Re: Not an apology
It all fizzled out when it became apparent that we weren't actually that interested in each other.
185 publicly visible posts • joined 22 Sep 2015
I spent a week migrating a small office to a hosted system. Frankly it should have only taken two days but on the first day I had just migrated Exchange from on prem to the hosted solution and whilst checking the mail flow I opened an email at random and found this:
http://imgur.com/Tyf8uO5 (Yes, I kept a copy of the email! I couldn't believe it frankly)
The three women in that email chain were all friendly and attractive and the alternative was heading back to the office chock full of standard nerds.
So I dragged things out and enjoyed myself. Frankly it's one of the best working weeks I've had.
So I didn't get an apology, but at the end of it I did get a date.
It's not that everyone loves paint, its that it is quick, familiar and is already installed. Even having it on the store is going to be a pain. My users aren't able to install from the store, but having a free and quick application that allows them to do basic image manipulation is very useful, I guess then it'll be added to the build...
I was seeing suggestions of Paint3D, GIMP or Paint.net or the 'free' Photoshop CS2 as alternatives. Which is fine but a very rough test had me open paint , resize an image and save it in less time that GIMP took to load. I guess the same would be true for paint.net and PS would be worse. And although I've not used it for more than 30 seconds I'm assuming Paint 3D is wildly more complicated than paint even for the same basic functions.
It's like getting rid of notepad because you've bundled Wordpad, their functions are comparable but notepad is lightening fast and does the minimal function that lots of people need with zero fuss.
It isn't just you. LG have been the last bastion of SD and Battery flexability in recent years. Looks like those options are even more limited now.
I'd possibly give up the SD slot, but a replacable battery is infinitely more convenient than having a pocket USB charger.
Classic alt-right tactics, misdirection of the argument away from the core elements of the argument.
Perhaps, they have generated some of this themselves, but lets be honest it's not the issue. Whatever they have done does not mitigate or cancel out the horrific tirade of abuse that they suffered from a well organised and co-ordinated horde of young men.
There is no justification for the personal attacks that they suffered.
Also I'd reject out of hand anyone that turns to return of kings as a reliable reference.
The term is Warrant Canary, currently used by services that may be subject to US based request for information that also inclues a gagging order.
Basically you post a sentence that says 'We have not been subject to a request to introduce backdoors for government surveillance'.
When that request does come in you remove the sentence and everyone can infer that this means you have received the request. It avoids the explicit ban on informing users directly of the request. I'd be surprised if the UK gov haven't made this illegal also, although I haven't read any of hte text so thats a complete guess.
It's like you people are willfully missing the point.
At a kiosk machine/library machine etc you can't pull the disk out because it's completely fucking obvious to anyone nearby that you've just unscrewed the top of the box and are in the process of stealing some hardware.
You can't boot from a disk as they've (hopefully) locked that down/removed the dvd drive.
With this vulnerability you can hold down the enter key and get a root shell, to any casual observer you are just using the machine as normal, whilst the reality is your up to nefarious shenanigans that you shouldn't be.
"Clone the harddrive"... yes, by using the unexpected root shell that you've got to from this vulnerability.
I've been using made up shit for social media for years, not only can I not remember them all they're all used for exactly nothing beyond occasionally stalking someone elses profile.
But how do they define social media. Pretty much anything these days comes with some kind of social media-esq element. Do they need my Battlefield accounts? How about spotify? I certainly hope they don't want Playstation network accounts as I suspect my account name of Mullah-Lite may raise a few eyebrows, especially if they look up the address it is registered to...
1400 Defense Pentagon Washington, DC 20301-1400
"not so hyper specialist. And they were not trying to be (in quotes) ‘scientific’”."
Goddamn specialists, they're as bad as Gove's experts. People knowing a lot about a thing and then writing about it so other people can know about the thing, basically useless if you ask me.
Of course it gets worse when they try to apply "science" to it too, imagine using a methodical approach to presenting empirical data. You'd have to be some kind of New Blob Clerist Elite Chatterai Urbanist to behave like that.
They've released enough information (Flaw in the version of FF used with the 'tor browser' project) that we know to not use that browser.
You're know now that you are going to need to use Tor as your proxy and use a different browser. Ideally one that doesn't have flaws, or at least one that doesn't have the weaknesses that the bundled version of FF has. Even better would be to retrieve everything via curl and view it offline.
Dear BP Member,
On December 25th 2015, all BP members were mailed regarding a specific vulnerability with one of our test servers that was holding some user’s data. We were initially informed of this breach by two security researchers. The server was immediately shut down. At this time we did not believe the data was accessed by anyone other than the two security researches.
We were informed this morning, April 25th 2016, that the data on this server has been illegally distributed and could now be in the public domain.
Please be assured this information did NOT include any credit card data, and user passwords were not accessible. The vulnerability was specific to a test server and not part of our production database.
The privacy and security of our members data is of the utmost importance and all concerns we receive are dealt with immediately and comprehensively.
Out of a general matter of caution we strongly suggest you take the following action as recommended in our last email to you in December of 2015: Please change your BeautifulPeople password.
To do this; simply login to www.beautifulpeople.com and go to ‘Account’ -> ‘Settings’ -> ‘Login information’. From there you will be able to update your password.
Should you have used the same password on any other website or device that holds private information, we suggest that you change these passwords too.
Kind Regards,
The Team at BeautifulPeople
-------------------------------
Don't seem to have the one from the 25th. This was in my spam folder though (and all the spam was in my inbox, brilliant) so my have been trimmed already.
"I wouldn't trust any consumer-grade (or even ISP-provided) wireless router much further than I can throw it."
Whilst I understand your point the router I got from plusnet has a pretty good throwing weight. I reckon i could get it down the garden and over the wall fairly easily.
The cisco I actually use is much heavier, I could barely chuck it halfway down the garden I reckon. Although with a couple of Cat5's plugged in and thrown like a hammer I could probably put it through the neighbours back window.
Where to start.
Very early on i my career I was generously given an external iomega Zip drive, but no PSU. No problems as I am also studying towards my BTEC in electronics and computer technology; I whizzed up a spare cable, jury rigged it to a molex hanging out of the side of the box and plugged it in. Everything ran as expected and I was pleased with myself.
Cue a few months down the line I'm not using the Zip drive for anything and have unplugged it, leaving a pair of bare wires hanging out of the side of the box. Bare wires that, I realise, are hovering millimeters above the surface of my cup of coffee. I very carefully try to move one away from the other and instead lump it with my meaty fist and blow my PSU.
Much later I'm in charge of a file server for a client. This is my first foray into virtualisation. I've built a new box in vCentre, got it up and running, replicated shares and confirmed permissions. All is left to do is to mirror the data from the old server to the new.
I setup the mirror (using Double Take I believe) and let it get to 100%. Jigger and poke the logon scripts to redirect our users to map the new server location, check its all ok and leave it a week.
After a week I check that no-one is using the old server, which they aren't, and set about deleting the data from the old server.
Have you spotted it yet...
I get a call half an hour later from the client saying "all our stuff is disappearing in front of our eyes". I check their share and they are correct, everything is deleting in front of our eyes. It was then I learned the vital maxim; break the mirror before deleting the source.
"And no, no person alive today should have to care what his/her[..] grandparents did 200 years ago. But as far as I am concerned you still owe us billions of dollars and some gratitude"
But I don't care what my grandparents did, so you can do one.