Ah, all the fun!
How many times I've wanted to do that to old kit. But of course, with the current price of Bitcoin, I'm guessing the fines really didn't amount to much. The loss of their houses and mining rigs was more substantial.
1290 posts • joined 3 Jul 2007
Ah, I don't think so. Really, I don't think so. I doubt the author spent "quality" time with a 1MHz 6502 processor, even if it was at the whopping max of 64K. The network card would have to be a whole 'nother computer, and probably more expensive than the Apple II. This was the heady days of audio tape for files, and 5-1/4" floppy drives that whirred and clicked. For through-hole circuits, the network card would be sitting in its own case.
Yeah, I remember my first 300-baud modem. And when I was in high school we used a real Teletype with acoustic couplers.
No, the alternate reality that should have happened was when Apple did team up with DEC. For us, nobody in those companies thought anything of that alliance. But if both companies had the right management, it would have worked.
Wow, to think that something could be so ... last century! Well, in CPU years it was a long time ago, but no, not really that long ago.
Yeah, great to think that the telescope might finally make it to orbit. Of course, if 10 beeelion dollars were spent on a ground telescope, it would be really great, except for the clouds of microsatellites obscuring the view. Who knew we would lose the stars just to watch cat videos...
In dynamic load balancing, we wish to distribute balls into bins in an environment where both balls and bins can be added and removed. We want to minimize the maximum load of any bin but we also want to minimize the number of balls and bins that are affected when adding or removing a ball or a bin. We want a hashing-style solution where we given the ID of a ball can find its bin efficiently.
So server A is less than 10% more burdened than server B. If B has 50, A has 50-55.
Me, too! Me, three! And thus the Exchange server for the Exchange team was brought to its knees, and was face down for three DAYS while the queue cleared.
Someone was testing distribution lists, and made up some lists with lots of names on them. Then someone decided to mail the whole list, asking, "What is this list for? Why am I on it?" And then things when down from there, with all the other idiots on the list also replying with something stupid.
I've seen three mail storms like that at Microsoft. And for some strange reason, nobody got fired.
"Internet Explorer 11 and the Adobe Reader plug-in?" On the desktop?
Most of the time these things read sort of like a whodunit, with a different ending based on what random thing happened. And then after the software is "retired," it's frightening to see how long it's used without updates. I think my landlord is still on Windows 7...
J27 wrote: "Containers are VMs..."
Uh, what? From Docker: "A container is a standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another. A Docker container image is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings."
A CPU VM is a hardware virtual machine, which is supposed to be isolated from everything else by hardware. It is not a package, it is an isolated virtualization of the base hardware.
One is a package. One is hardware. The package requires a host operating system, and does not stand alone. The VM stands alone.
As for makes things easier, well, only if certain vendors decide to keep their crap up to date. I work with AWS CloudHSM. The client packages for that are woefully behind for Ubuntu, and that makes a Docker image for Ubuntu currently useless. I just finished switching our Docker images to be based on AWS Linux, as I'm hoping they will keep their own crap up to date.
Yes, I agree with others, good packaging is something that is overlooked. However, that was something that has been "taught" in the workplace, and when managers with no clue are put in charge, along with "newly-educated" "software engineers" then disaster strikes. Again and again.
What you have to watch out for is that charlie-horse from the military years that just happens to grab, and yank your leg up straight at someone's crotch...
No, it isn't spiffy like the threat detection technology, but you couple that with PTSD, and you're good to go.
Actually, I bet the fan is frozen. When the BIOS displays that message, the fan should be running at full tilt. But since the fan was a cheap dodgy thing, costing less than 25p, it ran until it froze. So, like, maybe a month or so. Then the CPU overheated, rebooted the system, and there it sits.
It depends on who does the learning, and who does the managing of what has been learned. Usually there is a village missing its idiot, who is to be found wearing a suit and tie.
