Forgot your password?
typodupeerror

Comment: Re:There are no "remote" exploits for bash (Score 2) 329

by Deagol (#48019003) Attached to: Bash To Require Further Patching, As More Shellshock Holes Found

If you're on the RHEL security/patch list, you may have noticed a huge number of updates to ksh over the past couple of months. I found this odd -- until the recent shellshock thing went public. Perhaps this class of attack works against ksh as well? Looks like code reviews of core OS binaries may be ramping up since heartbleed.

Comment: Re:Break Their Legs and Put Them in the Everglades (Score 1) 235

by Deagol (#43005489) Attached to: 'This Is Your Second and Final Notice' Robocallers Revealed

Do you speak from experience of using this technique? Or are you summarizing other online accounts?

As someone who filed personal BK 15 years ago, I have mixed feelings about this. On the one hand, I am a strong believer of personal responsibility. But on the other hand, I loath the credit and debt collection industry with every fiber of my being, with their many awful tactics.

What you describe sounds like anyone could default on any old legitimate debt and then with some paperwork and brass balls simply get away without paying it back. Why the fuck shouldn't I max out my credit, stop paying the house, car, and credit car bills, and then reap the benefits of getting in the clear? This seems too easy (court/legal legwork aside).

Comment: Re:personal experiences (Score 1) 504

by Deagol (#40812613) Attached to: Can a Regular Person Repair a Damaged Hard Drive?

Dude, get a few of these:

http://www.amazon.com/Vantec-3-5-Inch-Aluminum-Removable-MRK-401ST-BK/dp/B003DVTWQ6/

http://www.amazon.com/KingWin-2-5-Inch-Internal-Tray-Less-KF-251-BK/dp/B00475DQ6Y

The benefits of the external trays with the benefits of direct bus connections. Assuming you have a sane OS to recover with, hot-swapping should be a non-issue.

Comment: Re:Not so simple (Score 1) 575

by Deagol (#38111340) Attached to: Full Disk Encryption Hard For Law Enforcement To Crack

(IANAL)

Boucher not only consented to a search, he unlocked the drive with the the CP on it for the border/customs agent. This is the unique part of this case that makes it pretty much irrelevant for the generic case. The court ruled (as I understand it) that because he gave up the password once, he had to do it again when asked by the court.

If he had never unlocked the drive to begin with, and kept his mouth shut, then the outcome would have been very different.

To err is human -- to blame it on a computer is even more so.

Working...