Re: I miss IBM keyboards
I've got a Redragon K552 now after a number of Model Ms started failing after a spill (they seem to have got more fragile as they age). For 30 quid or so it's a really nice keyboard.
47 posts • joined 11 Feb 2016
Oh FFS, are you a troll or simply an imbecile? We *can not* by definition be 100% certain that B will always follow A, that the sun will rise tomorrow, that the LHC won't suck the solar system into its own black hole, that we won't all die within 1 year of COVID, that god does or doesn't exist, that it's safe to eat red meat, white meat, eggs, milk, carrots, alfalfa, or carburettors.
There is no, I repeat *no* way to say "this thing is 100% safe, for everyone, under every possible circumstance. We simply cannot be because to be 100% certain of that we'd have to know the entire future, and every possible future. The only thing we can do is:
a) observe the universe and form a conjecture
b) formally state that conjecture and propose one or more methods of testing it
c) test the above
d) ask others to retest the conjectures with the same methods to confirm or otherwise
e) the above with other documented methods
f) rinse and repeat until a pattern emerges
Even if we repeat b-f a trillion times and all the results point to the conjecture being correct, we can never say it's certain. Newton's laws of motion were seen as certain until Einstein came along.
It's just the same thing to try to say "This type of phone signal is 100% safe, forever" - we can never prove that conclusively, but we can say "on the basis of all experience so far, it is far more likely that 5G is safe than it is unsafe for general exposure".
If you find this difficult, please tell me how homeopathy and herbal medicine has never lead to any deaths worldwide (because it's natural!).
Quote: As to the effects of lifelong exposure to these particular radiations, this logically can not be known by anyone until scientifically sufficient subjects that have lived with these radiation for all their life are both dead and cleared of significant impact.
And this will never be know precisely because 100% of people die at some point of many other "causes" that are in some cases educated guesses and in others "old age". Can you tell me the precise day *you* will die and from what cause? Can you give the precise sequence of events that lead to the death of those you have known who have departed? I understand the yearning for certainty, to be able to know exactly what we should seek and what we should avoid - but our universe just doesn't work like that. In fact, I think it would take the value out of all human happiness and joy if we could predict our lives with complete certainty - we have to evaluate risks and choose to accept, ignore or avoid them, and there by the grace of God go we...
Quote: So for my part your statements and claims of knowing what you are talking about are unbelievable. This does not mean that I know either but at least I am willing to live and let live whilst waiting for impartial validation by people who have the skills and the evidence to back up their statements.
I don't understand what you mean by "impartial". I get the feeling you think that means someone who agrees with you. I'll give you a clue - if a majority of well informed and qualified people using or trusting in the scientific method (not that it's always perfect - but it's sure as hell better than most other ways of predicting outcomes) disagree with you - regardless of political views or state affiliation - there stands a very high possibility that you may be mistaken and misguided. It's not certain, but highly probable.
There's a 0.00000000001% chance I'll step on a stonefish and die next time I go on holiday. I will still choose to take that holiday as the benefit outweighs the risk. I'll leave the exercise of evaluating the benefits of ubiquitous, high speed, low-latency IP connectivity versus the risks for others.
Really? Can you give me a peer-reviewed paper (or preferably more), and then maybe a review of other studies, that clearly demonstrates a deleterious effect from "5G radiation". I think you'll find it hard to come up with anything credible
What most miss it that 5G, by and large, will be using the same bands as 4G when not in dense urban environments. When it is used in dense urban areas, that's where the higher frequency bands come into play - short range, very low power - in fact made even lower by the ability to use active phased array antennas to send the power where needed rather than spaffing kilowatts in all directions from the dreaded "mast on top of a primary school" in the hope it will get to a subscriber - in all ways it's much less exposure for everyone - people near the access points and the users themselves.
Newer encoding techniques mean even in the "traditional" scenario with more remote base stations (NB, still on the same bands as 4G), you'll get a better connection with *less* power radiating into your head.
This is all just Physics and Information Theory - it's all out there to read for free, but if you choose to ignore decades experimental results and all the studies confounding EMF sensitivity (ie people would respond to a fake flashing light on a fake router almost 100% of the time and a real WiFi signal <0.1% of the time) please feel free to go and live in the wilderness and eat roadkill rather than moaning about the very tech you're using to comment here.
And what the hell your comparison with running ethernet via my house is, I have no idea - I'd love it if I could get gigabit here and share it with others. Are you using a psychic connection to el Reg by any chance?
