Forgot your password?

Comment: Re:You mean... (Score 1) 139

by DarkOx (#47917103) Attached to: AT&T Proposes Net Neutrality Compromise

That is pretty much because the router you are using is weak sauce. Its partly true. Protocols without congestion control UDP/ICMP for example could saturate your connection. The Internet as it exists today though is mostly a TCP affair. TCP has congestion control. To manage the incoming priority what you do is have your local router queue the ACK responses and delay them for the TCP flows you have at lower priority. The remote side will slow down its send rate until the ACK response rate falls inside a window.

Comment: Re:You mean... (Score 1) 139

by DarkOx (#47917053) Attached to: AT&T Proposes Net Neutrality Compromise

Lets assume a customer is to be given three tiers default (PHB), EF ( voice/video etc), BLK (bulk torrents etc dropped first)

The ISPs router should be configured to accept X bandwidth at priority EF from any given customer. Packets that exceed that rate are simply be demoted to EF. That is fair to everybody. All of us get a little media priority that can cut in line ahead of someone else's PHB or BLK traffic. All of the EF is aggregated into one fair queue, all the PHB traffic fair queues, finally all the BLK traffic fair queues, the EF queue outbound is served first, followed by EF, than by bulk if there is space. Customers can use the BLK queue or not but if they are running something like torrents its to their advantage because it will mean those packets get dropped before things like browsing when there is congestion. Or customers can do NOTHING at all and everything just defaults to EF.

And exactly how does your hypothetical user control incoming bandwidth with their "home router?"

Simple they manage the outbound rate at which they send ACKs and let TCP on the rremote host figure out the rate limiting.


Comment: Re:Time for new terminology (Score 4, Insightful) 511

by DarkOx (#47910163) Attached to: Extent of Antarctic Sea Ice Reaches Record Levels

You jest but first it was global warming, then global cooling, than warming again and finally climate change. What it should be is "atmospheric CO2 level rise"

That is all the more we can really say in macro. All these attempts to predict outcomes have only damaged their credibility. Rational thinking people should still find it of great concern that we have ever increasing and never before seen (while humans have walked the earth) CO2 levels, and you follow that up with and their exist relation ships between solar energy retention, ocean currents, ocean acidity, and mean temperatures, etc with that.

Nobody really knows what will happen at least not on a short ( 0-50 year) time scale. If they just would have been honest up front about the fact that human activity is radically altering the composition of the atmosphere and that there will be consequences but those can't be entirely identified because its a hugely complex interconnected system maybe it would be taken seriously.

Instead we got decades of alarmist and bogus predictions. its no surprise that so many folks are so dismissive now.

Comment: Re:So-to-speak legal (Score 0, Troll) 380

by DarkOx (#47908455) Attached to: Comcast Allegedly Asking Customers to Stop Using Tor

You really are naive! I am not saying big cable is great but big government control and regulation of the internet will be far worse.

Anonymous anything will be the first to go! The legal ( and its sound reasoning ) will be sure the first amendment provides you can say pretty much anything you want but it says nothing about you being able to do it in anonymity.

The next issue is going to probable cause, uploading to much? Well you must be a criminal copyright violator and their will be be a warrant to search your computer so fast your head is gonna spin.

You don't want Government to have that kinda of control Look at Turkey's internet crack down! Things started getting a little interesting in the middle east and suddenly bam! not internet freedoms for you. Think it won't happen here? Looks at Schenck v. United States and the Espionage acts. Consider all the crazy provision is the PATRIOT act nobody has been able to over turn! Sure the courts might eventually come to some kind of sense and fix things but that can take decades!

Anyone with any awareness of history AT ALL should not want a government controlled internet. If you want the Federal government to do anything maybe it should forcing ISPs like Comcast who have infrastructure that depends on granted monopoly rights easements and the like be operated as common carriers but you definitely don't want them any more involved than that!

