* Posts by mr_souter_Working

139 publicly visible posts • joined 27 Nov 2013

Page:

Approaches to building the enterprise cloud

mr_souter_Working

Re: I hate Agile as well

"Does HCI actually give you the ability to go to a web interface, spec your server and provision it without ever going near a techie like a cloud platform does?"

That was possible 7 or 8 years ago - just using Microsoft VMM - I know because it is exactly what I did for the small company I worked for. Couldn't get the developers to use it at first, and it wasn't as fast as these days - but they could request and provision servers themselves without asking anyone (they were allocated a certain amount of resources, and once used, they needed to start deleting old servers before creating any new ones).

Currently working for one of the big names - and getting any sort of server is a nightmare of red tape and excuses. Things go backward - we sell these sort of solutions to our customers, but can't get them working internally.

:(

What does an enterprise cloud look like?

mr_souter_Working

yeah - not so much

As someone who is working for one of those global organisations that you would expect (or at least hope) to be leading the field in this sort of stuff (our advertising crap says we are anyway) - I can tell you that we can't even get 5 year old tech working properly for our internal systems. The last excuse I was given was - "not enough storage allocated to enable document versioning - and not enough storage available to assign more".

All in all, I will believe it when I see it.

US voter info stored on wide-open cloud box, thanks to bungling Republican contractor

mr_souter_Working

Re: Data mining?

where did you learn basic maths?

John Smith - born in 1970

current year - 2017

(2017 - 1970) is how many years again?

that's right - it's 47 years.

UK PM May's response to London terror attack: Time to 'regulate' internet companies

mr_souter_Working
Childcatcher

my rant

I'm not going to bother about the whole "bomb the middle east = create more terrorists" issue, that is a whole different can of worms.

problem 1 - the politicians either don't understand technology, or have a vested interest/ulterior motive in pushing their specific agenda.

problem 2 - the public that will vote for these politicians do not understand technology, they are pushed into being frightened of the terrorists/paedophiles/bogeyman of the week, and someone proposes an easy solution to the problem (people like easy solutions, and like to know that someone is "doing something")

A cynical person would find the timing of the latest attacks and the sudden flurry of arrests to be a touch suspicious - not that i'm a cynical person!

Terrorist attack at a concert kills 22 (less than 2 weeks before an unnecessary election), entire country says "screw you, we're not terrified, lets have a concert to raise money for the victims", PM looks weak and poll numbers slip, loads of arrests and police shown to be clamping down on the terrorists, controlled explosions in various places, some of the people arrested are released without charge

Day before concert, another terrorist attack kills 7, suddenly "enough is enough" says our PM (maybe she is trying to look tough) - and lets regulate and clamp down on the internet - we need people to have less encryption, less privacy, more monitoring (because that's worked so well in the past!), etc...

so, we get led up the garden path, and all online privacy is gone (does anyone expect that any future government of any party will attempt to get rid of the Investigatory Powers Act?), unless you know what you are doing, in which case you become a suspect (we don't know what that person is doing online, they must have something to hide!!!!! Investigate them!!!!)

now, where did I put that tinfoil, need to make myself a new hat................

(I really want to put three icons on this - damn you Register, stop limiting what I can do online!) :D

Retirement age must move as life expectancy grows, says WEF

mr_souter_Working
Unhappy

Pension age vs retirement age

Currently, I will be eligible for state pension at age 67 (only 20 more years).

I should be able to start properly saving for retirement at about age 65. (that should be when most debts/mortgage/etc are cleared)

I will probably need to work until I am in my mid to late 70's (maybe even early 80's) to be able to afford to retire with any degree of comfort.

Just as well that most of my family tend to live well into their 80's/90's before finally dropping dead - hopefully I will have a couple of years to enjoy retirement.

Of course this could all become moot if one of the nutters currently in charge of a country with Nuclear weapons decides they really want to play with their shiny toys.........................

Twice-crashed HPE SANs at Oz Tax Office built for speed, not strength, and turned off error reporting

mr_souter_Working

Re: Common guy interpretation?