I think you'll find that there is no such thing as "EM Proliferation". If anything, you are probably exposed to far less EMF than you were 20 years ago with only 2G phones, DECT stilll in nappies and far more local overhead cables than now. Modern electronics and software means we need far less power in watts to reach each other than we ever did. We can even communicate "below the noise floor" thanks to experimentation by both amateurs and the military. 5G is another leap in that direction, especially with microcells - instead of your phone ramping up to 5 or 10 watts to reach the cell over the hill, you'll be running microwatts to get to your nearest lamp post or traffic light. Your brain therefore should avoid the roasting that you are probably already suffering every time you call your co-conspiracy-theorist mates.
Anytime - I'll charge you £250 pcm per metre of cable inside my house for 5e. Cat6 or higher £300 per month. Setup fee £15k, as I need a new heating system, fridge freezer and oven.That's clearly not going to be of much use if you don't live in North Herts, but you can't always get what you want.
I think that was before SMETS2 came along which was much more strict on standardisation and has as one if its goals the ability to seamlessly change supplier. Don't forget that the government has been the opposite of the energy suppliers' best mate in recent years, setting price caps that have seen even the biggest fall, and even before that they were (justly) legislated into changing their methods of "customer retention". Smaller players like Ovo and Octopus have changed the market radically since the days of the "big three".
In fact it is possible under SMETS2 to enable a full bid/place energy market, switching tariffs and even suppliers in real-time as demand ad supply change. It's also designed to enable consumers to become suppliers and offer their own energy (eg from PV, wind) back onto the market.
Someone else also mentioned having to change in-home display when you switch - hint - you don't if you buy one from the people that make it (disclaimer - I work for an IHD company).
Bloody hell, another immediate vote-down with no reply to the comment. Voter - have you ever heard of the "Clipper Chip"? Read Schneier's "Practical Cryptography" or Singh's "Crypto", or Sterling's "Hacker Crackdown"? TPM actually turned out to be useful in locked-down environments, but not solely "locked OS" ones. Poettering does some good things, and some bad. I think Pulseaudio is the best compromise so far on sound in Linux. networkd and systemd not so much - solving problems that upstart and NM had already solved adequately.
I think that's exactly the wrong place to put trust. Look at the controversy around TPM when it was first introduced, and internal memos from Microsoft were leaked saying how great it was that they could leverage their OEM market by ensuring the TPM would not allow the installation of anything other than Windows. I think the backlash on that revelation was what ended the Ballmer era and paved the way for the increased openness we see today (and the "Internet will never amount to anything" misjudgement).
What I don't like at all about Poettering's outputs is that it's just way to complicated and intertwined with so may other parts of systemd, instead of being just one reusable part in a chain. The opacity and "tight integration" to the point of being monolithic is frustrating. The learning curve is fine when it works, but appalling when it goes wrong, as it's really hard to pin down what is really misbehaving and how to fix it. OTOH, yes, it's faster to boot, easier to integrate your own services and targets with no real shell knowledge and its ability to safely override distro installed scripts is great.
And worse, the "pluggability" breeds repeated reinvention of the wheel, eg /etc/network or /etc/sysconfig/network moving to NetworkManager, and now on Ubuntu to the terrible netplan. You cannot even properly set MTUs on bridge interfaces - it just takes what the parent interface has. As a sysadmin/architect of 20 years experience I like the results of a configuration to match the documented ones.
In 1998? I don't remember NT3 or 4 having any such provision, and ME and 98 were laughable in terms of security (oh the joys of unpassworded access to C$ shares on US cable networks, had some juvenile fun with that!). I may be wrong, I'm officially ancient in IT terms.
Yep, auditors. **** then ten times sideways for their stupid requests. I had one ask me for "a screenshot" of the firewall rules. I tried to explain that it was a headless system but they would not listen. So I printed out all of the (text based) config files (Shorewall) and they seemed OK with that. A week later they wanted a printout of a screenshot of "all share, directory and file permissions". So, let's do the "obey to the letter even if it's stupid" thing...
We ran a Samba NT domain, so again no GUI to shoot. So I go to the root of the shares on the fileserver and do a "getfacl -R | nc <IP of my desktop:port>" and on my desktop piped the "nc -l <port>" stream via lpr straight to the little printer we'd set up on their desk. After page 1000 they begged us to stop (little desktop HP laser, 50 page paper capacity) as she couldn't print out any of her interim reports. Amazingly they stopped bothering us and accepted somewhat more concise reports the next day.
What the hell do they do going into a big bank with a mainframe?
NB total output would have been 75,000 pages in the Courier font that HP Laserjets use when printing plain text...
Just get a 10 tonne or higher hydraulic press from a DIY/Car repair retailer. Much cheaper and essentially the same thing. Manual 10 tonne presses are probably $300-400.
They will easily crack the cases of any drive, bend the platters to hell and strip the hub from the middle. With glass platters you get a satisfying crunch and tinkle as they shatter!
