Cuban officials blame the US
The difference between them and everyone else is that they were doing it before Snowden.
2583 publicly visible posts • joined 31 May 2011
Don't be too hard on people who make mistakes! We all do because English is tough stuff.
I was thinking more along the lines of military applications. Mimicking nature would help blend in more than something that looks obviously man made. I think it is cool to take a natural form as inspiration, but the solution that DropBear linked to would seem to be more practical if the goal was simply to go from land to air.
What ever happened to the PSAs on (US) TV; or the after-school specials?
This would be really nice to see. Perhaps we could start a petition of Disney-ABC to bring back School House Rock. There was, after all, a series of Computer Rock songs as a part of it that addressed basics like hardware and software, and number crunching. Suggested new titles could range from "Malware Blues" to "Fishy Phishing." My favorite would be "What Do We Do With a Spammer?" Fun for the entire family.
Ahhh! Now I have the lyrics of these non-existent songs stuck in my head!
This needs to have an apparatus tied to it that ends in a ruler. Every time the user tries to click on a suspect link, WHACK! right on the knuckles. Same with spam. Revenues for these kinds of scams would dry up overnight, malware would be drastically reduced, and network traffic would drop to 1980's levels. Well, maybe two out of three...
Then go check out Lair of the White Worm. You should love it. I know I sure didn't. It's got bad acting despite having some decent actors which I suppose indicates bad direction; bad dialog; and really, really bad special effects. It ranks right down there with almost everything The Cruiser* made.
*Tom Cruise
The remaining regions haven't been light enough to snap since Rosetta arrived last year.
Perhaps they should have paid extra for the camera with the built-in flash. Yes, I know, weight constraints and all that, but everyone knows from Hollywood that pretty pictures trump real science and engineering every day.
So this is essentially a one time streaming service based on a real-time scan and print of the product, right? Of course, no-one has ever figured out how to capture a stream. Leaving aside the issue of transcription and transmission errors, both fairly serious in this context, it seems like a lot of effort wasted on something that could be handled by current tech. After all, if the person on the other end is going to steal it, you will be handing them the only copy in existence. On the other hand, if the issue is with the person sending the widget, they will have physical possession of it before the start and will be able to do whatever they want before it is sent. Better to have the recipient sign a non-disclosure clause or license as they will be a lot easier to enforce than preventing unauthorized copying with this tech. This is a gimmick in search of a use.
...cleared out all the space around the object of smaller objects (fail).
I think that's a pretty sad classification as defining something like a planet in terms of things in its environment like this doesn't seem to work very well. Cleared surrounding space of smaller objects? For what distance? For what period of time? What about moons? Rings? Is orbiting a star a requirement? If we introduce a bunch of asteroids in a planet's orbital path through some cosmic event, would the planet get kicked out of the the big planet's club until it cleaned up its act?
It's a stupid, made-up controversy!
Stars are classified based on their physical characteristics (spectral make up, size, et cetera). If we are going to say that Pluto is a dwarf planet and call it that, why persist in calling both Mercury and Jupiter simply by the name planet? They are sufficiently different enough to merit separate classifications, too.
I listened to several interviews with doctors concerning this subject. One of the more interesting points they made was that what these devices do very well is generate data, which really doesn't help the physician diagnose what ails their patients. The phrase "drowning in data" comes to mind.
"<pedant mode> Surely keeping the alligator there was the offence; the alligator is not a person that can be prosecuted."
Oddly enough, due to the much-abused law allowing the seizure of assets purported to be used in a crime, there are quite a few cases in the US that have names along the lines of US Government v a huge pile of cash.
As opposed to that minor back road, I-20? As far as your explanation being the only explanation, not really. Yes, I am sure that local and state police forces get tips from the feds, but I doubt every drug bust flows down from information gathered outside their respective departments (legal or otherwise).
It does no validation or signing of firmware updates, no secure boot, no cellular authentication, no secure communications or encryption, no data execution prevention or attack mitigation technologies ... basically it uses no security technologies whatsoever.
Best. Review. Ever. There is nothing I can add to that. It is simply perfect.
You could just as well stand behind a person with a phone and use a device to convert your voice to extremely high pitched sounds with the person you are talking to similarly lurking on the other end of the line with a decoder. It would be similarly practical but way more cool. It wouldn't even require a jailbroken phone.
From the original quoted article: The Turkish PM described the protesters as "extremists" who were attending "organised" events led by the country's main opposition, the Republican People's Party, known as the CHP. In his world, society is best served by a single party with him in charge and no opportunity to voice disagreement of any sort. I can think of few, presumably including Mr Erdogan, who would want to be on the receiving end of that government. I certainly would not.
I can for certain tell you that those outrageously blatant copied cars have no superior features, except of course, much reduced price.