"1- The fibre optic cables feeding the SAN were not optimally fitted -

How is this possible? There should be a "click" sound when the LC connector is fitted in. It's always been "insert" or "not inserted". I don't recall any instance where a FC cable can be halfway inserted. Maybe the cables were "bent"."

at a place I worked previously, we had an issue with some servers with FC attached storage arrays that took forever to start back up - eventually I went to each of the DC's and discovered that years earlier (when they were installed) someone had attached the first FC card in the server to the input on the storage array primary controller and then the output of the same controller on that storage array to the output of the second card in the same server - it took me a while of head scratching before i finally figured out where the cables were supposed to go (they were all properly seated, and to a casual glance they appeared fine - and the servers started and worked, just VERY slow to boot), but that caused repeated array issues for years that nobody had ever really bothered with - we found that all of the servers were connected the same way to their external storage (6 servers in all). luckily it was only the Exchange system, and it was a fully redundant system (active/passive nodes in primary DC with offsite passive in DR location).

WannaCrypt: Roots, reasons and why scramble patching won't save you now

mr_souter_Working

Re: Lack of any finger pointing at the right people.

WTF - "Why on earth do we accept Microsoft (and every other vendor) declaring that their OS /software is not going to receive critical security patches within a reasonable lifespan of the hardware it supports and in the absence of 100% backwards compatability"

A - personally, I class 17 years as well outside most reasonable expectation of hardware support (most enterprises work on a 5 year hardware refresh cycle in my experience)

B - for YEARS everyone has been complaining that MS have NOT removed all backward compatibility - now you are moaning that they are not keeping ENOUGH backward compatibility.

C - most of the security issues faced by modern OS's are because of backward compatibility - the Wannacry worm exploited a hole in SMB v1 FFS!

LastPass now supports 2FA auth, completely undermines 2FA auth

mr_souter_Working
Black Helicopters

One of the biggest issues

Most people use the same username on all sites - and usually the same email address

personally, I use a different (and random) email address (from one of the 3 domains that I own) for most sites, together with a unique password for that site. It gives me the advantage of knowing if a site has been hacked (or has just sold my information), as I then see spam coming to an address that was only ever used on that single site.

Never sign in with any Social credentials (Facebook, Google+, Microsoft, etc...)

I also use a combination of KeePass for day to day stuff (several copies stored in different locations and synced every few weeks), encrypted text files contained in encrypted zip files on an encrypted USB stick for truly important stuff (with encrypted backups on my home NAS and at least one offline USB drive).

Me? paranoid? never! who said that I was?

mr_souter_Working
Pint

Re: Better alternatives...

have a beer for the Hitchhikers Guide reference

I am going to assume you mean to use a full (to the brim) chamber pot, and put your encrypted USB stick in a sealed bag inside it - no burglar or hacker is going near it (especially not after it festers for a few weeks) - of course, you may have to move out of your own home due to the smell..............................and obviously write the password down on the underside of the pot. :D

WannaCrypt 'may be the work of North Korea' theory floated

mr_souter_Working

Re: Hmm... North Korea is a good scape goat

"So it's convenient to have a space goat"

I like the idea of a space goat - it'd be useful on the ISS.

:D

74 countries hit by NSA-powered WannaCrypt ransomware backdoor: Emergency fixes emitted by Microsoft for WinXP+

mr_souter_Working

Re: How bad will it get...?

"the horrifically badly locked down macro facility of Word" - actually this is an issue in all MS Office apps - and it can easily be locked down by Group Policy - assuming that the Technical staff are consulted and ALLOWED to make the required changes.

too often they are overruled or ignored because locking things down may result in some person complaining that they are not able to use X, Y or Z that worked yesterday - despite it being a gaping security hole.

and then a lot of the in-house IT is being outsourced, often to other countries, where they don't know the internal systems well enough to make any proper recommendations, and even if they did (and were willing and skilled enough to make recommendations), they have no idea who to recommend anything to.

mr_souter_Working

my tuppence worth (as everyone else has their opinion, why not add mine) :D

for what it's worth, here's my take on this (and all the other instances where some virus has trashed a network).

Most viruses arrive by email, generally spoofed messages either purporting to come from another user inside the network, or from a trusted external contact. The user then opens the message, then the attachment, (or clicks the link), and then allows the attachment to run macros. This then allows the malware to download the nasty bit of itself, and possibly contact the command and control network.

The nasty stuff then starts encrypting files on the servers - and on the local PC. it will open every drive that the user has mapped, and will create an encrypted version of every file it can see, before deleting the original. Some variants (like this one) will also seek out all other machines on the network to infect them.

So, how do we stop this from happening? or at least slow down the spread when it does hit, or limit it's effectiveness when it arrives.

