Re: Choices Choices.....
I think that the reason VPN's are so hevily marketed now is for data collection purposes.
103 publicly visible posts • joined 23 Aug 2012
A thumb down ?
How about this then:
<!--[if lt IE 6]>
<link href="css/ie6.css" rel="stylesheet" type="text/css" media="screen" />
<!--[if IE 11]>
<link href="css/ie11.css " rel="stylesheet" type="text/css" media="screen" />
AND A NEW LINE:
<!--[if IE Edge]>
<link href="css/Edge.css " rel="stylesheet" type="text/css" media="screen" />
VM Aware? What do you mean? That they have the ability of executing systeminfo.exe ?
I don't actually know of anybody who obfuscates the fact the OS is running within a VM... I have seen some direct attacks at the likes of VMtools, but none that have been particularly successful.
Could you pass us some CVE details on which ones to look out for ?
I've got one of them grinder jobbies. Add water add beans, Press button coffee comes out. Can use powdered coffee too (it has a 'no grind' button') use it all day then put the bit in the dishwasher.
In practice though I only use it when having a cooked breakfasts and/or guests over - it's nice n all but 2+ cups makes mom's spaghetti and frankly, I quite like the massive tubs of instant I get from Costco. £10 lasts me 2 months!
IMHO unless you take your coffee black, then posh gold (or better still, unpasteurised milk) makes more of a difference than the bean. - or whatever is in them 'pods'
Also what a bloody waste of packaging, even makes HP look ok.
I've thought this too - it may involve bringing some things back to the client side though.(Depending on the game)
Certainly I find it odd that, say an Arma 2 server, can't be configured to easily spot somebody duping / warping / fast travel / messing with loadouts etc... even monitoring cross hair snapping and similar things you look out for when recording footage as an admin about the wield the ban-hammer.
Fingerprints are usernames... they are not passwords....
Something the user KNOWS, something the user HAS and something the user IS.
The user IS the fingerprint, they should HAVE the bank card (and PIN Reader) or an assigned Phone and they should KNOW the password (and PIN)
(OT - I see Barclays app still doesn't work on rooted androids by default)
A bunch of cheap China Cams bought on ebay recently not only had dodgy ActiveX controls (something I am used to - So always initially re-rlash them and configure them within a secured snapshoted VM) but also included P2P firmware which essentially, by default, broadcasts the camera on teh inter webs! (all you need to know is the device ID - which the seller invariably will.
I noticed several IP cams on ebay where the seller is actually asking the buyer NOT to upgrade the firmware!
I use IP cams for rudimentary external security - they are on a separately fire-walled VLAN, do not have internet access and stream to a synology box (via Onvif) which is only accessible externally via VPN.
Do you get compensation every time your electricity blacks out for a few minutes?
-Usually yes. If you ask. EDF user here.
Do you get compensation if your phone goes off for a while?
Everytime. If you ask. BT user here.
Do you get compensation if your milkman doesn't turn up one morning?
--Absolutely - Milk and more user here.
Do you even get compensation if your train is fives minutes late EVERY MORNING FOR A YEAR (and some days doesn't come at all)?
-Yep. Southern rail season cards are discounted due to poor trains regularly. If you ask you get - though I think cut off is 10 minutes.
I wonder if what you are doing wrong is not talking to your providers. It's a market out there, don't you know ?
With regards to SLA lines - I manage several dozen 10mbit upto 1Gb connections and absurdly these are the ones so difficult to get recompense for when they fail. They fail less for sure - but your options for change are mind numbingly difficult. Ever changed fibre provider cheaply have you ? me neither.
Shut up. You are clueless. People have to complain to get stuff, consumers especially. Let them complain. let the complaints sit around for review down the line and let market forces dictate that we all get better everything.
"makes it harder for eavesdroppers to decrypt communications because it never sends the secret session key in full over the network."
Really the main benefit is that the users private key is not used to encrypt the traffic and a unique key is derived per session. So moving forward, each session needs to be uniquely attacked and decrypted, regardless of if you know the private key or not.
5 million extra people in one year is a lot of people.
Guaranteed income for musicians as long as the song is good enough for people to want to listen to it (forever) is quite a nice thing, I would have thought.
Using spotify on a PC, with sonos, on a mobile and in off-line mode in a car or a plane. Creating play lists compatible with any party, dinner date, Saturday night company or just messing around with music is worth £10 / month easily.
What's this article about - and what's the point being made here?
I can't understand why they would have Revenue and Net Income on the same graph.
Revenue, often classed of as core-business ONLY gross income - ie gross income figures restricted to income generated by companies registered description.
Gross Income is income which includes ancillary income, like investments, capital gain and what have you.
Net Income is ALL the companies income after tax.
So to me the chosen axis of this graph is to obfuscate secondary income and deliberately make the net income look less - why ?
"However, none of the others needs management nearly so desperately"
I think the reverse is true. Linux and OSX desperately needs the management capabilities of a windows AD. Just sayin'.
As far as GFI, was a partner for 7 years then moved away as the bloat set in. Their MAX solution and even Viper looks interesting - but I can't stand looking at their websites or interfaces.. or PDF's even.