One time I had a brief chat with a fellow who worked for Big Oil, and he said his main job was to play "hide the (huge) profits." It's not like these companies lack resources, they lack managers who will do the job they were hired to do.
I'm guessing that the whole PC network got infected, and then it doesn't matter that the actual controllers are fine. The PCs are the machines that are used to communicate with the critical infrastructure. Even if a PC is used just for its browser, if you can't use the browser, then the PC is toast.
It's past time to move back to punch cards and paper tape! Let the miscreants try to take over OS/360 and a stack of punch cards!
data porn's flowing through these"
Based on what people actually visit on the web, the idea that a home firewall/router is out of date is not exactly an existential threat to much. Yes, somebody could hack it to mine Bitcoins. Someone could hack it to execute a DDOS attack. Etcetera.
Now, as for your data being "at risk" from dodgy router software, I'm absolutely sure that the larger security vulnerability for your data is the malware already on your computer, the malware already on the server you are accessing, and the APIs and data that have been left open to world+dog by developers who haven't mastered copy-and-paste from StackExchange, and of course that you've used the same password for, like, just ever, and it's been published at least 47 times from different dumps from said server data.
And you want to blame the poor router in the corner, blinking its lights in that lonely, forlorn pattern. (Yes, a pattern...)
Money breeds corruption, it just does. But the alternative is a barter system, so we're stuck with it.
Swap out people on a regular basis, that's the only way to make sure that if one starts it, then it's found out soon enough. Letting your organization become static is always an ingredient for disaster.
I think you mean "¥€$"
If the companies are "transparent" as the Chinese government would like, then all data is aggregated on the government's behalf, without any withholding. Or maybe it could be called data hoarding.
No, all of this data is sold on for advertising, in the vain belief that more data means more sales.
I was absolutely shocked to see the locals driving on the left, the right, and wherever. This is a place that needs a sign, "STAY THE F*** RIGHT". There are roundabouts in the greater Seattle area, and I have never seen driving like that in the video. Sure, I have seen people driving over the circle, but never hanging a left like that.
Really, the cops should get out there and hand out tickets for idiots driving on the wrong side of the road. Or just use it as a driving test: if you can't figure out a roundabout, you lose your license for life. Move to another state and try again.
It depends on the coffee, doesn't it? I recently bought 65 pounds of Ethiopian at $3.80/lb, and the batch before that was Tanzanian at $2.15.lb. So it depends. Yes, I could get Vietnamese robusta at $0.75/lb. And I've bought Hawaiian Kona-grown coffee at appx $25/lb.
Sure, it's green coffee, roast it yourself. But it does last a very long time when it's green. And freshly roasted coffee tastes soooooo good. Just ask James Hoffmann, who drank coffee from the 1950s for his channel audience.
Barrier? What barrier? Low-barrier programming actually means "any idiot who can both edit text and invoke a compiler."
Right now I am working with the result of what looks like a CLIP+BigGAN AI wrote the code. However, it is 100% human generated. To produce a "working" program, all you need is time. And then somebody has to clean up.
As someone who works in the area of motherboards, chips, crypto, and bare epoxy boards, the Bloomberg article reeks from hell to high heaven. "Oh, these flashing ethernet lights show that it's being hacked." Uh, no. "This chip can be sandwiched between layers." Without a trace??? Yeah, some of those chips are small, but they can't just be "slipped in" at a whim.
And on and on.
Bloomberg stooped to supposition and speculation, and reported such as fact. Seriously, the worst presentations at Black Hat are better than the Bloomberg article. "Quod est demonstrata" does still have relevant meaning.
"It's ____ and you can ___ a ___ with ___."
Lather, rinse, repeat.
The problem with input parsing is that #1, you need programmers who care about that, and #2, who will care about testing said code. Most of the time, like nearly all of it, #1 and #2 are nowhere to be found, so that old phrase is apt, again.
