Sealing money from the government owned China telicoms.
Posts by razorfishsl
972 publicly visible posts • joined 27 Feb 2014
Apple tells app makers to strip VoIP toolkit from iOS software in China
High-end router flinger DrayTek admits to zero day in bunch of Vigor kit
Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole
Kaspersky Lab's move from Russia to Switzerland fails to save it from Dutch oven
Code reviews mean Fuck all.
The key features of AV software:
1. Generally runs as root process or with authority of user.
2. Reconfigurable from central location
3. Downloadable updates
4. Uploads data to "central servers"
You can have the cleanest code for review, but a 30 second change can pull in all the data you need.
There is an increase in the lack of user control for all modern apps, these fucking companies will just NOT leave it alone.
PGP and S/MIME decryptors can leak plaintext from emails, says infosec professor
Apple MacBook butterfly keyboards 'defective', 'prone to fail' – lawsuit
They are garbage products,
The keyboards are so BADLY engineered, that some of the keys are raised and this impacts the screen when closed, those idiot apple engineers made the keys curved so that after a few months there are impact marks on the screen.
so far I have had Two screens replaced due to the failure of the finish & the keys impacting and taking the finish off and all they do is fuck you over by reducing the guarantee on the new screen to 90 days.
Commodore 64 owners rejoice: The 1541 is BACK
Re: Bang!
Yep it was an old trick, the track header contained the track number & block
by setting the track header to a different one than expected, caused the drive to error.
Basically the drive went to track XYZ but when it got there , the header was a different number and so it threw an error, validating the disk.
There was also a byte in each sector header that was 0x09 or was it 0x21.. if i remember correctly..
my system produced a disk that only the directory track (trk18) could be read, the rest of the disk was unreadable.
Tech VCs sue Uncle Sam over President Trump's immigration chill
Windows app makers told to think different – you're Microsoft 365 developers, now
Is your gadget using secondhand memory? Predictable senility allows boffins to spot recycled NAND chips
Fork it! Microsoft adds .NET Core 3.0 including Windows Desktop apps
You WILL see windows running on linux in the short term.
Currently MS is spending hundreds of millions maintaining a full os, but you see all there other kit
MSQL, 365, is migrated to linux, but just not available for the "public" yet.
as the billions start to roll in from 365 and MSQL cloud integration they will gradually move everything to offsite, possibly keep some onsite AD+skype engines for speed.
Then all they have to do is shove some massive pipes up the ass of every user and start pumping the cash out, since everyone will be so tied it it will make 50 shades of grey look like a childs bedtime story.
Password re-use is dangerous, right? So what about stopping it with password-sharing?
Even if they hash the passwords, let's not forget that recent MASSIVE cockup with windows authentication, where they were passing password hashes out to fake SMB sites, those sites were then using that data to identify the users passwords against rainbow tables.
However that aside, sites should not be sharing user data , becasue that would allow them to profile who has what services with whome.
LLVM contributor hits breakpoint, quits citing inclusivity intolerance
So now the Leftwing is going to try and take over the open-source community.
There should be NO acceptance of money from ANY politically motivated group.
Won't be long before they start inserting their own people at the top of the tree and we can see WHY they targeted "LLVM" because it has tentacles into major projects.
VTech hack fallout: What is a kid's privacy worth? About 22 cents – FTC
Bill Gates declined offer to serve as Donald Trump's science advisor
What could Facebook possibly do next to reassure privacy fears? Yup – make a dating app
GitLab crawling back online after breaking its brain in two
I weep that people using GIT , who you would expect are programmers or at-least IT savvy, think it is a "server system"
Same reasoning I suspect that people think if it's in the cloud or 365 you don't need to waste money on backup storage, "because the providers have their own backups"
Or the people hiring IT staff in Hong Kong based on "tell us your current salary or we won't look at your CV"... nice......
What the @#$%&!? Microsoft bans nudity, swearing in Skype, emails, Office 365 docs
Amazon warns you have 30 days before Music Storage files bloodbath
Bitcoin's blockchain: Potentially a hazardous waste dump of child abuse, malware, etc
Whois? More like WHOWAS: Domain database on verge of collapse over EU privacy
Patch LOSE-day: Microsoft secures servers of the world. By disconnecting them
IBM thinks Notes and Domino can rise again
Let's Encrypt updates certificate automation, adds splats
Potentially this is dangerous,
since you could launch servers under a companies existing SSL that are
malware , but have a valid ssl /https encryption to tunnel thru AV software.
so for example I could launch a https server under the domain WITHIN the network and then use https encrypted tunnels to corrupt other workstations within the organization , without it triggering any network or firewall alarms.
China ALTERED its public vuln database to conceal spy agency tinkering – research
If you buy hardware from China , you throw away your security.