That might be enough in this context. Consider the example of the German Panzer versus the American Sherman tank. Sure, the Panzers were better, but the US produced Shermans at a rate of somewhere around 8 to 1. Additionally, knowing the capabilities of your opponents in a conflict makes planning a lot easier. That's one of the many reasons military tech tends to be classified.
It's not water soluble at all. All water does is spread it around.
Water can in fact be useful. Take about a half-mouthful of ice water into your mouth and let it sit on your tongue for a short while and then spit. Do not swish it around! This will allow a good portion of the oils that are burning your mouth-hole to float off. Follow that up with a rinse of the above listed dairy products and life will improve somewhat.
Shax, don't let it get you down. You can do it, no matter what the ER doctor said!
What would you suggest? The company fires everybody not directly involved in security - since any spending on anything other than security is obviously not "doing all they can"
I would suggest using insurance as it is meant to be. Companies should fall back on it after having done everything they reasonably could to prevent the loss and things still went south. It should not be an either-or choice between prevention and insurance.
There's some unanswered questions in this...
Isn't that one of the hallmarks of good science? Mark 85, while I realize you were simply asking for data which should presumably be included in the published article, at least in aggregate, more pertinent questions would expand on the researchers' conclusion that it is possible to manipulate memories as described. Under what circumstances? To what extent? By whom?
University students are the human equivalent of white rats. As many schools have participation requirements, a lot of research gets done using them as subjects.
If Sony were JPMorganChase or another large financial institution... those assets [would have been] squirrelled away deep within digital vaults, air-gapped against any possible network intrusion, access strictly limited on a need-to-use basis.
Not so much. Not to comment on JPMorgan Chase's recent hack attack, but the norm seems to be to devote effort to equine retention after the team has left. The only good thing about the recent spate of hacks has been that they are getting media coverage. I am convinced that the frequency with which they occur in all sectors is much the same as it has been in the past. I have hope, however, that the additional attention the issue is getting will induce otherwise reluctant management to devote resources to mitigating risk rather than to damage control.
Instead of creating an ineffective dragnet on all air passengers, security authorities should have been exchanging the data they already had on these suspects.
Rather than back off, I have heard calls to double down in order to create an effective dragnet. Surveillance is manpower-intensive, so obviously more money is needed in the budget in order to have more people pouring over the information gathered on everyone... I think we can figure out why this might not be a good plan.
The instant someone figures out how to assemble the parts to do something it wasn't intended to do, more easily and cheaper than the 'proper' paid for solution, it's toast!
I would think rather the opposite, especially if it becomes becomes a hit for the competitors of the dominant phone services.
That also cuts down on bandwidth, and at this far out, the best data speed possible is about 700 bits per second.
It has struck me that the issue of phoning home almost always is mentioned in articles of this nature. I know it is not as interesting to talk about as beautiful pics sent from far-off worlds, but if we are going to explore, colonize, or make use of the resources elsewhere in the solar system, shouldn't we be at least thinking about putting up some infrastructure? Yes, communication satellites would be expensive with no immediate return, but they would, I hope, have some long term benefits. I found a number of proposed solutions online, but nothing actually being planned. Anybody else?
It took roughly a year to fix the flaws in an exchange he described as "responsible and helpful".
What, no sample exploit code? This stands in stark contrast to the way Google approaches disclosure.
Powershell has changed that somewhat, but it doesn't use telnet - it has its own remote connection methods (called "remoting" IIRC) that create an authenticated secure tunnel to the target machine, more like SSH (except predictably more fiddly and less useful).
PowerShell uses the Windows Remote Management service to manage communication and authentication. One of its benefits is that it provides a single, consistent(ish) framework from which to work as opposed to the collection of third part tools many of us who do a lot of Windows scripting have built up over the years. It is a pain to have to relearn command line scripting, though. As far as your comparison with SSH, your mileage may vary, but I haven't had problems with either.
Here's a link to a decent article concerning PowerShell Remoting.
The device can replace a mouse – waving your finger while wearing the ring can move a pointer on a monitor or heads-up display – and it can be used to write text by drawing letters with your digit.
So, it is basically a wearable stylus, then? It sounds interesting, but not a real game changer. It certainly won't replace a keyboard or keyboards would already be a thing of the past. While non-alphabet languages might do better with something like this, I cannot imagine this would speed up input for someone in comparison. Better speech recognition might.
Now, if it could give us the giant holographic screens that magically interpret the motions of users based on intent that we see in so many Hollywood-style works, then we would be cooking with gas.