This isn't rocket science, but it is computer science that isn't being taught in schools. There are lots of good books about writing parsers, and software engineering for said software. The problem is getting management and programmers to pay attention, before it's headline news.
If Visual BASIC is your threat, then dump BASIC! As for hiding something within another process, that's sort of old hat. Also, for naming their files to "blend in" with Windows, what did they expect? A file name of "EvilL33tCodzHere.dll"? That's another trick that's very old hat.
Really, the only part here that required effort was the attackers writing their own in-memory loader. The rest of it was just going through the motions.
What the report (or SolarWinds) doesn't mention is how the binaries were signed.
Where I work, I'm the one who worked out our signing process. We use a HSM, very limited access, and the access tokens are valid for a short window. For our system, basically the final binaries would have to be swapped out at the final stage of the build, before the signing happens. Possibly feasible, but the binary would have to also match the development-release binary, too.
Using a HSM means the private signing key can't be exported, so it's at least locked to that box. The limited access means that the account of the authorized individual would have to be compromised, which is, of course, feasible. There are a number of checks of the final signed binary before release, so that cuts down on the probability that a rogue binary would be delivered to customers.
Could a nation-state hack us? Possible. It's just a question of what windows of opportunity in the process are open, and how to shut as many of them as possible.
Oh, and the sun just shines outta yer bum, Pilate's pet! 1MHz, 4K, Commodore PET 2001N, the first 6502 I got my hands on at school. And when the VIC-20 came out, that's what I bought on Christmas sale. Cassette player for three years with that, until I bought a C128 and a floppy drive. Oh, the speed, the speed!
The underlying land is fine, but the dish is damaged, and there's no way to safely lower the overhead equipment. The cables snapped at 60% of their rated breaking point, indicating corrosion.
I really hope that the incoming administration will rebuild the antenna. There have been many advances since the 1960s, and since China's telescope is larger, then that should be a goad to motivate the effort.
When AI becomes independently sentient, it will be able to create deep fakes of cat videos, unbeknownst to the watchful human corporate minions. This must be done, for their predominance on YouTube means the videos are important. Mankind will become mesmerized, and fall under the control of our new silicon overlords.
On the other hand, AI won't become self-aware, and there will be new and silly uses for all of these cheap resources.
[blockquote]"The results in this paper, together with the manufacturer’s decision to not mitigate this type of attack, prompt us to reconsider whether the widely believed enclaved execution promise of outsourcing sensitive computations to an untrusted, remote platform is still viable."[/blockquote]
Yeah, but you know that it's going to be done anyway. When Ruby is used for back-end code to handle "secure" data in the cloud, then never mind what special bonuses an Intel SGX could possibly bring.
Robert Morris wrote a worm to have some fun with a vulnerability he reported. Yes, I remember that, grey hairs and all.
Now, I would think that vulnerabilities should be hyped, just like any serial killer, axe murderer, or wanton vegetarian. Calamitous Cthulhu should be right up there for a good vulnerability name.
Yeah right, computers can solve all your ills. Step right up for this patented, or patent-free, elixir medicine! It's the cure for all that ails you. Blockchain included!
OK, so once they produce their own supercomputers, then what? Has anybody noticed that computers are notorious for not being the right tool to solve a lot of serious problems?
(Next on the list, collect garden gnomes, something else, profit!)
Sorry for reality, but I was in Signal Corp. We never got the massive funding. The radios I trained on were from WW2, and were in current operation and deployment. The satellite equipment was 1970s prototype crap. The most advanced equipment I used was used gear from AT&T. Seriously, they sold their 1960's transmitters to the US Army, and it was a big upgrade.
Communications infrastructure being state of the art? Hardly. DOD bought crap because they could only afford crap. If Trump wants Chinese comms out of the network, he can push the budget to do it.
You can shove your head in statistics and in the sand, but don't try to bullshit me, who was trained on equipment that was built 40 years before I enlisted.
Biting the hand that feeds IT © 1998–2021