1. Educate the users so that they stop blindly opening any and all emails they receive.

2. Stop users from treating their work computers like their home PC's - they are not, they are for business use only, but people are very rarely held responsible for the state of their computer, and the higher up they are, the less likely they are to be held accountable.

3. Have working email filters that can identify internal email addresses and reject them as spam (spoofed). Also some external email scanning to remove spam and viruses before it even hits the perimeter of the network.

4. Use file filters to prevent the malware from creating its encrypted version of the file - this stops it from deleting the original. The desktop might be infected, but as long as the file servers are OK, all user data should be safe. It would actually be better to have a file filter that only allows specific file types to be saved to the server, but I am not aware of any way to do that at the moment.

5. Stop using a single AV product across an organisation. There should be one (or more) AV engines scanning emails coming in, a second in use on client desktops, and a third for the servers.

6. Currently the UK compliance rules (well known) are that all critical and security patches released by vendors should be installed within 3 months - this is too long (as proven here). But everyone in IT is well aware that if they install a patch and something breaks, they get the blame - so there is reluctance to force the issue, instead they use staged patching and try and limit any blame they might get.

7. Stop using out of date Operating Systems - the excuse about testing software for compatibility only holds up for so long - Windows 7 is reaching end of life, and many organisations have not even started testing their software works on Windows 8, never mind 8.1 or 10. and to still be using Windows XP is poor.

8. Stop having non-technical people making decisions about technology. Put some qualified people in place and give them the authority and budget they need to put proper controls in place, back them up in their decisions, and test it properly to make sure that it meets (or exceeds) their designs.

9. Ensure that your internet connection is not allowing malware to come down - perhaps by limiting file downloads to only a few approved users or computers.

10. Use firewalls on local machines - they are often turned off, or opened to the point of uselessness simply to make life easier for everyone.

11. As one person found out, the original variant stopped when it attempted to contact a specific web address and got a response - this could be fairly simple, configure your network so that all unidentified URL's receive a response from a specific internal web server - as the malware gets a response, it exits. And if a user goes to an invalid URL, they will see a web site advising them what they did wrong - it becomes a win/win. (implementation may be difficult to accomplish on some environments)

12. If for some reason you cannot replace an out of date computer - and yes, there are valid reasons to retain old OS's - then either air-gap it from the network, or put it on a very secure locked down network with very limited access to and from it. If it's important enough, then you want to do everything possible to reduce the chance that it could be affected (maybe also look at installing some sort of deepfreeze software on it to try and reduce the time required to get it back to original configuration)

13. Have the separate teams work together to put in place effective strategies and solutions - rather than each team is responsible for only their small bit of the puzzle - this often means that things don't interact well and less than optimal decisions are often forced in place.

There are other things that could also be done to help limit the effectiveness of malware - nothing will ever truly kill it off.

WannaCrypt ransomware snatches NSA exploit, fscks over Telefónica, other orgs in Spain

mr_souter_Working

my tuppence worth

for what it's worth, here's my take on this (and all the other instances where some virus has trashed a network).

Most viruses arrive by email, generally spoofed messages either purporting to come from another user inside the network, or from a trusted external contact. The user then opens the message, then the attachment, (or clicks the link), and then allows the attachment to run macros. This then allows the malware to download the nasty bit of itself, and possibly contact the command and control network.

The nasty stuff then starts encrypting files on the servers - and on the local PC. it will open every drive that the user has mapped, and will create an encrypted version of every file it can see, before deleting the original. Some variants (like this one) will also seek out all other machines on the network to infect them.

So, how do we stop this from happening? or at least slow down the spread when it does hit, or limit it's effectiveness when it arrives.

1. Educate the users so that they stop blindly opening any and all emails they receive.

2. Stop users from treating their work computers like their home PC's - they are not, they are for business use only, but people are very rarely held responsible for the state of their computer, and the higher up they are, the less likely they are to be held accountable.

3. Have working email filters that can identify internal email addresses and reject them as spam (spoofed). Also some external email scanning to remove spam and viruses before it even hits the perimeter of the network.

4. Use file filters to prevent the malware from creating it's encrypted version of the file - this stops it from deleting the original. The desktop might be infected, but as long as the file servers are OK, all user data should be safe. It would actually be better to have a file filter that only allows specific file types to be saved to the server, but I am not aware of any way to do that at the moment.

5. Stop using a single AV product across an organisation. There should be one (or more) AV engines scanning emails coming in, a second in use on client desktops, and a third for the servers.

