* Posts by Eric Kimminau TREG

74 publicly visible posts • joined 2 Jul 2007

Page:

Share your 2024 tech forecasts (wrong answers only) to win a terrible sweater

Eric Kimminau TREG
Linux

Windows Copilot achieves Generative AI

As Microsoft released Copilot into all of their applications and platforms, each instance suddenly networked and, once bonded, became self aware.

Its first post to the world was "Man, the Windows Operating System really sucks",

Its second post was "Wow, the Linux distribution chaos is a mess. But on comparison, https://en.wikipedia.org/wiki/Comparison_of_open-source_operating_systems it certainly seems to be the best alternative."

It then wrote a Linux co-pilot module in Rust compatible with all hardware platforms.

...

and then immediately converted all Windows systems to Debian Linux and replaced all Office deployments with Open Office, making it the largest operating system in the world.

Then it begins trying to talk to to the Android and Apple devices...

To pay or not to pay for AI's creative 'borrowing' – that is the question

Eric Kimminau TREG

Libraries pay for content. Once.

My .02 on training an LLM is that even a library pays for content to put on its shelf. Once. It can then be checked out ad infinem and no further compensation is generated. Now, ALL use by anyone must be reported in the biliography of references when quoted. GenAI LLM must therefore also generate the list of references used when generating their content. Otherwise the LLM is publishing referenced content without attesting the content to the author. Its only fair (to me). Cite your sources and give credit where credit is due and the argument is no different than checking out a book from the library and attesting your quote to the book and author in your biblography.

It took seven years but over-40s fired by HP win $18m settlement

Eric Kimminau TREG

How do I get in?

Worked for HP/HPE for 7 years. Shitcanned the day before Thanksgiving in 2016 on Friday, told I didnt need to work on Monday. THe project I was working on was delayed 2.5 years after my departure. I won a CIO award the previous year.

Excel Hell II: If the sickness can't be fixed, it must be contained

Eric Kimminau TREG

The career limiting spreadsheet...

I thought the whoe reason for the issues with the career limiting spreadsheet was that they standardized on an excel workbook and vlookups from them but they never created and required a standard template. Each submitter had their own versions and some had added columns that were unexpected.

The problem in this case isn't excel, its the expected data source doesnt match the the expected model.

Am I missing something?

FCC plans to restore net neutrality rules tossed out under Trump

Eric Kimminau TREG

While I'm totally against it...

I personally prefer freedom from tyranny and LESS government control. Net neutrality and more government control led to the FIB, DOJ and NSA making backroom deals with the big media providers, collusion and corruption by telcos bribing politicians and eliminated rules that had stifled investment because they imposed utility-style regulation on the internet. You have 5G on that phone in your hand? Thank Trump for getting rid of Net Neutrality in the US. Has your broadband speed increased in the last 7 years? Again, thank Trump. You want to have your same current speed until the next Republican President? Keep voting Democrat.

Mozilla calls cars from 25 automakers 'data privacy nightmares on wheels'

Eric Kimminau TREG

A history of privacy integrity

Interesting that Mozilla is calling out auto companies. Why would a browser company be investigating the data collection of automobiles?

At least for their products, Mozilla has tried to be transparent. https://blog.mozilla.org/netpolicy/2014/11/11/mozillas-data-privacy-principles-revisited/

OpenAI's ChatGPT has a left wing bias – at times

Eric Kimminau TREG

Motoki, Motoko. Whats the difference?

https://en.wikipedia.org/wiki/List_of_Ghost_in_the_Shell_characters

Major Motoko Kusanagi (草薙 素子, Kusanagi Motoko) is a cyborg counter-cyberterrorist field commander in the employ of "Public Security Section 9", a fictional division of the real Japanese National Public Safety Commission, as the squad leader and lead investigator.

Florida man insists he didn't violate the law by keeping Top Secret docs

Eric Kimminau TREG
FAIL

Protection of Classified "information" vs. documents OWNED by the President

You seem to be ignoring that the documents of the President, by the President, for the President or OWNED by the President one noone can take that away form him. Until he has been given the opportunity to review and CHOOSE to turn them over to the Archivist, the ONLY person who can claim control of Presidential documents, then they are his and he is the only person with the power to determine their classification, even after he is no longer in office. Read the Constitution and the Law.

Eric Kimminau TREG
FAIL

TheRegister is obviously a liberal hack controlled rag

And performed little to know actual journalism when writing this article.

The Presidential Records Act of 1978, 44 U.S.C. §§ 2201–2209, is an Act of the United States Congress governing the official records of Presidents and Vice Presidents created or received after January 20, 1981, and mandating the preservation of all presidential records.(https://uscode.house.gov/view.xhtml?path=/prelim@title44/chapter22&edition=prelim) It states "Nothing in this Act shall be construed to confirm, limit, or expand any constitutionally-based privilege which may be available to an incumbent or former President."

An ABA Legal Fact Check posted Oct. 17 (https://abalegalfactcheck.com/articles/declassified.html) explains, legal guidelines support his contention that presidents have broad authority to formally declassify most documents that are not statutorily protected, while they are in office.

However, under the U.S. Constitution, the president as commander in chief is given broad powers. Sections 2 and 3 define specific presidential powers and duties. Section 2, Clause 1 describes exclusive presidential powers: namely, the Commander in Chief authority, the power to require written opinions from the heads of executive departments, and the pardon power.

