Comment Delta Replacing Flight Manuals with touch tfablets (Score 1) 278
Thought that was a hugh clue.
http://tech.slashdot.org/story/13/09/30/2338230/delta-replacing-flight-manuals-with-surface-tablets
Thought that was a hugh clue.
http://tech.slashdot.org/story/13/09/30/2338230/delta-replacing-flight-manuals-with-surface-tablets
Just read the headline of the summery, was enough, I've come to know BS when and it's presentation.
After the 1983 Beirut Barracks bombing that killed "241 American servicemen: 220 Marines, 18 sailors and three soldiers" Areas of high security have barriers put in place so you have to weave, no more straight shots.
But using Google Earth I get pillars that autos can't get between
http://www.panoramio.com/photo/82858047?source=wapi&referrer=kh.google.com
For a car to set them off defeats their purpose. Her cars front end wasn't damaged, even after the chase
her front end looks to be fully intact, and these pillars are seen as well in the pictures of the event.
http://www.dailymail.co.uk/news/article-2442703/Miriam-Carey-Woman-killed-outside-Capitol-Hill-trying-ram-gates-White-House.html
Yet they still refer to it as a ramming. "The Connecticut woman who rammed a White House barrier with her young daughter in the car before being gunned down by police was suffering from postpartum depression after giving birth last year, her mother has revealed."
http://www.dailymail.co.uk/news/article-2442703/Miriam-Carey-Woman-killed-outside-Capitol-Hill-trying-ram-gates-White-House.html
Beirut Barracks bombing:
The 19-ton Mercedes-Benz truck then passed between two sentry posts, passed through an open vehicle gate in the perimeter chain-link fence, crashed through a guard shack in front of the building and smashed into the lobby of the building serving as the barracks for the 1st Battalion 8th Marines (BLT). The sentries at the gate were operating under rules of engagement which made it very difficult to respond quickly to the truck. http://en.wikipedia.org/wiki/1983_Beirut_barracks_bombing
Sounds like all the shooting was police or Secret Service. Car impact, female with babe in a car with out of state plates, chased, and shot ?
What if she was lost, confused and just made a wrong turn while talking on her cell phone, surprised by the barrier?
Perhaps the true price of paranoia.
Yes it was tragedy of errors and mayhaps bad timing on her part (being in the area).
Shots reported fired, a helicopter reported landing in front of the Capitol. The cop car that hit the barricade appears
to of hit it sliding sideways, he was at first reported as being injured by gunfire - and an "active shooter" scenario was called.
A horde of jellyfish-like animals has forced the shutdown of a nuclear power plant in California.
The gelatinous creatures, 2 to 3 inches long, are called sea salp.
http://www.sanluisobispo.com/2012/04/24/2041453/diablo-canyon-nuclear-reactor.html
Sea salp can reproduce sexually and asexually, and "you can have millions in a couple of days," e
http://www.newser.com/story/144935/jellyfish-like-creatures-shut-down-nuclear-plant.html
Actually jelly fish took down a California reactor many years ago but 1912 (the above links) is all the shows.
I had a friend who managed the network for Bechtel, set my BBS up to pull in usenet that many said it wasn't possible; my setup was his proof.
What year? Didn't many BBSes do this with (non-UNIX) implementations of the UUCP protocol? I also thought some FidoNET systems had gateways to Usenet (I saw a brief mention on the wikipedia article but not sure how long back that went).
There were always gateways but at 10 a minute it was spendy, newsgroups weren't a priority for me
I was a chat board (8 lines). I did use PC prusuit for my personal files http://www.bbsdocumentary.com/library/CONCEPTS/SERVICES/PCPURSUIT/
I ran an AmigA 3000, Cnet software and was part of the FidoNet. Cnet was getting ready for the Internet; we had a cookie file
which was a text file of his wife's recipe for chocolate chip cookies, but a cookie file was required so he added one.