PSEXEC requires you know the password of the user you intend to impersonate, as do many other Windows commands (i.e. Run As), or to have rights to run as the system account which would still how up in the system log, if only until the default purge. This malware does not, so it is not quite the same thing. As far as creating an account with admin privileges and giving it some hard to detect name or AD container, some of us monitor stuff like that. My guess is the point of this malware is that it can be used to target shops that have a high level of paranoia and security procedures to match. It would be very difficult to track it back to its origin even if its fingerprints were found. It could be used to create a significant amount of chaos in highly secure environments by setting different individuals up as bad actors. It's not that these things cannot be accomplished by other means, it's just that this way will be much more effective.
MS Please stop fucking about radically with the interface and everything will be hunky dory, Desktops are desktops, tablets are tablets, phones are phones...
You dare suggest form should follow function? What's wrong with you?
Microsoft put out an add-on pack for Windows 95 called MS Plus (hmm, sounds like something requiring penicillin to cure). It offered a lot of tweaks for the desktop and people really liked it. Rather than forcing consumers to pick from the one UI they offer, I can't understand why they don't extend the idea of desktop themes to the entire UI, allowing home users to set things up however they want and BOFHs to define every aspect of the UI in corporate environments.
...if, for example, someone deployed a Cryptolocker-based attack against the control system, it would be rendered unusable.
Unless, of course, the systems were redundant and consistently backed up and there was a disaster recovery plan in place and... what am I talking about? If an industrial control system was in a position to be compromised by someone deploying ransomware, none of these things are likely to be in place or set up correctly if they were.
The ability to judge personality gather personal information is an essential component of social living media sites—from day-to-day decisions to long-term plans such as whom to marry, trust, hire, or elect as president what ads you are likely to click on to finding new ways to track and monetize your every move.”
Fixed that for him.
...it's unclear whether or not Obama's proposals will attract the cross-party support needed for them to become law.
It's also unclear that a snowflake might survive in Hell. In fact, I would place my money on the snowflake first. Unfortunately, I don't think anyone from either political party in the US anticipates much in the way of cooperation between the Republicans in congress and the POTUS.
Translated as "normally" your OS isn't obsolete in less than the length of a phone contract.
Simon Harris, thank you for that epiphany! I had not realized that the way my phone company pushed out OS updates was by forcing or enticing customers to upgrade their hardware.
No, I am not being ironic. That is de facto how it seems to work
...they know absolutely nothing about the internet and computers.
<TINFOIL>These sorts of pronouncements strike me as serving the function of smoke screen. That is to say that while various pols are going on about the terrible thing that is widespread use of encryption, there are any number of people working in the back room to break it. Once it has been broken, I would not expect the wailing and gnashing of teeth over enhanced security to stop. I would expect our officials to continue to complain that it gets in the way of doing their jobs protecting the people while they proceed merrily on their way with access to whatever they want.</TINFOIL>
Again, this kind of thing is what happens when the Agency that's ostensibly involved in securing Military and National Government Communications goes over toward mere collection and exploitation and shafts their Information Assurance responsibility.
Essentially a case of "do as I say, not as I do," not that they would be unique in that by any means.
Political arguments concerning redistribution of funds aside (I am not qualified to judge), while the difference was less significant than that between the various Mars missions, this price tag is still less than comparable efforts elsewhere in the world.
Google - whose only attempt at an OS is Android which made all versions of MSDOS and Windows look ultra secure.
Come on now, if you are going to take shots, why pass up the opportunity to beat Chrome OS with a stick? While I appreciate the idea of community pressure making security better, putting out exploit code in this manner is a step beyond unethical. It ranks up there with releasing malware.
"Oh look! We just happen to throw this code together in the lab and haven't gotten round to disposing of it. We're just going to put it here where everyone can see while we turn our backs and let the owner take a crack at fixing it. OK, on the count of 90..." Google, j'accuse!
"We think they are interested in staying under the radar and making money, and not spreading too largely [because] law enforcement may be interested if there is a lot of victims," he said.
What caught my attention was how very organized and effective these black hats seem to be. They don't come across as greedy enough to be conspicuous. They seem to have implemented the idea of continuous improvement and have a good QA approach. In fact, it sounds as though they have it together a lot more than many of my past employers. Alas.
As far as the suggestion that prevention is just a matter of two-factor authentication, did the author not read the part about the targets being smaller porn sites? Not the most likely candidate for this sort of measure based on the size of the site and the reluctance of many of the customer base to leave digital tracks. This, I believe, is a good technical solution that will never be implemented in this case.
...2015 will likely see the emergence of third-party tools... that harden the software by improving its manageability and by filling gaps for the kind of functions business expect.
The report matches up with what I have been reading about Docker (I haven't had the opportunity to play with it yet) in El Reg and elsewhere, that it is new tech with a reasonable amount of thought put into usability and design. It seems to be increasing in use. Unfortunately, because it is used in areas that can be very lucrative if compromised, it will come under increasing scrutiny by black hats. No surprises here as it is predictable. Still, it is interesting tech. I especially appreciate the analysis in the article concerning deploying Docker on top of VMs.