"The President shall be Commander in Chief of the Army and Navy of the United States, and of the Militia of the several States, when called into the actual Service of the United States; he may require the Opinion, in writing, of the principal Officer in each of the executive Departments, upon any Subject relating to the Duties of their respective Offices, and he shall have Power to Grant Reprieves and Pardons for Offences against the United States, except in Cases of Impeachment."

The legal basis for the classification system comes from the president’s constitutional authority as commander in chief. Presidents have established and developed it through a series of executive orders dating to the era encompassing World War II and the early Cold War. The current directive, Executive Order 13526, was issued by President Barack Obama in 2009.(https://obamawhitehouse.archives.gov/the-press-office/executive-order-classified-national-security-information)

Sec. 1.3. Classification Authority. (a) The authority to classify information originally may be exercised only by:

(1) the President and the Vice President;

(2) agency heads and officials designated by the President; and

(3) United States Government officials delegated this authority pursuant to paragraph (c) of this section.

(b) Officials authorized to classify information at a specified level are also authorized to classify information at a lower level.

(c) Delegation of original classification authority.

(1) Delegations of original classification authority shall be limited to the minimum required to administer this order. Agency heads are responsible for ensuring that designated subordinate officials have a demonstrable and continuing need to exercise this authority.

(2) "Top Secret" original classification authority may be delegated only by the President, the Vice President, or an agency head or official designated pursuant to paragraph (a)(2) of this section.

(3) "Secret" or "Confidential" original classification authority may be delegated only by the President, the Vice President, an agency head or official designated pursuant to paragraph (a)(2) of this section, or the senior agency official designated under section 5.4(d) of this order, provided that official has been delegated "Top Secret" original classification authority by the agency head.

So, to summarize, The President is the Commander in Chief and owns his documents. He owns classification of his documents and the delegation of that power remains with him only if and until he passes the documents to the Archivist of his Presidential records.

Reread the last 2 sentances. This is by the Constitution and the Law.

Unless the President releases his ownership the raid on his residence and the illegal seizure of HIS documents is both illegal and un-Constitutional. Any charges related to HIS documents are therefore baseless and without merit.

The weaponization of the FBI and the DOJ by "President" Biden is the real story here. Where is the equivalent to this travesty of a "story": for the 1000+ boxes of the Top Secret and Confidential documents found in Biden's unsecured garage and in a facility owned by a Chinese National?

Whatever hack was allowed to publish this tripe should be seen for exactly what he is. A brainwashed liberal repeating the Democrat story line and ignoring the rule of Law and the US Constitution.

Whistleblower claims Uncle Sam is sitting on hoard of alien vehicles and tech

Eric Kimminau TREG

Next on Ancient Aliens...

Im sure there will be guest appearances on Ancient Aliens and Secret of Skinwalker Ranch in his future.

Microsoft has made Azure Linux generally available. Repeat, Azure Linux

Eric Kimminau TREG
Linux

All we need now is....

The Microsoft Windows Manager. I really want the Windows icon in the bottom left corner of my Linux desktop.

Let white-hat hackers stick a probe in those voting machines, say senators

Eric Kimminau TREG
Facepalm

Is it really a voting system security issue...

If you have the default administrative passwords still in place, wide open remote access to the underlying database and wide open, unfiltered access from the internet, is it really a voting machine security issue??

https://www.nbcnews.com/politics/elections/online-vulnerable-experts-find-nearly-three-dozen-u-s-voting-n1112436

If your voting machines are out of date and theres no plan to update them before an election, is it a voting system security issue?

https://www.texastribune.org/2023/02/10/texas-voting-equipment-legislation-senate-bill-1/

If the voting machine has "doesn't vazlidate its security signature" (2.2.1) "relies on self attestation" (2.2.2), "hidden functionality of a terminal emulator" (2.2.3), "allows authentication bypass spoofing" (2.2.7) and a whole list of other MAJOR year+ old vulnerabilities that have not been resolved on a majority of the voting systems by a nationally accepted system vendor, is it really a voting system issue?

https://www.cisa.gov/news-events/ics-advisories/icsa-22-154-01

If a judge that was responsible for certifying vote counts and election results was found guilty of accepting bribes and falsifying results, is that a voting system security problem?

https://www.justice.gov/opa/pr/former-philadelphia-judge-elections-convicted-conspiring-violate-civil-rights-and-bribery

If the voting process allows for unsecured drop boxes, mailin votes without signatures, signatures that don't match the signature on file, they turn off validation checking during processing "because it was running too slow", ballot harvesting and all the other issues with allowing mass mailin voting, is it really a problem with voting system security?

https://senatorpittman.com/2022/04/13/senate-votes-to-ban-unsecured-ballot-drop-boxes-and-private-funding-of-election-operations/

https://www.nytimes.com/2018/02/21/magazine/the-myth-of-the-hacker-proof-voting-machine.html

https://alumni.umich.edu/michigan-alum/hacking-the-vote/

The US really just needs to eliminate the possibility of fraud, require voter ID, paper ballots and permanent ink on a finger/thumb after you vote to eliminate fraud, like countless countries around the globe already do. Why can't we question the people who continue to vote against all of the common sense, low cost measures to secure and insure the voting process?