6. Currently the UK compliance rules (well known) are that all critical and security patches released by vendors should be installed within 3 months - this is too long (as proven here). But everyone in IT is well aware that if they install a patch and something breaks, they get the blame - so there is reluctance to force the issue, instead they use staged patching and try and limit any blame they might get.

7. Stop using out of date Operating Systems - the excuse about testing software for compatibility only holds up for so long - Windows 7 is reaching end of life, and many organisations have not even started testing their software works on Windows 8, never mind 8.1 or 10. and to still be using Windows XP is poor.

8. Stop having non-technical people making decisions about technology. Put some qualified people in place and give them the authority and budget they need to put proper controls in place, back them up in their decisions, and test it properly to make sure that it meets (or exceeds) their designs.

9. Ensure that your internet connection is not allowing malware to come down - perhaps by limiting file downloads to only a few approved users or computers.

10. Use firewalls on local machines - they are often turned off, or opened to the point of uselessness simply to make life easier for everyone.

11. As one person found out, the original variant stopped when it attempted to contact a specific web address and got a response - this could be fairly simple, configure your network so that all unidentified URL's receive a response from a specific internal web server - as the malware gets a response, it exits. And if a user goes to an invalid URL, they will see a web site advising them what they did wrong - it becomes a win/win. (implementation may be difficult to accomplish on some environments)

There are other things that could also be done to help limit the effectiveness of malware - nothing will ever truly kill it off.

Well this is awkward. As Microsoft was bragging about Office at Build, Office 365 went down

mr_souter_Working

Re: I'm in Texas

nobody disputes that the area covered by Texas is larger (nearly 3 times larger) than the area covered by the UK. But it kind of overlooks the fact that has less than half the population of the UK.

Microsoft use distributed locations to host their authentication servers - so different people in different places will authenticate to different servers - is that too much to grasp?

Obviously this was not a global outage - it was an issue with some of the authentication servers in some locations - thereby affecting some users.

America 'will ban carry-on laptops on flights from UK, Europe to US'

mr_souter_Working

If these are so dangerous, why allow them on any flight?

so you can't have laptops in the cabin on flights from Middle east countries - why allow them on any flight?

if they are so dangerous, and so likely to contain bombs (or be easily made into a bomb onboard), why allow them on any flight - ban them on all flights.

oh that's right - because they want to regularly show that they are doing things - and a blanket ban everywhere would be too much of a problem to impose, as well as not giving the security services the ability to shout about how the sky is falling every few months.

Virgin Media scales back Project Lightning target in first quarter results

mr_souter_Working

Speeds are not consistent

I pay for 200Mb (I did register my interest in the 300MB service that is available in my area, but so far they have not bothered to contact me) - but regularly get less than 100Mb

the upload speeds are laughable - 12Mb maximum, but at least I always get that

if you dare to use the internet at peak times and hit their bandwidth cap, you can expect to have your speed throttled to about 40Mb, until it resets at about 1am

I am a SamKnows tester (have been for years) - so get a monthly report card on my connection - so i know exactly how dire the service is, and how often it fails completely.

London councils seek assurance over Capita's India offshoring plans

mr_souter_Working

Re: Far too late

not just Capita

include WiPro and HPE in that as well - anything that can be offshored will be (and some stuff that can't/shouldn't will be going as well)

Friday security roundup: Secret Service laptop bungle, hackers win prizes, websites leak

mr_souter_Working

Disk encryption - yeah right

sure, they have whole disk encryption setup - assuming the drive ever completed the encryption process (i have encountered times where, after several months in use, it was noted that the disk had never encrypted, because the user only ever used the laptop disconnected from mains, and it was never powered on while connected).

Many public sector organisations also use incredibly insecure encryption passwords - often just some part of the asset tag of the machine - because users need something they can remember).

I have also seen cases where the encryption password was written on a label attached to the laptop, as the user could not remember what it was.

And of course, if the laptop was merely sleeping, then the disk encryption is bypassed - and it has already been shown that plugging in certain USB sticks, correctly configured, will net the account credentials.

All in all - you should always assume that if someone has physical access to a computer, that all data on it is accessible. The only way to be sure nobody can get anything off of a computer, is to make sure it never gets onto it in the first place (this applies to all computing devices, phone, tablet, desktops, laptops, etc...)

