Doesn't he look.....
....like Dave Gorman!
4302 publicly visible posts • joined 14 Jun 2007
Yaffo (Jaffa) is an Arab dominated part of Tel Aviv which contains a thriving Muslim community complete with Mosques, and calls to prayer etc.
Most Israeli-Jews and Israeli-Arabs life peacefully side-by-side.
It tends to be those (on either side) that quote religious dogma as if it means anything that are usually the ones intolerant of the others.
I stayed in Tel Aviv for 3 months, with my Israeli Jewish girlfriend, and her opinion (and her peers) matched yours.
As with all situations though, it's the fanatics (on any side) that shout the loudest and get reported by the media the most.
How the hell is it tolerated at the government level. How do they get away with it.
They have the backing of the US because of the strong influencial Jewish vote in America.
Israel are in conflict of UN resolutions - The US (and UK) have attacked other countries with a much weaker mandate
Asher, you know full well that there are many Israeli-Arabs living in Israel without becoming terrorists.
At the same time, how would you feel if your land was invaded, house bulldozed, and the invading force kept building settlements on your land?
Finally! Someone says it!
Hard disks are quieter and faster now, but that's the only thing that has somewhat hidden the fact that the MS OS still makes the hard disk thrash like hell for no real reason.
I recently used windows 7, after a windows break of nearly 3 years, and couldn't believe they have the same crappy IO and memory/swapping routines that they always had.
Now that Microsoft bigwigs have realised that cramming their desktop operating system into a touchscreen tablet format was unwiseNo they haven't. The problem was that they crammed a mobile platform onto the desktop and expected people to embrace it. You're now twisting the events around.
It's not twisting the events at all. They *did* cram their desktop OS into a mobile format. Your response is more or less saying the same thing, in that I think you are saying they crammed a mobile format onto the desktop OS
Not true. NAT and DHCP are relatively new to the internet. Before them, every system had a static IP address, even if it was not permanently connected.
On dialup/broadband, changing your IP would cause your service to stop working.
On fixed networks, you could only change your IP to an unused one that falls within the range allocated to your lan.
Unless your computer is connected directly to the ISP via ethernet, its network card MAC never leaves the house. (And if you do connect via ethernet, it has to be 'native' and not some PPPoE setup)
Even if you don't use any sort of wan facing nat/router modem, if you connect via ADSL or via cable, your outgoing connections will not use your pc MAC. The 'virtual interface' created to tunnel the connection may have a 'virtual MAC' but that's not the same. In the case of cable, the cable modem will have its own MAC which is what some cable-isps use to authenticate you.
TL;DR: Even if you don't use a NAT router/modem your computers MAC address is never likely to be 'leaked' anywhere unless on (say) a corporate network or maybe a student/university network. So MAC tracing for home users is a silly thing to think useful - and that's even before you get into how easy it is to spoof MAC
"We define hospital zones basically as places where the natural formation of liquid water is possible,"
Well, I'm currently in hospital(*), tucked up in bed, and do have a large jar of water on the table beside me. I guess it originally formed naturally, though I think it came from a tap"
Nurse!
* Yes, I'm allowed to use 3G here.
There are far more transmitters than that. I know, because the cheapy radio clock I bought from a market stall syncs with the germany signal, although I'm in the UK, so it's an hour fast :(
http://en.wikipedia.org/wiki/Radio_clock#List_of_radio_time_signal_stations
"An attacker therefore just has to wait for a valid user to authenticate before hijacking the machinery by firing his or her own commands at the open TCP port."
Firstly, this implies a stateless mode of operation - else surely the box would drop the serial link / require re-authentication on a continuous tcp connection being dropped (as would happen if a bogus command was received from elsewhere)... So.... WHY????
Secondly, connected to the internet? WHY????