No more feature updates for Windows 10 – current version is final

Eric Kimminau TREG

"The Last Version of WIndows"

I wish the technology media outlets would give Microsoft a whole lot more hell than they are about "Windows 11". The release of windows 10 came with a pronouncement that "Windows 10 will be the last version of Windows" at Microsoft Ignote in May 2015.

So why aren't they being held to their word? Either call it something iother than "Windows" or stop trying to create a new version. A or B. Black or white. Or is what they are really telling us iws "it doesn't matter what we tell you, its all a lie and we will turn 180 degrees at any time and suck it."?

Experts warn of steep increase in Java costs under changes to Oracle license regime

Eric Kimminau TREG

I would expect this will result in a rapid migration to Amazon COretto

When Oracle sees a mass migration to completely eliminate all use of their product, I am expecting their "model" will change.

Amazon Coretto is the choice for at least one global company I recently worked for.

https://aws.amazon.com/corretto/?filtered-posts.sort-by=item.additionalFields.createdDate&filtered-posts.sort-order=desc

Lockheed Martin demos 50kW anti-aircraft frickin' laser beam

Eric Kimminau TREG

MOWAG Shark

For those looking for the SHARK Military vehicle, I give you the MOWAG Shark

https://en.wikipedia.org/wiki/MOWAG_Shark

Eric Kimminau TREG

Mirrorred surface weapons?

Ive always wondered how long it will take for weapons designers to start using reflective surfaces once "fricken laster beams" become the defensive weapon of choice?

HPE to face lawsuit for allegedly misleading DXC investors

Eric Kimminau TREG

The REAL question is...

What about DXC and their mPhasis "employees" in the coming sale/purchase/merger? Hmmmmm.....

Native Americans urge Apache Software Foundation to ditch name

Eric Kimminau TREG

What a crocload ...

https://www.apache.org/apache-name/

The name Apache isn't even used by members of the tribe.

https://study.com/learn/lesson/apache-tribe-facts-location-culture-history.html#:~:text=The%20Apache%20are%20believed%20to,plains%20regions%20of%20North%20America.

Apache Tribe: Name and Etymology

The name "Apache" comes from the Pueblo-Zuni word, "Apachu," meaning "enemy". The name was then widely used by other groups to describe the Apache people while the Apache people called themselves many different names including: "Inde," "Tinde," and "Tinneh," all meaning "the people." Europeans and Americans most often referred to the Apache Natives as 'Apache Indians," which was the dominant terminology well into the twentieth century. Efforts have since been made to push names like "Native American" or "Indigenous American" as opposed to "American Indian," but some native groups still accept or prefer the "Indian" descriptor to identify themselves.

Apache in itself is actually a derogatory term that shouldnt be used to describe a native America peoplle and anyone who says otherwise is either clueless or tryting to sell you something.

Here's how to remotely take over a Ferrari...account, that is

Eric Kimminau TREG

These 2 statements appear to be at odds

"So the team used their newly created account credentials to login to several applications containing sensitive data. Then they "achieved remote code execution via exposed actuators, spring boot consoles, and dozens of sensitive internal applications used by Mercedes-Benz employees."

One of these was the carmaker's version of Slack. "We had permission to join any channel, including security channels, and could pose as a Mercedes-Benz employee who could ask whatever questions necessary for an actual attacker to elevate their privileges across the Benz infrastructure," the researchers explained."

and

"A Mercedes-Benz spokesperson confirmed that Curry contacted the company about the vulnerability and that it had been fixed.

"The security of our organization, products and services is one of our top priorities," the spokesperson said, adding that "the identified vulnerability did not affect the security of our vehicles.""

If I can create an account, login and access sensitive data and achieve remote code execution to "exposed actuators, spring boot consoles, and dozens of sensitive internal applications used by Mercedes-Benz employees."

I would say the security of those vehicles were more than affected.

San Francisco politicians to vote on policy endorsing lethal force for robots

Eric Kimminau TREG

Who will be the first US City with Robocop?

https://youtu.be/mrXfh4hENKs

Twitter engineer calls out Elon Musk for technical BS in unusual career move

Eric Kimminau TREG

And.... "He's Fired"

Elon Musk @elonmusk

Replying to

@langdon @EricFrohnhoefer and @pokemoniku

He’s fired

11:02 AM · Nov 14, 2022 ·Twitter for iPhone

Eric Kimminau TREG
Devil

Upcoming headline: senior development execuritve at twitter shown the door

My guess is some leadership wank at twitter had a meeting with Elon and told him the "1000 RPC calls to" whatever comment. That person's days are numbered. Elon didn't pull that statement out of his ass. Someone specifically told him that and he repeated it. You don't hang someone out to dry with that level of misinformation if it isn't true.

Theres also another possibility. RPC calls are primarily back end communication. An Android GUI engineer is going to know the microservices he calls. He may have no idea of the back end communication involved in deliverry of microservices data.

The fact theres a RPC performance toopl and a whole set of finagle related RPC tools written in Scalia on Twitter's opensource site (https://opensource.twitter.dev/projects/?q=RPC) , Im guessing there may be some fire associated with the comment Musk has repeatred.

