Comment Re:They obviously aren't "modelling" too hard (Score 1) 308
What?!? Popcorn and soda isn't included? I already pay $20 with popcorn and soda.
What?!? Popcorn and soda isn't included? I already pay $20 with popcorn and soda.
This article reminds me of the days I would build machines for people that constantly "wanted more". They wanted to be able to stuff every drive they ever owned into it. Then they wanted to have their scanner, printer, phone, 5.25 and 3.5 floppy, and cd player/recoreder attached. Then they wanted the best graphics card for playing games, looking at pictures, watching movies, editing pictures, creating 3d graphis for games, and encoding movies. They wanted the best sound card for games, listening to music, editing music, creating music (which of course meant they needed a way to hook up another slew of midi devices). Then they wanted a web server on it. Then they wanted a database server on it. Then they needed a network card, then two, then bonded interfaces. Ah, fun times.
Most packet based DDoS attacks (SYN|FYN|ACK|ICMP) floods do not require a return packet. The source address is always bogus. Reporting it is a joke. New fun and exciting targeted DDoS attacks use improperly set up services/daemons. In this case, recursive lookups on DNS servers are the cause. IMHO, If someone has a fast connection and doesn't disable recursive DNS lookups they should get a warning. After tha,t publishing their whois information on a web site would be a great way to motivate them.
The vast majority of participants in a DNS based DDoS are "administrators" that have not disabled recursive lookups. A friendly, fix your DNS settings shit head, should do IMHO. That being said, "administrators" that do not set up DNS properly deserve a little shame.
They should at least change something so tribes 2 players will feel like they are playing something different. Surely they didn't just steal the unofficial patch? I didn't see a disc gun so I guess removing stuff makes it "different".
You don't need to inspect the deep end of the packet for that kind of traffic. The shallow end (4 bits in) is all you need to do that. TCP over HTTP, HTTP over ICMP, et al all are all easily recognizable by the 4th bit. China doesn't use a great firewall. They use spyware on machines tied into what people think is a great firewall. You need to have something on the end user's machines to filter encrypted traffic or have the keys. China has the keys but prefer spyware.
You do not have to do deep packet inspection to spy on traffic. In fact, you have to spy on traffic to do deep packet inspection. The vast majority of information gleaned about people has absolutely nothing to do with traffic filtering. Things like redirecting DNS queries, logging x-forwared-for headers, persistent HTTP connections, are vastly more popular for garnishing user information. It is easier, and much less expensive, to drop information gathering warez on a large number of machines than implementing DPI. DPI is best used to protect networks from stupid people. Yes it is used to filter access. Only a really stupid network engineer would use it for spying.
I sure wouldn't. Considering how bullshit the charges are. I'd go down in a blaze of gun fire.
OK. First, I thought the first sentence was sufficiently divergent from the second that
I forgot the
Those numbers are only people who responded to the census.
I'll try to catch you up since you've obviously been in a comma for a while. Reagan won, his VP's son trashed the economy and started a couple wars, and in between the clan industrialized a few of their pet projects.
http://en.wikipedia.org/wiki/Prison%E2%80%93industrial_complex
It is in a state with crowded jails and early release for not violent crime. It would be time served if he went to court today. Ironically, he would have had his day in court, had it been physical B&E, 4-5 months ago.
Imprisoned until proven innocent, unless the defendant is rich enough to afford bail, is the law. Servers him right for embarrassing wealthy people.
Brilliant! I've heard of all kinds of schemes to avoid a divorce; murder, suicide, both.. but this one takes the cake.
There are two ways to write error-free programs; only the third one works.