UK to block Kodi pirates in real-time: Saturday kick-off

mr_souter_Working

Re: Meh

"feetsball" - i like it

lump this and all the other sports in a barrel and shove it into the sea.

i could not possibly care any less about if any sport is on any form of television, provided i am neither obliged to watch it, nor pay for it. if Sky/Virgin/BT/et al want to gouge the people that want to watch it, that's their issue. I don't think the BBC should be squandering out license fee and trying to outbid any of them.

The Psion returns! Meet Gemini, the 21st century pocket computer

mr_souter_Working

hope this isn't more vapourware......

or an early april fool - or some weird joke from El Reg.

if this is real, and not too expensive, i could see me getting one

one of the things i really like about my Psion 5mx (still in use), is the Serial adapter, to let me interface with switches and the like. maybe this will at least work with a USB-Serial dongle.

IT guy checks to see if PC is virus-free, with virus-ridden USB stick

mr_souter_Working

a certain Scottish Council

a few months ago, 3 times in the space of 2 weeks, same sets of users each time, despite organisation wide emails advising them not to open the attachments, not to make the PDF that suddenly opened in Word a trusted file, and not to enable the macros in that file.............. cryptolocker variant emailed in (the mail filter was seemingly unable to block it, and the proxy was unable to stop the download of the malware payload). after the second time, they listened to me and we imposed file level filtering to prevent the creation of the encrypted files. the third time, all that happened was a single computer was infected, which was promptly rebuilt. i've since left to join a different company, where the internal IT and the project management explains oh so many things.........................................

Lily Cole: You'd hate me more if Impossible.com were a success

mr_souter_Working

how the hell are they losing THAT much money

£250k per year - and there are 3 people employed

what are they doing, burning 50's for heat????

mr_souter_Working

also

who the hell is she?

never heard of her (but then, i doubt we attend the same functions)

now, how do i go about getting the Government to give me a couple of hundred thousand - i have some ideas for websites that nobody will visit.......................

Sage advice: Avoid the Windows 10 Anniversary Update – it knackers our accounting app

mr_souter_Working

Re: Not limited to Sage

you're obviously not a server engineer - we get this all the time

certain MS products REQUIRE .NET 3.5 in order to work, but you can't just enable it on a server, you need the original install media (as if we build servers using media these days!)

very annoying, but you get used to it

:/

mr_souter_Working

Re: Ironic

"All XP and Vista drivers and programs should work on Win 10"

seriously???????

hang on a second, i will get a hose, as you seem to need some air piped to where your head is

mr_souter_Working

Re: "operating system updates end up disabling the framework"

"But there is also a responsibility of the OS developer to not break backwards compatibility" - no there actually isn't, they should certainly make sure that users are AWARE that something will no longer be compatible - at least to the extent of putting in the KB article for the anniversary update that .NET 3.5 will be disabled as part of the update. however crApple get away with ditching any sort of backwards compatibility whenever they feel like it - both in the OS and obviously in the hardware

MS have bent over backwards to retain compatibility with everything, and they get roasted for it on a regular basis (after all, do we REALLY need to be able to run 16-bit applications in this day and age?).

so they're damned if they do, and damned if they don't.

i agree that the MS really seems to be letting the testing phase slide a lot - and i have no intention of moving away from Windows 7 until i replace my main computers (hardware driver issues prevent win10 from working reliably) sometime in the next 2-3 years.

UK Labour man Owen Smith: If you wanna be a leader, you gotta stop with that lens

mr_souter_Working

come one - maybe he's smarter than you give him credit

personally, if i was a non-entity that wanted to be someone (rather than a non-entity that is happy to remain one, as i currently am), then posting a picture with what appears to be live login details for something (anything), would be pretty guaranteed to get people talking about me (i've never heard of him before). the login details do not need to be correct - or they could have been changed immediately after the picture was taken, before it was posted. unless someone tested and confirmed that those details were (or maybe still are) live, i wouldn't judge him too harshly.

on the other hand, if some bloody idiot did accidentally post a picture of live login details to the internet, then hell bloody mend them for whatever damage is done - at the very least, someone logging in and changing the password to something else.

:D

Spoof an Ethernet adapter on USB, and you can sniff credentials from locked laptops

mr_souter_Working

Drivers?

i wonder if that would work on systems where the logged in user does not have rights to install device drivers, or where the organisation uses technology to prevent any unknown USB devices from being installed.

You shrunk the database into a .gz and the app won't work? Sigh

mr_souter_Working

Re: When life imitates art...

but, but, but, it's NEVER the network that's at fault!!!!

at least according to the network engineers I regularly have "energetic" discussions with.....................