Comment: Re:How about (Score 2) 208

by DarkOx (#47891595) Attached to: Turning the Tables On "Phone Tech Support" Scammers

Yes is that cut and dry. This a person who has phoned you up with the intent to do you harm. His/Her reasons don't matter. (S)He has no right to try and defraud you. (S)He isn't stupid either, he knows the folks (s)he is working for are fraudsters and (s)he knows this and is participating anyway.

If this person is so desperately poor than they should be calling and asking for charity. This is malicious behavior and it deserves an in kind response.

Comment: Re:Not just Reno (Score 2) 437

by DarkOx (#47890437) Attached to: If Tesla Can Run Its Gigafactory On 100% Renewables, Why Can't Others?

As I said it definitely will clog particulate filterers if they are not removed or bypassed. I don't know what other harm to the exhaust it could do (not a truck guy myself).

I suspect if used for extended periods it will damage (over heat) values along with their guides and seals. I suppose it could cause additional wear on rings as well.

Keep in mind though what it really does it produce an over rich condition something that would not have been uncommon at least for short periods on older engines that used either indirect injection and/or mechanically controlled injection systems. So for at least short bursts I would not anticipate much harm.

Comment: Re:It's a bad sign (Score 1) 223

by DarkOx (#47889693) Attached to: U.S. Threatened Massive Fine To Force Yahoo To Release Data

I read this argument often and here is my response.

Provided you are going to vote for someone you can:
Vote for the guys who made the mess in the first place. Taking them at their word that they really mean to clean it up. You must do this knowing that they thought these things you are so outraged by where good ideas at one time. Which should make you question if they truly share your values and lead you to wonder if their solution will be worse than the problem is today.


You could vote for someone new. Who also says they want to fix it. Can they who knows, might they prove to an even worse disaster than current crop sure. Then again they might be a whole lot better, we don't know unless we let them try.

So the real question is if you are going to vote for a main stream Republican or Democrat both groups having a pretty solid track record of FAILURE for the past 20+ years what result can you expect?

Comment: Re:So what? (Score 1) 110

IBM was probably rightly worried about the FCPA.

Which does make it illegal to engage in that sort of behavior for a US business even in places where that is the norm. Now personally I think this is another example of the globalism people trying to have it both ways. They want "free trade" but they also demand US companies compete while being gagged and handcuffed. There certainly are parts of the world where its just the way business is done.

Either we should not have free trade agreements with these places - looking at Mexico (NAFTA is border security nightmare too). Or the FCPA should have an exceptions list, for much of eastern Europe and south America.

On the other hand FCPA does protect share holders from obscene amounts of unaccounted monies going out the door. That is important, but not as important as the over all success of the organization. I would much rather a company I own stock in occasionally have a few hundred K$ vanish but get that contract to be the sole provider of widgets to all of East Bumbfuckistan; when you get down to it.

What would be even better is if East Bumbfuckistan would clean up their act and create a system of laws that prevent bribery and similar in efficiencies and create a generally fair market place where everyone competes on merit and has access to quality information but I don't think it should be our job to make up rules to follow in places where their clearly are none and punish ourselves for failing to do so.

Comment: Re:Not just Reno (Score 4, Interesting) 437

by DarkOx (#47889333) Attached to: If Tesla Can Run Its Gigafactory On 100% Renewables, Why Can't Others?

No its just normal diesel fuel, which by the way is pretty much the same thing as coal oil, just slightly different levels of refinement, most vehicles could use them interchangeably.

What they do typically is put a switch in the o2 sensor lines, and dash mount it. When the sensor is disabled the engine management goes into its limp mode will keep the injectors open. The engine uses much more fuel this way so most only do it when they want to annoy someone. It will also as you might guess clog filters etc if they are not also removed and its done often.

Comment: Re:External IP (Score 3, Interesting) 208

by DarkOx (#47889123) Attached to: Turning the Tables On "Phone Tech Support" Scammers

Yea but its a metasploit module so you run metasploit on some very disposable vm you have out on Amazons aws in the free tier.

Either have your revershell go back to that IP and forward it on your own system or just bank on tact these losers don't have the skills it would take recover your ip from your shell code in memory or see the outbond connection on their firewall and have it call your back directly.

These guys are following a script. Most of the actors probably don't know how to deal with things much outside that. They are using an off the self remote access tool and social engineering. If they could pwn your box without your help they'd skips the steps where they setup the bogus call center, train employees, pay to make a bunch of often long international phone calls, etc and move strait to the profit step.

If they can't get you to fall for the scam they probably are not very dangerous.

Comment: Re:Here's an idea (Score 1) 448

by DarkOx (#47827725) Attached to: Could Tech Have Stopped ISIS From Using Our Own Heavy Weapons Against Us?

No but we can lean from it; that and the 'highly successful' intervention in Libya where things are not a great deal better today.

People can argue as much as they want about our "obligations" and if a humanitarian crisis exists or not but there are some really fundamental questions that need answering before we make any moves.

1) Assuming we can use air superiority followed by a somewhat traditional ground force to beat down the "state-like" macro organization that is ISIS; how will we deal with what is left? The Taliban still exists! Al-qaeda still exists. If we don't get them all these groups reorganize or survivors form new groups (ISIS). How do we tell the good guys from the bad after the more 'regular' forces are dispersed? Are we going to raise an army of 500K people again and go house to house? Why will that work better than last time? Why won't we find ourselves right back here in another ten yours a little older and little poorer.

2) Can we politically do this right now. The current president is on his way out in two short years. Much of his core electorate is made up of anti-war types. There is no reason to think his chosen successor whoever that turns out to be is a lock for the election. Our enemies are no stupid they know this. They know if they make the right moves at the right time they might well break our resolve. How do we handle that exactly, We don't even have a solid pro-intervention/anti-intervention trend down our major party lines right now?

3) Could we find the troops required. I doubt there is political will for a draft. The worst of the economic crisis is over. People remember stop loss abuses and heavy leanings on gaurdsmen. There has been a force size reduction in progress now for some time. If we try to muster a serge will folks volunteer?

4) Putin and Assads relationship is a wildcard, given our already tense situation with Russia, is going into Syria (which most seem to agree is needed to really deal with ISIS) kicking a hornets nest, are we prepared to deal with the consequences. We don't seem to be where Ukraine is concerned, not where the rubber meets the road anyway. Nobody is drawing up papers to join them with NATO. The EU is not prepared to stop buying Russian gas, etc.

Honestly I don't think we are doing ourselves any favors with this tuff talk. The best thing to do right now in my mind is sit back and watch, hopefully develop some quality intelligence resources.

Comment: Re:Automated test in is a minimum (Score 1) 152

by DarkOx (#47818681) Attached to: Can ISO 29119 Software Testing "Standard" Really Be a Standard?

Sure it can. If there are any heap-allocated blocks remaining (not freed) at exit, the program has a memory leak. Again, there are good tools to help you find these leaks, like valgrind memcheck.

Really can you point to any contemporary operating system that would NOT free all the memory allocated to a process when it exists? I guess you might mean if your process asks other "servers" to do things like say just exists without closing database connections etc, the other process might not free resources associated with yours but that is not the same thing as a memory leak.

Comment: Re:Seemed pretty obvious this was the case (Score 4, Insightful) 311

by DarkOx (#47818357) Attached to: Apple Denies Systems Breach In Photo Leak

You need to take a step back and consider the actual threat. If you are going to post the ciphered content of your password database on the front page of Slashdot yes the cryptography better be done right.

If you going to keep it on your desktop or on your phone and NOT send it over the network. Than I would say the value it affords you in being able to use longer passwords, with greater randomness, and unique passwords for every account is a win. The only anyone is going to get hold of it is if they pwn your computing device. If they do that than they don't need to beak the crypto they will just wait with the keylogger running for your to unlock it and collect the secret.

At that point though you rather than $PUBLIC_WEBSITE have become the attackers target. Once we are talking about a targeted persistent attack, there is little any of us will do personally to be safe if our attackers are any better equipped/capable than script kiddies.

Most people will listen to your unreasonable demands, if you'll consider their unacceptable offer.