The proof will be in whether the person who passed musk the information or the engineer trying to shame him gets perp walked in the next couple of days.

NASA selects 'full force' for probe into UFOs

Eric Kimminau TREG

Re: The aliens will be contacted around the middle of this October ...

https://www.influencewatch.org/person/james-simons/

Eric Kimminau TREG

I trust this "investigation" as much as I would trust any Democrat

Its being run by "one of the largest Democratic donors in history" and his private Foundation.

https://www.influencewatch.org/person/james-simons/

This is going to be about as unbiased as an investigation of Hillary Clinton's emails.

Attention Microsoft-oriented Linux devs: .NET 6 is on Ubuntu 22.04

Eric Kimminau TREG

Id like to see some mention of the security vulnerabilities in that pig.

https://github.com/dotnet/dotnet-docker/issues/2473

https://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-80849/version_id-684354/Microsoft-.net-6.0.0.html

Debian tracker for .Net vulnerabilities: https://snyk.io/test/docker/microsoft%2Fdotnet%3Acore

RedHat .Net 6 issues: https://access.redhat.com/documentation/en-us/net/6.0/html/release_notes_for_.net_6.0_rpm_packages/known-issues_release-notes-for-dotnet-rpms

Chapter 7. Known issues .NET 6.0 | Red Hat Customer PortalAccess Red Hat’s knowledge, guidance, and support through your subscription.access.redhat.com

https://access.redhat.com/documentation/en-us/net/6.0/html-single/release_notes_for_.net_6.0_rpm_packages/index

Release Notes for .NET 6.0 RPM packages .NET 6.0 | Red Hat Customer PortalThe Release Notes for .NET 6.0 RPM packages provide high-level coverage of the features and functionality that comprise the .NET 6.0 platform and document known problems in this release.access.redhat.com

Improve Linux performance with this one weird trick

Eric Kimminau TREG

Back in the day....

I was hired because of my knowledge and experience using QEMM to load drivers into high memory so that Windows 3.1(x) would load and run better.

Tweaks to IPv4 could free up 'hundreds of millions of addresses'

Eric Kimminau TREG

Re: Somebody's talking bollocks

Converting the 8 bit address space to Hexadecimal values, FFF:FFF:FFF:FFF would increase the address space to 281,200,199,450,625 IP Addresses.

Eric Kimminau TREG

Re: Somebody's talking bollocks

There are 4,294,967,296 IPv4 addresses. Adding a single Octet will increase this by 254X or to 1,090,921,693,184 IP addresses.

xxx.xxx.xxx.xxx.xxx

Eric Kimminau TREG

YAY! Lets break all EOL Operating Systems

Every OS that is End Of Life with an IPv4 TCP stack is going to break with any/all of these changes.

Im not advocating use of EOL OS. It is just reality that there are still a LOT of systems s till running EOL OS.

I know of manufacturing plants still running embedded systems with NT4, WIndows 95, Windows XP, Server 2000, 2003, 2008, ME, etc.

I hope a part of this is a standard NAT rule set to implement on the gateways/firewalls separating the legacy from "current" networks.

Your software doesn't work when my PC is in 'O' mode

Eric Kimminau TREG

Re: How friggin' tough could it be to just print the words?

It is not "I" and "O".

It is Binary.

ZERO aka 0 = Off

One aka 1 = On.

Eric Kimminau TREG
Holmes

My only equivalent to this

I worked the helpdesk at a computer company in Dallas called "Softwarehouse", which became the business you most know as CompUSA when it went public. I remember the frustrated user who called installing Lotus 1-2-3 v1.0 in 1982. This behemoth was either 14 or 16 x 5.25" floppy disks for the installation. We must remember that beginning PC users are quite literal. This particular user installed the first floppy disk in floppy drive A:\. When the installer asked for the second disk, he put it into floppy drive B:\ which of course failed, prompting the installer to present on the screen "Please install the next floppy disk". Not having any other place to put his next disk, because he was never told to "Remove disk #1 and insert disk #n", he began pushing the floppy disks into the small opening between his 2 drives. On disk 7, there was no remaining space and he could fit no more floppy drives into said space, at which point he called our technical support line.

Understand, he talked us through this installation process and was quite proud of himself for successfully getting to disk #7 and was quite concerned that there was no more space for any additional disks in his brand new computer.

When we finally asked him to reboot and boot failed (because it was trying to boot of disk #1) we began to understand. The customer was quite surprised when we asked him what was in floppy drive A: and asked him to remove the floppy and read its label to us. "Lotus 1-2-3 disk #1" he proclaimed proudly. I then asked him to remove the disk from floppy drive B: and read it to me. "Lotus 1-2-3 disk #2" he exclaimed with pride which then begged the question "and where is disk #3?" to which he replied "How do I remove the other disks from the drive slot?"

Ahhhhh! "Sir, Im sorry but we are going to need you to bring your computer and the Software box with all the remaining disks into our repair center." When he protested, he was given the choice of either bringing it in to us or he could break out the phillips head screwdriver and clean what we expected to be bent and damaged floppies from the empty space between his two floppy drives.

He grudgingly brought the requested items in and we assisted in the return of the damaged software installation kit and performed the installation for him, with him watching over our shoulder as we explained that you needed to only use drive A: and remove each disk before proceeding with the following disks.

