IKEv1 Vulnerability
Does it come with a free set of Allen keys?
/coat
2039 publicly visible posts • joined 25 Feb 2011
> "What utter bollocks! This is the utterly moronic shit as, "If you don't want to get raped, don't wear a short skirt."!"
Quick, harness that anti-victim blaming rage and direct your bile towards the car park owners, not to mention the police and motoring associations who support them, for putting up the "Lock it or lose it" signs telling people to lock their vehicles and take all valuables with them if they want to keep them.
> "LOL
This is Australia, we take 'sickies' for this type of lark."
And we often put more work into chucking the sickie, than we would have put into work had we attended.
Best I've done is start the prep work for the sickie a week and a half before the day I wanted to take off.
You have admitted, in public, that an El Reg staffer managed to fondle the latest iShiney well before the majority of iZombies.
I fully expect Apple will be trawling through the security footage, printing out your mugshot, and pasting them through every store in Oz, with the caption "Do not serve this man, call security/police immediately to have him removed for blasphemy".
Sticking your fingers in your ears and going "LALALALALALALALALALALALALA" is not ongoing dialogue.
Industry experts, technicians, sysadmins, mathematicians, physicists and other learned folk have repeatedly told you that IT IS NOT POSSIBLE to create secure back doors.
Remember how the TSA were the only ones who were supposed to have the master keys to the TSA-approved luggage locks? And what happened with that?
How about Microsoft's "Secure Boot"? What happened to that?
Even if everyone involved in the whole backdoor shenanigans somehow manage to keep schtum and not leak the details of the backdoor, just remember one thing.
Whatever you can make, I (or anyone with sufficient time, curiosity and skill) can reverse engineer.
> Though characterised in press reports as another "Great Firewall," the project appears to be almost entirely focused on catching cyber attacks, rather than gathering intelligence or censoring content.
And given the way Ms May is going, how long before it morphs from protection against cyber attacks, to "protection from the rest of the world, and yourself."?
All hail the Glorious Leader of the DPRUK
> "Notice that football (even in America) doesn't force a winning result in a league structure."
The emotionally stunted players and fans of Rugby League in Australia demanded a "golden point" system (first to score the next point of any sort) to deal with draws in the NRL.
No other sport in Oz does that to my knowledge, as the rest of the sports players and fans have more that enough neurons to understand that sometimes teams can be equally good or equally shite.
Apart from the obvious question raised above about data transfer, what is your answer to the question of "how to control the air gapped system"?
I'm sure all of these "incompetant" sysadmins leave old PS2 keyboards and mice permanently connected to the machines in question.
In case you weren't aware, unplugging and replugging PS2 devices whilst the machine is operational has a decent chance of blowing out the PS2 port.
So it's either leave old hardware permanently connected, or use USB.
> "My assumption is that Linkedin have got permission by some means to search their contacts and then spam anyone who is in the list but not already a victim/member of Linkedin."
BWAHAHAHAHAHAHAHAHA. You thought LinkedIn asked for permission before slurping your contacts.
It was the reason why I deleted my account years ago. Accidentally clicked on a link in an email they sent me instead of right-click -> copy link location.
Next thing I know, I've logged in, and every single one of my email contacts comes up with LinkedIn asking me if I wanted to ask them to connect with me.
Fuck'em. Fuck'em right in the ear.