FidoNet does connect to the Usenet, but just as another group. From the Usenet you can read FidoNet, but not the other way around
I can't tell you how it was done as my friend set it up (UUCP protocol and all the supporting files for the Amiga and Cnet) which was easy for him.
His system was a Sparc workstation, we were worlds apart in computer systems
I pulled my messages from him who was pulling them from across the state. I'd pay him a bit for my feed (a couple Amiga text groups)
but his largest group was for the NeXTstation, so most likely around 1990-91.
Secondly, none of that has exactly dick to do with what's being discussed -- which is the use of motion sensors to capture vibration, which is then via a complex software application, recreates the keystrokes entered from a nearby keyboard.
Yep - I read the summery, replied to your reply, then read the article and thought damn ----------- missed it by that much.
First you need to download and install a neural network program in your smartphone, train it with loads and loads of data.
You know, the same smartass attitude was held by our government officials regarding the "hollywood" possibility of hackers gaining control over power grids, missile launch systems, water distribution systems, etc. And then Stuxnet showed up,
Not the same, Stuxnet and even
most over looked backdoor into a system.
Auto-run being on by default is most likely because people would be inconvenienced or not having a clue what to do next.
This is a proof of concept; It demonstrates that such an attack is now possible.
Proof of concept of something I've known since the early 90's that a computer system gives off electromagnetic energy
and you can read that energy through a wall (apartment). They just made it smaller and moved it closer.
I had a friend who managed the network for Bechtel, set my BBS up to pull in usenet
that many said it wasn't possible; my setup was his proof. He ended up going to The University
of Colorado to study telecommunication; talking about getting in at the ground floor.
The local book store had a book "The Internet "Complete Reference"" 1994 by Osborne.
http://www.goodreads.com/book/show/2868340-the-internet-complete-reference
He kept pushed the book on me saying if I wanted to know about the Internet read that book, so I bought it.
It's 817 pages "The World Wide Web, shortened to the Web" takes up pages 495 to 512 (17) intro:
"Is an ambitious project whose goal is to offer simple, consistent interface to the vast resources of the Internet".
It covers everything at that time. Just like anything there garbage and there's gold, this Osborne book it top notch.
Such a keeper that obviously I have it in front of me for this post.
Strangely enough, nobody seems to be calling attention to the fact that this slideshow confirms TrueCrypt has been backdoored (second slide, page 15). Is it possible to get a degree in applied mathematics without meeting the NSA's recruiting arm?
I didn't read it as there being a backdoor for TrueCrypt -but one being available, and there is if you don't use it correctly.
I started using TrueCrypt and back doored it myself without knowing.
I encrypted one data partition to test it out; but if the OS partition isn't encrypted your not hiding anything,
especially Windows where everything you do is listed in multiple places. Thats just one of many precautions.
I found this after I dug a bit deeper into TrueCrypt (Read TFM). IMPORTANT: If you want to use TrueCrypt, you must follow the
security requirements and security precautions listed in this chapter. http://www.truecrypt.org/docs/security-requirements-and-precautions
The TrueCrypt FAQ http://www.truecrypt.org/faq links to Operation Satyagraha
http://yro.slashdot.org/story/10/06/26/1825204/fbi-failed-to-break-encryption-of-hard-drives
"the FBI has failed to decrypt files of a Brazilian banker accused of financial crimes by Brazilian law enforcement,
after a year of attempts" "Truecrypt and the other unnamed. 256-bit AES was used"
http://en.wikipedia.org/wiki/TrueCrypt#Operation_Satyagraha claims "They enlisted the help of the FBI, who used dictionary attacks"
-real high tech stuff.
Back in May, Google announced that they would be making changes to their SSL/TLS certificates in the coming months: http://googleonlinesecurity.blogspot.com/2013/05/changes-to-our-ssl-certificates.html
Oh No's!
"Even in less-than-obvious places to look for information, such as Google's Online Security Blog, are silent."
To a non-story
"Back in May, Google announced..."
Thanks for that.
Machines have less problems. I'd like to be a machine. -- Andy Warhol