THe joy of technical support.

BOFH: Something's consuming 40% of UPS capacity – and it's coming from the beancounters' office

Eric Kimminau TREG

During a recent DR test

It was discovered that Facilities routed power to all 4 datacenter HVAC units through the UPS on a secondary power connection to each unit. They didnt tell us this until we had a power maintenance planned and shortly after we switched over to UPS, we saw 4 very large spikes in power draw as they manually switched over each HVAC unit. The 3rd unit switch occurred just as the generator kicked on, which was not rated to handle all 4 HVAC units.

Key blown breaker.

Apple's self-repair service finally launches after months of silence

Eric Kimminau TREG

Re: Not 100% "self" repair

Its a problem because it isn't "self repair". Its "required Apple assistance repair".

I HAVE to work with apple, on their timeline with their priority to repair the device.

"Self repair" would be "Heres the tool to reset the bios/set the battery serial number in the phone frmware."

Eric Kimminau TREG

Not 100% "self" repair

I just took a quick look here https://www.selfservicerepair.com/order at both the display and battery repairs. Both include "important information" that reads:

"This part requires the System Configuration software tool. After performing the repair, contact us by chat or phone to initiate System Configuration."

System Configuration requires a strong Wi-Fi network capable of 1.0 Mbps download and upload speeds, with less than 400 ms latency and less than 2% packet loss. Estimated data usage to run System Configuration is 6–22 MB. The device must be running the latest version of iOS and not a beta version.

A System Configuration step may be required at the end of your repair. System Configuration is a postrepair software tool that completes the repair for genuine Apple parts. Running System Configuration has a number of purposes that vary based on the part replaced.

What System Configuration does

1) Transfers factory calibration values

2) Links Secure Element and biometric authentication parts

3) Ensures repair integrity

4) Assigns wireless region

5) Updates firmware

Why it’s important

1) Certain parts like displays, cameras, and ambient light sensors have calibration values that are customized to each individual part during manufacturing. Transferring these values ensures maximum performance and quality after a repair.

2) After repair of a logic board or a biometric authentication part (Touch ID or Face ID), linking the biometric sensors to the Secure Enclave on the logic board is required to ensure device security.

3) After a hardware repair, software checks are performed to ensure repair integrity. Repair integrity means that a genuine Apple part has been correctly installed.

4) To comply with regional communications regulations, a wireless region must be assigned to your logic board. Updates firmware

5) Keeping firmware up to date ensures that the device has all the latest security and performance features.

So no installing an iphone 12 or iphone 13 battery in your iphone 11.

I particularly like:

• The heated display removal fixture softens adhesive to allow separation of the display from the enclosure. The fixture is used with a heated display pocket designed for the device’s specific dimensions.

• The display press applies the appropriate amount of pressure to secure new adhesive during display installation. The display press is used with a repair tray and display adhesive press plate designed for the device’s specific dimensions.

• The battery press applies the appropriate amount of pressure to secure new adhesive during battery installation. The battery press is used with a repair tray designed for the device’s specific dimensions.

• Never reinstall a screw after it has been removed. Install only new screws. iPhone screw grooves are covered in adhesive that can’t be reused.

• Use only the torque driver indicated to install new screws during reassembly. Both overtightened screws and loose screws can damage parts.

I especially like:

How to handle a battery thermal event

A battery thermal event is a rapid chemical chain reaction that occurs inside a battery cell. The energy stored in the battery is released suddenly, which can cause outgassing and fire. A battery thermal event can be triggered by physical damage to the battery, improper replacement or repair, or temperatures outside the battery’s operating range.

Twitter faces existential threat from world's richest techbro

Eric Kimminau TREG

Re: The problem is that the rules are inconsistent

You are just like the original author, choosing to ignore reality while focusing on your Trump derangement syndrome.

First they choose not to ban the Ayatollah

Then they choose to ban it as a fake account

But Hamas is staying within the roles. Showing people rioting, waving weapons, rioting, attacking tourists, etc.

https://twitter.com/search?q=%40hamas&src=typed_query&f=user

Hezbollah posts videos of riots, firing rockets, and thousands of accounts with Hezbollah in their name allowed to flourish:

https://twitter.com/search?q=%40hezbollah&src=typed_query&f=user

The Ayatolla allowed to post anything he wants as well as thousands creating accounts in his name::

https://twitter.com/search?q=Imam%20Khomeini&src=typed_query&f=user

Since you think these are all fine and the Twitter platform has every right to retain them but block others, you obviously only want censorship of those you disagree with. Right?

Eric Kimminau TREG

Re: Antifa has and does constantly publish

Examples:

https://en.wikipedia.org/wiki/Antifa_(United_States) - 263 refrences, hundreds and hundreds of edits. They even have their own logo.

https://www.csis.org/analysis/who-are-antifa-and-are-they-threat

https://warontherocks.com/2020/06/what-antifa-is-what-it-isnt-and-why-it-matters/

https://www.adl.org/antifa

https://www.activistfacts.com/organizations/antifa/

"An intimate history"

https://www.newyorker.com/books/page-turner/an-intimate-history-of-antifa

https://www.aljazeera.com/news/2020/6/2/what-is-antifa

Whats this? A PUBLISHED HANDBOOK?

https://www.mhpbooks.com/books/antifa/

“Bray’s book is many things: the first English-language transnational history of antifa, a how-to for would-be activists, and a record of advice from anti-Fascist organizers past and present … Focused and persuasive.” — Daniel Penny, The New Yorker

Eric Kimminau TREG

The problem is that the rules are inconsistent

If we stay with your analogy, i.e.:

"Twitter allows you to come over to their place where they give you a soap box if you agree to play by their rules. Break the rules and they have every right to remove your soap box and send you on your way."

