN, packet loss on the VPN at peak times is far greater than packet loss going directly. Seems to be some sort of deep packet inspection attempting to throttle torrents / Tor / streaming, but it makes trying to read my e-mail when I can't get into work because of the recent train strikes almost impossible.
It would be easy for an ISP to whitelist bandwidth measurement services and claim that everything is fine, whilst still providing a very poor service.
The Chinese blew apart a satellite back in 2007, but creating a greater number of objects runs the risk of the runaway Kessler syndrome
But Vangelis got there first: Albedo 0.39
Years ago the ICO were absolutely useless - reports of abuse disappeared into a black hole.
These days, they want to give the impression that they are trying harder. They are at Glasgow Central Station today giving advice on Nuisance Calls.
Surely if both victim and thief have Enom accounts, you just use the same trick to steal the domain back again?
Step 5 of the M group's advisory (linked to in the original article):
(optional) Immediately transfer the domain elsewhere by changing the IPS tag and registrant email address making the domain extremely difficult if not impossible to recover without a manual intervention
El Reg still puts out the overhead I believe
Indeed. Lester Haines too. I just hope the FF extension keeps on working with Multiprocess and WebExtensions
He's the polar opposite of Stephen Donaldson who is also a hilarious fantasy writer but much less deliberately so
Two words: "Clench Racing"
I think there's something missing there: steamroller named Lord Jericho
Our Copyfish extension was stolen and adware-infested
Exactly the same. Phishing attack, credentials compromised, "Copyfish was updated to V2.8.5", "started to insert ads/spam into websites"
but no vest (waistcoat). That would make an excellent addition to the kickstarter.
http://www.smithsonianmag.com/history/gene-kranzs-apollo-vest-9045125/
but frankly the current news cycle is (Neocon) Delirium Brief enough for me
Charlie had to re-write it: "BREXIT broke my next Laundry novel"
On a very slightly related note, Charlie Stross's "The Delirium Brief" came out yesterday, and mentions The Register within the first couple of chapters.
An 875bhp Peugeot 208 would be a little more exciting
To bring this thread back onto a computing topic:
The Mount Washington cog railway in New Hampshire climbs from 2000 ft ASL almost to 6280 feet
There's a Cog Railway up Pikes peak: 14,115 ft (4302m)
https://docs.oracle.com/cd/B28359_01/server.111/b28310/tables011.htm
The recycle bin is actually a data dictionary table containing information about dropped objects. Dropped tables and any associated objects such as indexes, constraints, nested tables, and the likes are not removed and still occupy space. They continue to count against user space quotas, until specifically purged from the recycle bin or the unlikely situation where they must be purged by the database because of tablespace space constraints.
https://twitter.com/troyhunt/status/879289823835639810
A follower just advised they recently notified @TheAA_UK about 13GB of exposed DB backups. It's not clear if they ever notified customers.
https://twitter.com/troyhunt/status/879323722963968001
https://twitter.com/TheAA_Help/status/879334595828883456
This incident was related to the AA shop & retailers’ orders rather than sensitive info. It was rectified and taken seriously.
Charlie Stross:A Colder War
"The Convair B-39 Peacemaker is the most formidable weapon in our Strategic Air Command's arsenal for peace. Powered by eight nuclear-heated Pratt and Whitney NP-4051 turbojets, it circles endlessly above the Arctic ice cap, waiting for the call.
lander rotated at a faster acceleration than expected
Some similarities to the Ariane 5 Explosion, where an accelerometer value in a 64 bit floating point value overflowed when converted to a 16 bit signed integer.