In Virginia ... the DMV ... is the absolute worst of anywhere I have lived or visited across four continents and dozens of countries.
Sorry, but some slight editing was in order to make the statement a bit more clear.
2477 posts • joined 31 May 2011
"At no point does any authorisation the user is in control of happen, and there's no way to revoke it."
Use a router to block traffic from Spotify to your
speaker home network. This will have the happy side effect of forcing you to move on to a more responsibly run service. Two birds, one stone.
...I am 100% for every single terrorist act that's foiled but not at the expense of my own security and privacy.
Likewise. I do not want to be terrorized by anyone or any group, foreign or domestic, government or private. Rights are not a one-or-the-other affair. The loss of any is to be feared.
In asia the masks are there to protecting others, not the wearer.
Pretty sure that is how it works everywhere. The US CDC recommends masks for patients to prevent their spreading the disease and also lays out when they should and shouldn't be worn by healthcare workers, et cetera.
Haven't they closed shop to protect the unwashed covidiots from themselves and the rest of us from them? According to its site, "Trump International Hotel Washington, D.C. remains open for our guests due to its designation as an essential business. The safety of our guests and employees remains our top priority... By order of the Mayor of Washington, D.C., Trump International Hotel Washington, D.C. has temporarily closed our restaurants, spa, and fitness center. In-Room Dining will remain open during this time."
To be fair, hotels are essentially dual use in that they can be used for purely recreational purposes but also are important for people caught out of pocket by this pandemic and for those who have a legitimate and essential role to play and are forced to travel because of it. There are a varied classifications of hotels by different governments; it's a bit confusing for all involved, I think.
I, like everyone else on here I am sure, had a few suggestions...
C is for Chthonian
E is for Eye
G is for Cough
H is also for Cough
J is for Ianto
L is for ... Nope. Can't do better than that.
M is for Mancy
P is for Phthalic
Q is for Queue
R is for Febuary
S is for Semicolon (at least it isn't a complete colon)
U is for Guilty
V is for VVhat
W is for Wrong
The contract I work under is being subsumed by one held by the parent agency for the one I support. We've shifted to as much of a remote work model as we can (rotating shifts of who is allowed on site, reduced hours on site) to the point where the place is a figurative ghost town, and we are still moving forward with the change in leadership. I might not meet my new overlords for months while working in a sector that still requires continuous on-site support. It's the new normal I guess.
It can be hoped, however, that people will have learned to properly wash their hands.
This flies in the face of your other observations, unfortunately. It's remarkably difficult to get the majority of people to do this, even at the risk of endangering themselves and everyone they come in contact with.
When you find yourself in a bind and someone comes along to dig you out, you're supposed to gain experience and learn how not to get yourself in such a situation again.
It may be what he learned was that if he called the number and talked to this individual, his problem would be solved. Besides, you seem to be asking a lot of someone whose job description seems to have been "Open this spreadsheet".
A number of businesses I have dealt with recently require you to submit your resume/CV through a web form often with an option to drag a document into it and let the site parse out everything for you. While this does present some surface area to attack, it is nowhere near as bad as the send email attachment route.
Hardware tokens and phone have a cost. Tokens may cost less, but people have to carry (all of) them around, and if they forget it they can't work. ... Sure, they strengthen security but not all companies and users are still ready to pay the price...
Most companies, when able to do a cost-benefits analysis with realist information concerning costs of implementation vs cost of breaches opt to pay the lesser of the two. This is typically cost of implementation.
In an incredibly prescient imaginary scenario, participants were asked to assist in the control of a disease outbreak in a landlocked country.
Unfortunately, there is nothing incredible about this. Scenarios of this nature are used because this exact sort of thing happened in the past and had catastrophic results.
...is the firm surely both ... things, ..... a patent troll farm and a beanfeast for IP lawyers?
Well spotted! My first thought when I read that was what were they in addition to those things? Schemers and scammers? I wonder if they would consider changing their corporate name to "Dewey, Cheatem & Howe"... or perhaps that is already claimed by Apple's patent team.
I'd rather have Inspector Clouseau guarding my Linux servers.
I can just hear his voice...
Clouseau: Could you sudo and run these Microsoft tools on your server?
Clouseau: Well then, what are you waiting for?
PFY: This is not my server.
Mine comes with a slightly foxed fedora.
...it remains to be seen whether Samsung's definition of "small number" is the same as that of the rest of the world.
Perhaps the original phrase was in terms of percent rather than overall numbers. 10% of their customer base is a significant but not large relative amount, but quite large in absolute terms considering the number of folks buying from them.
May not be a case of setting things up this way from day one as industrial systems of this nature often predate the widespread internet connectivity of most business networks of today. Once it became possible to monitor and control remotely, people did it for ease of use and accessibility without thinking through any security considerations. After that, it becomes a case of budget and not properly understanding the risks involved. Doctor Syntax's point illustrates this; the risk analysis was probably based on incorrect costs and likelihood of such an event. Once the actual information was made horribly clear, funds are made available because there is no way to avoid the knowledge.
Intel-owned McAfee has considered an IPO and a tie-up with NortonLifeLock...
McAfee split up with Intel after a few years of (corporate) wedded bliss and has been an independent company since April, 2017. Intel still owns 49% of its stock, so it maintains some control over it, but that's not the same as falling under the same corporate governance. It is interesting that other articles give the same attribution (e.g. https://www.marketwatch.com/story/nortonlifelock-approached-by-intels-mcafee-and-private-equity-firms-2019-12-09).
My experience with Google products in government contracting is that they are capable of meeting the contract requirements on a technical level, but they are completely unusable in implementation. We were forced to use Google Office products in place of MS Office on one contract I had the misadventure to work and it was painful on a number of levels. I do not know about cloud services as it is outside my area of expertise, but that has certainly colored my view of all things coming out of the Chocolate Factory.
And that will still rely on the end users keeping their phone secure, not just anti-malware, but physically secure, with a proper unlock passcode\pattern.
Exactly! Running voting through an app introduces at least one more point of failure. This is the opposite of securing things.
By the way, some sites I read suggest that once you are selected/accepted as a member of the Grand Jury, you could be in court a couple of days a week for up to two years! Is that (a) true and if so, (b) nationally or only in some states?
Grand juries are used at various levels of the US justice system (federal, state, county, municipality). The one on which I served was at the county level. We came in one day each month for three months. We only considered felonies unless there were misdemeanors also associated with a given case. I cannot speak to other jurisdictions' rules, but I am sure there is variation among them. I should also mention that the proceedings were nothing like I have seen depicted in popular media, but that is probably not a surprise to most.
I similarly was going to point out that is not how a grand jury works and provide a link to any who actually wanted more details:
Having performed my civic duty in serving on one, I can say the experience I had was various officers of the state (police, fire marshal, etc) presented evidence and asked permission to proceed with an indictment. It is intended to be a check on the state by its citizens. While we allowed most cases to proceed, we did not do so for all. I fail to see what is bizarre about this concept.
...just how hard WOULD it be for AWS containers to be made 'secure' by default, so that the devs would really have to balls it up to leave them open.
They pretty much are. It takes someone opening them up for this sort of thing to happen. It's more a case of the devs being too lazy or incompetent to provide access properly, instead opting for the Allow-Any approach to security because of ease. The open access also may have been meant as a temporary measure for while the containers were being set up but someone forgot to close the intentionally opened hole.
As the AC noted, language changes. The admittedly few lexicographers I have spoken with take a descriptive rather than prescriptive approach to language. As far as the word of the moment, the first use of "attendee" predates most folks' time on this Earth (first recorded ca. 1935), so it seems a bit late to protest.
Biting the hand that feeds IT © 1998–2020