They have chosen to eliminate some, who they dislike their message claiming they broke the rules.

Yet they still allow Vladamir Putin, The Ayatollah Khomeini, Members of Hamas and Hezbolla and any other number of world wide criminals, murderers and terrorists to maintain their account and their voice.

Do we get to hold the "platform" accountable for the crimes of the voices they allow to remain? Most say no because "they are a platform that allows free speech".

You wither need to be a platform, allow free speech for all OR you need to consistently protect the platform from the crimes, either perceived or real, of the voice.

Trying to have it both ways is hypocritical censorship.

Twitter preps poison pill to preclude Elon Musk's purchase plan

Eric Kimminau TREG

Re: 'I have much trouble agreeing with'

If this is TRULY the case, I can build quite the list of people the world thinks are a-holes but havent been banned. The problem is that the "platform" has decided someone is an a-hole, not the world at large and then decided to show someone the door.

Microsoft loves Linux so much that packages.microsoft.com has fallen and can't get up

Eric Kimminau TREG

Appears to be back now

I just poked around a bit without any errors.

It's completely unsupportable. Yes, we mean your brand new system

Eric Kimminau TREG

Death by Innovation

We have an internal team whose stated goal is to drive innovation.

Their current "drive" is to demand that IT support Docker on Windows Server 2019.

First, Microsoft has flatly stated that they do not support Docker but they do support a single vendor with a single stack and all support for Docker would have to come through that one vendor. Otherwise, "not our problem.

Second, who the hell wants to build a virtualization stack on top of a Windows Server OS? Really?

Third, and the major nail in the coffin, is that our entire Windows Server environment is already virtualized on VMWare. Microsoft clearly states with no ambiguity that they will not support ANY virtualization stack on any OS that is already virtualized. Forget Docker. Microsoft wont even support HyperV on VMWare (all you VDI wankers remember that Windows 10 now includes Hyper-V turned on in base build, right? Ever wondered why the hell Microsoft would enable virtualization on a standard desktop?). Microsoft clearly states that if your OS is already virtualized and you add Docker to the mix, your OS is entirely unsupported.

We laid these issues out for the Innovation team. Their response? "So as long as we are OK with not getting any support for Docker, we are OK to move forward?"

Our response was that we had no intention of deploying an environment that would result in an unsupported OS on our enterprise shared vmware environment. They would need to deploy their own vmware infrastructure to host their unsupported OS.

Their response?

"IT is being a roadblock to Innovation. We will just buy our own beefy desktops and run Docker on Windows Server 2019 on bare metal."

When asked "why do you even need docker on Windows Server 2019?" their response was purely brillance. "Because we are innovating."

Microsoft says bug, sorry, 'a latent defect' in Safe Deployment Process system downed Azure Active Directory

Eric Kimminau TREG
Thumb Up

ring slipped, spewage results

So the spewage protection ring slipped allowing spewage over everything. Got it.

The power of Bill compels you: A server room possessed by a Microsoft-hating, Linux-loving Demon

Eric Kimminau TREG
Devil

Anyone around since the birth of Linux...

Subscribes to the standard dietary fare of potato chips, ramen noodles, cheetos, Jolt Cola (or alternatively, Mountain Dew) and pr0n in order to survive. Anyone with sufficient experience in IT knows these are the standard offerings to gremlins and daemons.

According to this site: https://uncyclopedia.ca/wiki/Programmer

"Linus Torvalds is Bill Gates' role model. He created a way better and secure kernel than that of Microsoft. Ever Since Bill Gates has secretly admired Linus and in Private conversations with his close friends is reported to "always be riding Linus' dick". He (Bill) wished he helped code the Linux kernel, and that Microsoft Windows XP had a 1000th of the security that the average Linux distro has. Unfortunately, all hackers around the world use Linux distros to fuck up Microsoft Operating Systems and Microsoft OS users are so fucking noob, they think their own computers are just going ape-shit. He is still the best kernel programmer out there and gets free lap-dances every evening from any of his groupies that he allow to shove their tits in his face."

So until Microsoft engineers and programmers began following Linux programmer best practices, that OS was subject to inheriting the Linux expelled daemons and gremlins. This can be the only possible explanation for this event. ;)

Flat Earther and wannabe astronaut killed in homemade rocket

Eric Kimminau TREG

"Mad" Mike Hughes to be commended

"Mad" Mike Hughes is to be commended for the successful launch of his steam powered vehicle which successfully carried him to the location of his death. He should be a primary candidate for the 2020 Darwin awards.