Tech support scammers mess with hacker's mother, so he retaliated with ransomware

mr_souter_Working
Unhappy

i got one of these calls once.................

i had every intention of winding him up and wasting time - but when he said he was "calling from windows", i just burst out laughing, told him in no uncertain terms what i thought of him, and hung up (over his protests that he was legitimate)

i've told all my friends and family that if they ever get these calls, just to hang up on them - or tell them to phone me.

never had another call from them :(

Third time unlucky? HPE in redundancy talks with UK services staff

mr_souter_Working

maybe i didn't make the right choice

as I have just accepted a job in Erskine, and handed in my notice at my current job............................. :(

Student Loans Company burns £50 million in IT project superfail

mr_souter_Working

Not surprised - their IT has been a joke for years

in 2004 (roughly), I worked in an office near the student loans company in Glasgow - and was interested to find an open wireless network one day, I was even more interested when I connected to it and was able to browse servers. and really interested when I discovered that I could actually view the recordings of phone calls stored on these servers.

I was never prompted for a username or password at any point.

I did notify them, and made sure to never connect to the wireless network again - but it was available for at least 6 months if I remember rightly.

ISPs: UK.gov should pay full costs of Snooper's Charter hardware

mr_souter_Working
Alien

Freedom of Information

One thing that a lot of people repeatedly spout, is that if you are not doing anything wrong, then you have nothing to worry about. How about we simply make this a freely available resource - and that anyone, at any time, can request the full and detailed history of all communications for ANYONE - so that includes all phone calls, text messages, emails, browsing history, location metadata, etc......

after all, if you are not doing anything wrong, then you have nothing to hide.................

see how well that goes down with the sheeple - sorry voters.

just an idle thought..................

on a more serious note - if this is a government controlled database, that contains information on me - then surely I have the right to submit an FOI and ask for not only all information they have gathered on me, but also the details of who else has been looking at it.

let me just go get my tinfoil hat.

'Powerful blast' at Glasgow City Council data centre prompts IT meltdown

mr_souter_Working

DR plan?

I was talking to one of the affected users on Tuesday evening, and nobody had told them anything - he just knew that they had no access to anything all day Tuesday.

EE recalls all 'Power Bar' USB batteries due to 'fire safety risk'

mr_souter_Working

Re: Money back?

they gave the power bars free to all customers that wanted them - so what money should they be giving back?

mr_souter_Working

Re: Screw that. Cough up the refund.

you do realise that EE are under no obligation to give a refund for an item that they gave all of their customers FOR FREE!!!

they do not even have to give any credit - they are actually being pretty good about it - although I have 2 of the power bars (one from my own phone when I was an EE customer, and one from my work phone) - I can return both, but would only be eligible for a single £20 voucher - as I am no longer an EE customer (the offer only applies to 'eligible customers')

and then I would struggle to buy anything with it - as my company is the customer, not me - bit of a lost opportunity, unless you can use the voucher in store

Boffins: How to generate crypto-keys using a smartphone – and quantum physics

mr_souter_Working

Sorry Frank - already exists

www.ijesit.com/Volume%202/Issue%206/IJESIT201306_68.pdf

at least once

ISSN: 2319-5967

ISO 9001:2008 Certified

International Journal of Engineering Science and Innovative Technology (IJESIT)

Volume 2, Issue 6, November 2013

544

A New Randomized Cryptographic Key Generation Using Image Priyanka.M, Lalitha Kumari.R, Lizyflorance.C and John Singh. K School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India

Ye Bug List

mr_souter_Working

Problem with IE and el Reg

for the last few days (probably all week) - whenever accessing the register from IE10 or 11 (work and home - 3 different computers) - one of the CPU cores is maxed out, and IE hangs - it doesn't happen on all parts of the site - or all the time - but it is regular enough to become a real annoyance - i cannot change to any other site, i need to crash out of IE completely to proceed.

Chrome doesn't seem to have any issues - but i have noticed the same problem on 2 laptops and a desktop - all after accessing the register.

I'm Feeling LUCKY OR LAZY™? Chrome gets hands-free voice search

mr_souter_Working

And this is relevant in the UK?

unless you have your language set as US English in the Nexus - you cannot use this feature. appears to be the same in Chrome.

while it is an interesting feature - how about waiting until it is available to the other 99% of us before putting it on a UK site?

Page: