Forgot your password?

Comment: Re: "Hard redirect" (Score 1) 376

by buchanmilne (#47705317) Attached to: Rightscorp's New Plan: Hijack Browsers Until Infingers Pay Up

Similar logic applies to having the ISP cut off your connection entirely -- if they got statutory authority for one of them, I bet they could get the same kind of permission for the other (if the original language of the law doesn't cover both already).

I am not sure how it works in the U.S., but for example in South Africa, retail internet access products are usually provided subject to Terms of Service, which would allow for remedial action of some kind for abuses such as spamming, port-scanning etc.

Next up: Booting all of your connectivity -- mobile as well as hardline -- through one, integrated, Big Brother-ish app.

You say that as if there isn't a billion-dollar broadband policy (PCRF) and control (PCEF/"DPI") market

Comment: Ticketing tools rely on (Score 1) 232

by buchanmilne (#47696983) Attached to: Daimler's Solution For Annoying Out-of-office Email: Delete It

And the best way tools such as this have to communicate updates to those who shoupd get the updates is .... by email. And the Daimler solution would mean I wouldn't easily be able to see the updates I missed.

Surely there are other mechanisms to keep people stress-free while on leave? I just turn off email synching until the morning I return to work (with a suitable OoO message set).

Comment: Re: Minor detail glossed over in the headline (Score 1) 72

On Android, access to the contents of the device requires the screen to be unlocked. Does iOS also require this?

(Access to the device without installing drivers isn't an issue, but the computer OS should prompt before automatically mounting the device too, which I believe Linux does but Windows doesn't).

Comment: Correlation does not imply causation (Score 2, Insightful) 211

by volkerdi (#47143343) Attached to: Study Finds Porn Exposure Associated With Smaller Brain Region

More pseudoscience. They say that they're not sure whether this means that porn shrinks your brain, or if the shrunken brain causes porn viewing. But, this leaves out the very real possibility that this correlation means nothing whatsoever. The site below collects correlations that look pretty convincing in the graphs, but quite obviously are unlikely to be cases of causation in either direction:

Comment: Re: Good...? (Score 1) 279

by buchanmilne (#46253263) Attached to: Ubuntu To Switch To systemd

1) You can use a different logger with systemd
2)To watch log messages with journal, journalctl -f

There are still some things I don't like about the journal (I haven't seen how to specify different retention rules for logs of different applications), but then I've only spent a few minutes actively using it.

Maybe the thing that irritates me about journal is I don't know what previously unsolved problem it is trying to solve, while making some log processing difficult.

Comment: Re: Probably for bootable CDs (Score 3, Insightful) 232

But, if you are booting from CDs, and the CD has the rest of the media, why do you need the utility for verifying signatures on the boot media (1.44MB image)? Bootstrap the installation image from the iso9660 part of the CD (or network in the case if a network install)? and have that contain the signature verification utility.

Hint: RPM-baswd distro have been doing this since rpm 3.x, or about 1999.

Really, who uses floppies for installation these days? Sure, maybe floppy emulation on a DRAC or iLO or ILOM, but they all
-support CDROM or DVD emulation
-PXE boot (with relatively large images possible via TFTP)

If none of these are options, just write the whole (hybrid) ISO image to a 4GB USB flash disk and be done with it.

I personally haven't used an actual CD-RW or DVD to install a syatem in about 5 years. Either network install booted via PXE for servers, or USB flash disk for laptops.

Comment: Re:From a comment there (Score 1) 341

by buchanmilne (#45835529) Attached to: Linux Distributions Storing Wi-Fi Passwords In Plain Text

c) full-disk encryption can be tricky to do right on laptops, which are the main user of WiFi.


I have been using full (or, full enough, /boot isn't encrypted) disk encryption on my laptops for years. Since my only non-laptop is a workstation in a secure facility, I only did full disk encryption on that a few months after first doing it on my laptop (which is a much bigger security risk than my workstation).

If I have seen farther than others, it is because I was standing on the shoulders of giants. -- Isaac Newton