Yup. My HP 16500A logic analyzer from the '80s has that kind of touchscreen panel.
And how does that even work, anyway? Don't we have an embargo against Cuba - and yet we're leasing some of their land for our black site? Or, was the Bay of Pigs more successful of an operation than we thought and we've been occupying them secretly ever since?
Really, Facebook should add a feature that let's anyone in a photo veto its entire publication on the site. They already have great facial recognition algorithms - I should be able to completely remove a photo of me that my friend posted, instead of just removing the tag.
Once everyone is used to this, they'll introduce "limited content inspections" to ensure devices don't contain "Terrorist materials" before boarding. Any device which the passenger refuses to unlock and hand over for inspection won't be permitted to fly.
Yes. The tech industry's entire business model is flawed, because the massive profits being delivered are dependent on uncompensated overtime, illegal collusion and wage fixing, and H-1B abuse.
How long was the attack taking place? What kind of Internet connection does Sony Pictures have? To ex-filtrate 100 TB of data is going to take a while, no matter how you cut it. My guess is that number is significantly inflated.
I had the same issue and it did take quite a bit of digging to nail down. Comcast Business with 5 static IPs, same setup as yours.
1. Make sure your reverse DNS entries are correctly configured such that the domain of your reverse DNS lookup will match the domain your messages are claiming to be from. dashed-ip.sea.wa.comcast.net will generate spam warnings on many mail servers if your server claims to be mail.joecorp.com. Call Support and they will update it for you on the phone within a couple of minutes. Also make sure you're not in a residential IP block.
2. Make sure you're not actually an open relay or otherwise allowing unauthenticated senders to generate outbound messages. I was using MailEnable, and had it misconfigured such that it wasn't actually doing the authentication I had selected. This got me blacklisted quickly. A few bounce messages had links to the blacklists themselves to submit appeals; they'd dutifully take me off each time but I'd get re-added automatically. It took a few weeks of trial and error to get this one fixed. I know you say you're not...and I thought I wasn't either, having specifically taken steps to disable open relaying. But it turns out I didn't quite get it the first time, and was still relaying messages without authentication.
I'd imagine issue (1) may be a big contributor to your problems, personally.
What's the power consumption of the server? Depending on the load, you might be well-suited to pick up a small ARM-based system (or more than one) if the loads are somewhat light. Personal web server/file server/LDAP/etc. doesn't need a lot of horsepower and there's a good chance you might be burning extra electricity unnecessarily.
I think that'd be a pretty major undertaking; once the devices are "bricked" by setting their ID to 0, the OS can no longer communicate with that device. Seems like it'd be pretty tough to push a patch that way, unless they fix the USB stack to allow guest devices = 0.
I remember reading somewhere that most pornography can't be copyrighted, because "obscene materials" aren't eligible for copyright protection. Is that still true?
Netflix should have laughed in their faces and told them that if they want to stop Canadians from subscribing, they'd need to get every ISP and VPN provider in the country to block access to it, then continued on happily taking credit card payments and sending traffic to Canada.
It's not Netflix fault that Canada doesn't produce any noteworthy cultural exports. Lots of other good stuff, sure, but TV and movies not so much.
Unless something has changed with a recent system update, last time I checked the local device encryption for Android disabled the Gesture and PIN input, leaving Password as the only option. I don't exactly care to enter a full-on alphanumeric password every time I take my phone out of stand-by, so the feature is of limited use.
I prefer to use TextSecure. This hooks into the SMS and MMS handlers and redirects them from the internal store, to an encrypted store with an application passphrase. Keeps my phone easy to open up, but keeps the only data I have an interest in protecting safe.
More systems like this should really have a "duress PIN". Enter a specific number which is different from your unlock code to immediately wipe the device, no 10-retries required.
Lacking evidence to the contrary, it seems Microsoft actively approves this state of things. They have a human performing certification and content compliance, which involves actually installing and verifying these applications:
"Content compliance: Our certification testers install and review your app to test it for content compliance. The amount of time this takes varies depending on how complex your app is, how much visual content it has, and how many apps have been submitted recently."
With that statement, they must be 100% complicit in these scams, because it makes them money when someone bites, and because it keeps the number of apps in the app store up.
Since I'm replying to an AC post I don't feel a need to include citations, but there's been at least one case where the domains in question were purchased through registrars and registered to owners both outside the United States but because the domains themselves were
They'd have to use a non-U.S. TLD as well.