The place I work is required to allow itself to be scanned, both from outside and inside the network perimeter. However, whenever the auditors show up to do their inside scanning, we have to disable a number of security systems so they can "do their job". Kinda defeats the whole purpose, but whatever makes the auditors happy.
Slashdot videos: Now with more Slashdot!
The code used in Verizon's "Throwback Thursday" release is what is called International Morse Code, invented in Germany, not American Morse code, invented by Morse himself.
The real roots were tape recorders. Those were the first Sony (consumer) products I saw. Also, transistor radios. Next came portable (B&W) TV's - ones that would fit on a small table. My brother bought one and then invented the world's first remote control - it was a long stick with wooden attachment that let him change the channel while remaining in bed. Lazy SOB. I did have a Trinitron for a while, and while awesome for its time, it has long been shipped off to recycling.
"Consider this: In the past 10 years has the distribution you run changed significantly in what it offers over other distributions? I think you'll find the answer is largely no."
Unfortunately, the answer is yes, and in a negative way. Distros got better for a while, but then they maxed out around 2001, and it's been a gradual decline ever since. Luke may have the best of intentions, but his solution is no solution.
Frederick Brooks had it right - there are no silver bullets.
"Employees now are issued laptops with a rebranded version of RHEL installed."
Why not SCO Linux? Given that SCO and IBM are such close business partners. Typical example:
"IBM DB2 Version 8.1 Certified on SCO Linux 4.0
Thanks for the feedback. I've been to China once (several years ago) and back then, while the "Great Wall" was evident, it was not omnipresent. Since then I have been blocked by "Great Walls" imposed by hotels and conference sites (all in the US) that were far more oppressive, and which got me into looking at VPNs. I now have 5 VPNs to choose from (none of them from a commercial provider) but I understand what you are saying - given enough time, the mole-holes will get filled in.
"China started assaulting VPNs recently as well."
China has been blocking VPNs since 2011. It seems like an annual ritual. Here is a typical article from back then:
Eventually the blocking eases, or people figure out another way around. It becomes a game of "whack-a-mole".
Cool. I might even buy one. Or more.
The scratching sound of a quill pen against paper - done in by the typewriter.
The sound of a hammer and chisel carving Latin into marble tablets - done in by the quill pen and paper.
The squishy sound of a reed stylus forming cuneiform symbols in clay tablets - done in by hammer and chisel.
Don't know if any of them had a song.
I applaud this move, but ONLY IF https websites are also flagged as being insecure (typical example follows).
The references are cited in the text on p. 2 - look for  and .
However, good catch r.e. the RFCs. That must be the reason the paper was accepted. This journal doesn't let just anything in.
Bill Foster, Congressman from Illinois, can program in assembly language, among others.
.. "What a completely forgettable performance!"
There - no more need for Dejan to file "Right to be forgotten" requests.
I like cash too, but ATMs can be hacked, and banks put more hoops in your way before you can get your money back. In my case I think it was the bank's own ATM that was compromised - in any case, I didn't have to file police reports in far-off towns first.
There's one or two devices (called "IP Swtiches") that do the monitoring and power cycling all in one box. They work basically the way you've described.