If you guys could actually read Chinese and were on the forums you would piss yourself with shock at the information available, people selling the ability to load " modified firmware into devices at the factory level, Illegal reverse engineering & hacking to openly steal I.P & you guys think an exploit database is news.....
don't even get me started about malware being injected into hotel feeds by government sanctioned companies or HARDWIRED "bypass" boxes fitted to patch ROUND firewalls, all thanks tof your local government funded police & security dept.
Does Parliament or Google decide when your criminal past is forgotten?
Same rules apply,
There should be no "right to be forgotten" as long as the original data remains in the court file.
When they destroy ALL records of the court case held in the legal files, all news paper articles and any other sources THEN google should be required to remove the data.
in the UK you can go back 400 years , in some court cases "pendle witch trials" springs to mind.
Surely those people who were acquitted also have the "right to be forgotten", let's start by burning and destroying ALL historic records of legal cases.
Marvell cooks up 400* Gbps Ethernet chips
Microsoft builds Uncle Sam custom versions of 365 and Azure Stack
Intel didn't tell CERTS, govs, about Meltdown and Spectre because they couldn't help fix it
The e-waste warrior, 28,000 copied Windows restore discs, and a fight to stay out of jail
Re: Oh, come on
No you CANNOT.
lets say for example you have a machine with win 7 that is fully licensed.
Then as PART OF A DISCOUNTED UPGRADE you get a win 10 license from that win 7
Then your company dumps/sells the OLD win7 machines to a recycler.
Then that re-cycler RE ENABLES the win 7 license.
YOU ARE in breach of the license terms, technically speaking when you upgrade software you are NOT supposed to sell the old version to someone else.
Careful with the 'virtual hugs' says new FreeBSD Code of Conduct
Re: Oh my fucking gawd/ess ...
Trigger warning.....
Then they should just fuck off.
Many of these code project have extensive histories, when you join you abide by the rules that have been established by the group.
Everyone seemed to manage before the SJW's and soy boys came onto the scene, but no these individuals just cannot resist inserting themselves into every process, continually trying to control the way humans reach consensus.
The answer from the group should always be "fuck off you are not wanted here" if you cannot abide by the current group consensus ... then don't come here to contribute.
Hands up who HASN'T sued Intel over Spectre, Meltdown chip flaws
Crypto-gurus: Which idiots told the FBI that Feds-only backdoors in encryption are possible?
Blackbird shot down, patent nuked by judge in Cloudflare legal battle
Bluetooth 'Panty Buster' 'smart' sex toy fails penetration test
To hack Australia and learn its secrets, buy second-hand furniture
No parcel drones. No robo-trucks – Teamsters driver union delivers its demands to UPS
Talk about a positive mental pl-attitude: WD Ultrastars shed disks without hit to capacity
Re: 6TB in air
Actually no.
The drives pressures or generate negative pressure depending on the temperature profile and altitude.
So it will automatically be subject to pressure variations.
Then there is the issue of what happens during a drive failure. you can bet with a helium drive your chances of recovery are zero, since the air would be to dense to recover the data
VTech fondleslabs for kids 'still vulnerable' despite sanctions
Typical of a HK based business.
you only have to speak to the CEO and board members of any company in HK to understand that they consider "IT" at the same level as Janitorial services.
They think paying 16k-20K HK a month is too much for IT staff who only need a secondly ed., and that if you don't buy kit from places like Taobao and brands like TP-Link then you are budgeting poorly.
I kid you not..
Add into that mix that most males who can use a computer in HK seem to think they are some sort of IT geniuses just because they can write an app or stick some cat 6 cables in the back of a router and the stage is set.
Then you have to deal with idiots at the top who get so deeply involved into writing software, that they start dictating things like:
"store the date as text" in the database because we won't need it as a date....
"make the spacing on the HTML page match this exactly"
Then the programmers have to go and patch applications to parse dates out manually using own built libraries, because it turns out 5 months later it might be useful, now the stage is set for all sorts of data injection.
During this continual process of piss poor mind changes they are master-bating about "waterfall diagrams" "SPRINT" , "KPI" and any other buzz terms they have read in their glance through software development....
but not a single code repository in sight, because they did not get to that part of the process or it's not "buzz wordy" enough.
Don't even get me started that many of them consider working on their LIVE systems as normal.
Butt plugs, mock cocks, late pay and paranoia: The world of Waymo star Anthony Levandowski… by his kids' nanny
Microsoft wants to patent mind control
UK taxman has domain typo-squatter stripped of HMRC web addresses
Judge rm -rf Grsecurity's defamation sue-ball against Bruce Perens
That is not the issue.
The issue is that they are taking "free" software modifying it AND THEN SELLING it back as closed source.
The argument is that it breaches the license they took the original software under.
You can modify & keep the software PRIVATE, but you cannot SELL it back without releasing the modifications.
In reality they could still earn a good profit AND comply with the licensing, but it might be a bit more work for them.