@Charles9 One of the commentards was talking about a Home/SOHO router. You have to assume in this case that most devices behind it will be trying to talk to something on the outside (looking for updates, phoning home, checking for mail/tweets etc). And if nothing is connecting in or out you'd not really need any NAT awyway!
Thanks for your support Chronos. Unfortunately it seems stating facts is not a way to popularity. Perhaps it was the wording "with no NAT", which I should have phrased as "no requirement for NAT".
Having end-to-end addressing is also vastly more convenient for difficult protocols like SIP/RTP, IPSec, FTP and so on, without having to work around endless brain-dead ALGs and helpers that never work properly.
With /horrible/ things like uPNP on consumer routers (which more often than not implement it and other things badly or incorrectly), it's not NAT that really provides the real security, it's the firewall (which on every consumer router I've seen in the last decade is turned on by default).
And just to reiterate, at no point did I claim that NAT is not possible with IPv6. It's just not necessary.
NAT is *not* a security feature! Firewall policies and rules are applicable to IPv6 in the same way as IPv4. Eg in shorewall, a policy for a simple two-interface firewall looks like:
#SOURCE #DEST #POLICY #LOG LEVEL
int net ACCEPT
fw net ACCEPT
all all DROP info
works equally well for both - accept outbound connections from the internal network and the firewall, drop and log everything else. It's really not that complicated, and with no NAT way more flexible (no more port-forwarding!)
The closest you could probably get is a set of separate VLANs for medical devices with NAC and a heavily locked down layer2 firewall. Given that WannaCry by all accounts only affected admin functions this may already be the case. However you still have to protect the admin network otherwise patients don't get their ops/scans etc.
It seems like it was the admin net that was the source and the major victim in this case - and that matches the experience when my SO had a serious illness - the medical side was fine, but the admin was so woeful and creaky at the hospital she was diagnosed (to the extent that had to *fax* critical docs between departments on the same site, and managed to lose her entire case history) that we demanded she was moved to another (UCH) which was vastly better.
NHS has amazing staff and medical expertise but the inconsistency of admin procedures, tools and more importantly investment across the estate seems to be the major breaking point.
They suck far, far, less than Zyxel. Or Netgear. The same features on Cisco you'd pay £600+. Only D-Link seems to come close in this price range.
I think most of the problem is a complex interface but most competent admins (who understand SIP especially) can negotiate it. Have one in my work basement that uses a VoIP account over an IPSEC VPN logged into our PBX. The only time it's not worked is when the bloody BMS management people have unplugged it.
IMHO they are really good for SIP but you need to know what you are doing to get them to work.
The Zyxels we had that preceded these would drop ADSL, VPN, or VoIP maybe 3-4 times a week. Draytek maybe once a month, and always sync/line issues.
"stopping inbound and outbound SMB connections at the network border by blocking ports 445/tcp, 137/tcp, 139/tcp, as well as 137/udp and 139/udp."
Pretty much any home ISP connection will block those anyway. Any corporate that's allowing those ports freely out to (or worse, in from) the general internet needs a serious clue-by-four application. I continually am flabbergasted in this day and age when we see stories of, eg, NoSQL servers being attacked from the internet. Who the hell configures a firewall that's not "block everything by default"? This is kindergarten level stuff...
I'm keeping my fingers crossed for this year. Last year was a disaster. At about 3pm on NYE, some alerts were raised by our ISP. Trying to get in to have a look I found a number of machines strangely non-reponsive (including our main monitoring server). Thinking the worst, I had a look at the UPS logs which showed the output had gone down for a few seconds. I managed to reboot a number of machines via remote PDUs and get to a more-or less working state.
15 minutes later *everything* went dark, so I was off to the DC. When I got there, I was greeted by silence for the racks and a 160kVA UPS festooned with red lights. One phase of input was gone and the UPS was in shutdown. Managed to get hold of an electrician and on-call UPS engineer. The sparky arrived first and found a blown 300A fuse in the UPS feed. We searched in vain for spares but managed to come up with a 200A in the same size which would do at a pinch. I went back up to the DC and via the radio asked the sparky to switch the breaker back on. I was confronted by a 6 foot fountain of sparks leaping from the front of one of the redundant UPS rack units and a very loud bang indeed. If I'd been standing in front of it it would not have been pretty.
Not too long after the UPS guy arrived with the smell of smoke still heavy in the air. The scorched unit was opened up, revealing a main board covered in soot and the input wires from the rectifiers melted back by over half an inch from where they had been soldered into the board, blobs of molten metal scattered around. The UPS chap although rather surprised checked all the contacts in the frame, which had luckily survived and set off back to base to get a replacement unit.