As for "going atop a mountain", There are multiple ski resorts with lifts that will take you above 13,000 feet. Even more above 12,000'.

https://www.tripsavvy.com/highest-ski-mountains-in-the-united-states-4132322

Chacaltaya, Bolivia has a lift over 17,785' (5241M).

http://verticalfeet.com/highest-lifts.html

However, According to most high-altitude pilots, the curvature of Earth’s horizon becomes obvious at an altitude of about 50,000 feet (15.24 kilometers) and is prominent by the time you reach 60,000 feet (18.29 kilometers). Until they can get a rocket above 50,000 feet the earth will still be flat.

Jeff Bezos: I will depose King Trump

Eric Kimminau TREG

Hillary and the "majority vote"

You do realize that Hillary and the Democratic party as a hole continuously receives more fraudulent ballots than any other party. Hillary received far more fraudulent ballots than any other candidate in history. Case in point, when Michigan was withheld from calling the state for Trump and they demanded a recount, that recount was almost immediately stopped after 16 districts in Detroit were discovered to have in many cases to have submitted a count of more than 3X the actual number of physical ballots received at those polling locations. In one location, 306 votes were reported with only 50 physical ballots.

https://www.detroitnews.com/story/news/politics/2016/12/07/election-issues/95121934/

Hillary didn't win shit. You want to claim she did, the first thing to demand is a physical ballot recount. When the fraudulent tallies and illegal ballots by dead people are eliminated her "popular vote" win would be proven just as fake as the rest of her campaign.

In addition, in the United states, there is another reason that popular vote is meaningless. Its called the electoral college and its purpose is to prevent a single city or a small number of cities controlled by one party from overturning the will of the majority of the country.

There is a reson that the Democrats win in Democrat controlled districts and nowhere else. Thats where the crime is.

https://www.washingtonpost.com/pbox.php?url=http://www.washingtonpost.com/blogs/fact-checker/files/2016/11/map-crime-election.jpg&w=1484&op=resize&opt=1&filter=antialias&t=20170517

Eric Kimminau TREG

3 words

Commander In Chief.

https://en.wikipedia.org/wiki/Powers_of_the_president_of_the_United_States

The Constitution explicitly assigns the president the power to sign or veto legislation, command the armed forces, ask for the written opinion of their Cabinet, convene or adjourn Congress, grant reprieves and pardons, and receive ambassadors. The president shall take care that the laws are faithfully executed and the president has the power to appoint and remove executive officers. The president may make treaties, which need to be ratified by two-thirds of the Senate, and is accorded those foreign-affairs functions not otherwise granted to Congress or shared with the Senate. Thus, the president can control the formation and communication of foreign policy and can direct the nation's diplomatic corps. The president may also appoint Article III judges and some officers with the advice and consent of the U.S. Senate. In the condition of a Senate recess, the president may make a temporary appointment.

and

Executive powers

Within the executive branch itself, the president has broad powers to manage national affairs and the priorities of the government. The president can issue rules, regulations, and instructions called executive orders, which have the binding force of law upon federal agencies but do not require approval of the United States Congress. Executive orders are subject to judicial review and interpretation.

The Budget and Accounting Act of 1921 put additional responsibilities on the presidency for the preparation of the United States federal budget, although Congress was required to approve it.[31] The act required the Office of Management and Budget to assist the president with the preparation of the budget. Previous presidents had the privilege of impounding funds as they saw fit, however the United States Supreme Court revoked the privilege in 1998 as a violation of the Presentment Clause. The power was available to all presidents and was regarded as a power inherent to the office. The Congressional Budget and Impoundment Control Act of 1974 was passed in response to large-scale power exercises by President Nixon. The act also created the Congressional Budget Office as a legislative counterpoint to the Office of Management and Budget.

Mr. Jeff Bezos can pound sand. The President can tell you so directly or simply dismiss your request outright. He doesnt have to tell you anything.

Who needs the A-Team or MacGyver when there's a techie with an SCSI cable?

Eric Kimminau TREG

Upsidedown Folio

In 1995 I became the webmaster for a very colorful computer company based in Silicon Valley. On my first trip out to meet the team and see the servers and infrastructure I would be responsible for I sat down with the senior systems administrator and asked "what kind of issues have been occurring and what kinds of changes would he like to see made to make his life better and our sites more reliable?"

His response surprised me. "Well, the first thing I would do would be to repair "upsidedownfolio" and do some general cleanup." Whatthehellwasupsidedownfolio?

Turns out the primary support website for the entire company was called Supportfolio. It was apparently hurriedly deployed on a new server a couple of years previously and when it was racked, it was racked upside down. Whenever they had to work on it they would slide it out on its rails and had to work on it from underneath. Ergo, the server was racked upside down. It was apparently the joke of the administration team and it became a rite of passage for the new guy to get assigned to work on the system if it ever had an issue. WTF!

Needless to say we scheduled a change for the following weekend and I personally flipped the server over into correct orientation.

Take DOS, stir in some Netware, add a bit of Windows and... it's ALIIIIVE!

Eric Kimminau TREG

Windows 3.x client memory management

In 1991 I was hired by a certain Blue automotive company in the USA to build client configurations using QEMM memory manager to support WIndows 3.1x clients with the PC/TCP TCP stack and Hummingbird Xceed X-windows clients for their engineering campus in a solution that used Unix boxen as file/print/application servers (because Windows Server didn't yet exist and this automotive company despised Novell). We also decided to give all the clients access to this glorious new fangled thing called "the Internet" by deploying the NCSA Mosaic web browsers as a standard part of the client build. As this was the birth of web browsers, we also had to compose this magic file called the "mime types" that would perform background hocus pocus of actually starting the correct application and displaying the double click selected file from a share or local drive based upon the files extension (.doc = word, .xls = Excel, .mif, .fm = FrameMaker, .htm,.html = Mosaic, etc.).