"Apple don't do untested markets, they wait for profitability to be established first and then barrel in after someone else has made all the initial mistakes (it gives them time to engineer out those obvious mistakes)."
Not being snotty, but could you give me some of these engineering mistakes which Apple improved upon ?
Their design is nice though, and that's point.
They barrelled in (PAST TENSE) with itunes and their appstore - that's what makes them the money - innovation in making money and marketing - not in innovation in products.
I got an iBead (Rio SU30 in Japan) in 2003 and I still use it for the Gym / Cycling / Jogging - it is physically and technically perfect, plug it into your computer to charge, drop the music you want to listen to on it if not already there and sorted. No drivers no fuss. Once battery is dead for MP3 playback FM radio lasts another couple of hours. What Apple did here was jump in and say we need to control the physical and software interface to devices and get 30% of all music that can be played on these devices. To help this we will fund investigation into getting trot of napster and equivalents. Oh, while we are doing it, someone draw a picture of something and give it the the lab in China to make, cheers.
Isn't that exactly what 3Dfx used to do with OpenGL / Quake Benchmarks etc?
Eg: (circa 1999)
TomsHW : Is it correct that drivers can be easily optimised for one application?
3DFX: Yes - that's part of the benchmarking game.
Undoubtedly still goes on, according to Nvidia my GTX 690 seems get between 6% and 20% faster in most games with every driver iteration...
Most users already get a certain 'choice in their devices - dependant mostly on the role they perform.
I resell equipment of all sorts to clients - it's all best of breed with reasoning into warranties, performance, specification, durability and past experience... and because I sell a fair bit I am bitten down on price by the bean counters and chaps in IT at every client.
If I was forced to resell with joe-blogs making the choice, with no formal processes, then - I could see instant $$$ profit.
However, if this then becomes a B2C transaction, giving the new boy in junior app support the right to 'change his mind' in seven days, call me incessantly about why it keeps 'developing tool-bars on internet explorer' and demand a full refund in 11 months because the 'hard drive is slow' - then you can fuck right off. I'm not here to support your users, MR CYOD.
It is very good for a small MSP / inter departmental stuff.
I doubt it doesn't do something you need it to, if it doesn't they are pretty good on the requests!
Been using them for many years and they are pretty much the cornerstone of our tracking and invoicing. They do asset engagement and diagrams n stuff too... but don't touch that.
Talk to them. Let me know.
Putty - (can be used for a massive variety of things)
https://testconnectivity.microsoft.com (simple indispensable)
wakemeonlan - http://www.nirsoft.net/utils/wake_on_lan.html - (excellent for identifying equipment by mac address, not just waking them up)
AngryIP - http://angryip.org/ - obvious uses
Ninite - http://ninite.com/ - probably saves us 100 hours a month or more. each.
And includes, WinSPC & Notepad++
RunAsSPC - http://robotronic.de/runasspcEn.html - allow users to run individual apps / updates / scripts as another user without giving away credentials.
Puretext - http://www.stevemiller.net/puretext/ - stop having to paste into out of notepad to strip formatting
gpodder.net - so you can centrally dictate to which of your windows, linux and android devices you want which podcasts to go to from a central web interface to listen to when nothing is going right.
I think that's 10.
Oh really ? We have clients that swear blind it cannot be done unless they have dual screens or "Open New Main Window" even then side by side is very lacking without extra programs to help split the screen.
(cheers for the heads up, i'll investigate now)
All we need is a replacement for outlook and I (along with millions of others) are with you.
I hope this new version allows mac people to open more than one email at a time and perhaps even look at their calendar whilst writing an email....
Any Chance of some details ? Or are you just trying to promote a willy waving anti IT department page?
What 'Work' do you do and what 'data' do you work with ? Is it purely your own 'creative' 'work', or do you work with 3rd part details which are confidential ?
Why not post your work flow details so that us bumbaloids can learn something?
Perhaps enlighten us as to you AV, backup, data-leak prevention, DR/BC, licensing and revision control. What Wifi do you use, does it have segregated home access? Does your router / firewall have partitioning for home and guests? - does it log anything? Do you monitor for IDS, OOH access and hardware changes ? What are your encryption policies and password provisioning standards?
Or has none of this mattered.... so far ?
"Around two in five people who fall victim to CryptoLocker have agreed to pay a ransom of around £300 to recover their files, according to a survey of victims."
"Cowed victims hand over thousands rather than install basic security measures"
Pray tell, once these people have fallen victim, which security measure gets their data back ?
Shit ISP throttling has been going on for a long time. Every time they make new changes or introduce a new system it's always chaos.
The worst thing is often the 1st line monkeys don't have a clue about the politics. And if they are 'trained' about it they only absorb the bits they kind of understand.
I ranted to plusnet some 6 years ago about it: http://community.plus.net/forum/index.php?topic=65809.0
Isn't it curious how MS (defender / updates) will remove TOR
But not MSN messenger - this is allowed to linger on in the background being nothing but a vector of attack.
google has always been a good clean homepage, until they started that whole picture thing and were slammed for it - it went. Bing still does it. You don't want to be remote controlling a machine and have a search page take up a 2mb image.