At about 5am he returned, new unit in hand. We had to replace all 3 phase fuses and then where was a very tense moment as the breaker was thrown again. Luckily power was finally restored. Thankfully due to the way the days fell we had two more days to recover everything. I called in the rest of the team and managed to get 3 people to help me sequencing the power-on (about 120 physical machines and a few hundred VMs). I left exhausted by 7pm (but still was connected at home) and by 11pm on the 1st we had all the servers up, with the application guys in Melbourne finishing up on the holiday Monday.
Ruined New Years for a good few of us that year. And we only got 1.5 TOIL/OT from it - but at least the "right" people remembered what we did and thanked us just a few days ago. Fingers crossed for this year.
Postscript: An IGBT had cracked open in the UPS module, had never been seen before by the engineers. One 300A fuse and 4 more 200A blown...
IMHO they were really nice. Simple interface, great voice quality, no bother at all. They were emergency burners for DR/BCP, and we never had a problem when we handed them out.
The orange-coloured display made them really nice at night too.
I think they were almost a part of Lucent back then though...
Supermicro boxes are generally:
b) rock solid reliability. I've only had one or two server failures in about 10 years where I've had to invoke RMA or warranty.
c) free IPMI with all features included, eg KVM and remote media
d) easily available with practically any combination of drives, backplanes, PSUs, and other accessories. I've got a couple of 1U boxes that even have 3 PCIe x16 slots available. Getting even vaguely custom builds out of HP has been way harder for us as an SMB. With SM vendors, no problem.
e) lots of warranty options
f) OEM front panel/bezel service available.
I think these are the reason that HCIA vendors' products seem to be largely based on OEM's SM boxes.
I am not affiliated with Supermicro in any way, just a very happy customer.
They are in no way "almost as bad as the real thing". All the so-called "studies" that have reached that conclusion have been thoroughly debunked.
Nicotine is not a carcinogen and never has been. In fact it can be beneficial *without* all the deadly tar produced by cigarettes.
It's crap like this that has distorted the picture so badly - and this is clearly the intent of its backers.
You need to at least provide a temperature at which this happens. E-cigs only need to heat the liquid up to about 140-200C in a matter of milliseconds. Can you provide evidence that levels of TSNAs higher than or similar to lit tobacco products in use are present in e-cig/cigar/pipe devices?
Doesn't the sanding equipment on modern trains mitigate the lack of contact point friction somewhat? Or does it only work for acceleration?
I have to say on my line (GN Hertford branch) I've *never* seen any sand coming out of the units on our Class 313s.
Nice to see a rail veteran on here. I was a "spotter" too (Midlands area), my favourites were the Devon/Cornwall Class 50s, from New Street (great sound), Class 45's (had a brilliant visit to Tinsley Depot before they all went), Paired 20s, 56s and 58s at Bescot and watching coal trains and HSTs at Water Orton, and of course the amazingly reliable 37s. Also once saw a 31-hauled nuclear flask train on the Cross-City line at University station. The "new" 60s looked fantastic in the grey+logo departmental livery IMHO.
Really miss the variety of locos we had back then, they all seem to look very US-type these days.
Wow, just nerd-outed myself in a big way!
Ah, but then the landlord will insist it belongs to them, and then alone, and why should the tenant have any say in it? After all, we just sit in the building and supply them with rent....
As for cobbled software... after 3 suppliers' sales teams managed to bamboozle our HR department for a simple personnel management system (ie £10k for something that an NVQ student could have come up with in an hour or two), the powers that be finally let us write our own. Now I get paid the right amount on the right day and don't get phone calls asking why I'm not in 5 days into a holiday in the Med...
have little understanding of security. I've worked on a BMS (maintained by an external contractor) that had a "log in" pane in the gui with a list of users. If you clicked a username, you got a password prompt. But if you didn't bother clicking a username, you could still access the entire system at a full admin level! It would be possible to turn on all the boilers and thermostats to full blast if you so desired. I've even sure it would be possible to cause physical damage, eg by closing valves on the output of running water pumps.
The contractor wanted to gain remote access by simply plonking a DSL router in front and port-forwarding RDP to the PC. RDP, unencrypted, to a local admin account where the password hint *was* the password. I instead insisted on a VPN (using a decent Draytek router which had the benefit of providing a VoIP phone in the plant room), changing the password and hints and removing the local admin.
When the contractor changed I had to go through all of this again. This one wanted to put in an ISDN dialup line, which I was sure would be make the BMS ownable just by knowing the phone number. Grrr.
GlusterFS is *not* a block-capable product. It's file only. IMHO it's also about the slowest for mixed data. And I'd not trust any really valuable data to anything other than RedHat's supported version (RedHat Storage Server).
For filesystems, you've got many more choices, including BeeGFS, MooseFS, RozoFS and more (OSS or semi-open development model) or Exablox, Isilon, Hitachi, HP StoreAll (proprietary).
Biting the hand that feeds IT © 1998–2021