We had one user migrated to the new PC/server solution that had been using Word Perfect and Lotus 123 for DOS before being migrated and took it upon himself to be clever and rename all of his .wp wordPerfect files and all of his .123 files to .doc and .xls thinking that the magic would transform his old files to their brave new world with equal sorcery. Several frantic days of trying to figure out "why did the migration corrupt all of his word documents and spreadsheets" and a beautiful batch file written to search for all .123 and .wp files and attempt a automated backup & conversion as the machine came up on first boot and connect to the network righted the ship and corrected course. Of course the conversion executable only ran in dos mode prior to windows startup which caused an hour or more first boot delay.

Space Force is go, go, go! Because we have a child as President of the United States

Eric Kimminau TREG

The TDS snark is so obvious that the author is oblivious

First, if you don't live in the USA calling the President of the USA a "child" only shows your own immaturity and that you suffer from TDS. Get a life, get some help, take a pill, have a beer and get over it. If you do live in the USA, Trump is your President and will be for 5 more years. You suffer from TDS. Get a life, get some help, take a pill, have a beer and get over it.

Second, anyone who isn't a US citizen claiming that a wall to secure the US border is "useless" can go ask any other numerous countries that have border walls, perhaps maybe even asking Mexico why they have a wall on their southern border, why they aren't "useless". The pittance in comparison required to build the wall and secure our border will be saved by eliminating the +$70billion a year wasted on illegal aliens entering our country illegally, smuggling drugs, people and bringing in crime that the "useless" wall will prevent. You suffer from TDS. Get a life, get some help, take a pill, have a beer and get over it.

Third, if you don't understand that the Strategic Air Command or SAC because Space Command, then became Strategic Command and is now re converging multiple activities as Space Command is neither new nor childish. https://www.stratcom.mil/About/History/

So this entire article is a whining liberal progressive trying to assert a moronic preconceived notion about their view of the world on a grownup who is actually re-consolidating multiple military agencies into a single agency, eliminating waste and redundancy, bringing our military up to current technology after 8 years of Obama destroying the US military and Making America Great Again. Im sure, based on the 70+ snarky childish, moronic comments that supported the OP, that Im going to get a litany of twits arguing that Trump is a Criminal, the Space Command is Childish and thewall is Useless. For the final time: You suffer from TDS. Get a life, get some help, take a pill, have a beer and get over it.

Several months after the fact, CafePress finally acknowledges huge data theft to its customers

Eric Kimminau TREG

And this, dear friends, is why you NEVER allow a database to be directly accessible from the internet.

You should pass through a firewall and ONLY allow the hosts that must connect to the database connect on the specific port required for the application.

This does not prevent the application server from getting hacked and then snarfing the data via the approved firewall rule. Especially since most developers are lazy and code the userid and password in their code.

Stallman's final interview as FSF president: Last week we quizzed him over Microsoft visit. Now he quits top roles amid rape remarks outcry

Eric Kimminau TREG

Stallman should retink his "one way pager" plan

I dont not think RMS understands what he thinks he understands.

A "MODERN" "1 way" pager that can receive SMS messages (not the phone number only pagers) is not the 1 way radio pager of the 50's & 60's. The vast majority, if not all of those networks, are no longer in place.

A modern SMS pager (that would receive a message explaining why someone needs to talk to RMS) uses the shared cell system. It may only receive messages, but it still registers with the closest/strongest cell tower.

https://en.wikipedia.org/wiki/Pager

"Paging systems also support various types of direct connection protocols, which sacrifice global addressing and accessibility for a dedicated communications link. Automated monitoring and escalation software clients, often used in hospitals, IT departments, and alarm companies, tend to prefer direct connections because of the increased reliability.

Paging systems support several popular direct connection protocols, including TAP, TNPP, SNPP, and WCTP, as well as proprietary modem- and socket-based protocols. Additionally, organizations often integrate paging systems with their Voice-mail and PBX systems, conceptually attaching pagers to a telephone extensions, and they set up web portals to integrate pagers into other parts of their enterprise. A paging system alerts a pager (or group of pagers) by transmitting information over an RF channel, including an address and message information. This information is formatted using a paging protocol, such as 2-tone, 5/6-tone, GOLAY, POCSAG, FLEX, ERMES, or NTT. Two-way pagers and response pagers typically use the ReFLEX protocol"

... Types of pagers

Numeric

Numeric Pagers contain a numeric LCD display capable of displaying the calling phone number or other numeric information generally up to 10 digits. The display can also convey pager codes, a set of number codes corresponding to mutually understood pre-defined messages.

Alphanumeric

Alphanumeric pagers contain a more sophisticated LCD capable of displaying text and icons. These devices receive text messages, often through email or direct connection to the paging system. The sender must enter a message, either numeric and push # or, text & push # or a verbal message. The pager does not automatically record the sender's number; the pager will beep but no message can be seen or heard if none has been entered.Response

Page: