You sneaky bastard
You sneaky bastard
I'm sure there's an algorithm or list that could tell me all of the possible "desirable" IPs in the
When you buy a beer is there a line item for electricity, another for glasswashing detergent, another for depreciation of the stool you're sitting on?
Of course! It was the only way I could get the seat at the bar for free, rather than buying it outright for $699.
It was all covered in the contract that they printed out on the receipt paper.
Of course, this is phones shipped and not phones sold. Nobody actually buys an Android phone, they get it free with their plan.
I often wondered why the telcos don't pass on their cost by rolling it into the subscription charges.
Because if they did that, it would have to be a line item that they charged you for on the bill. And then, after the "contract period" expired, they wouldn't have grounds to continue charging you the same price, in spite of the fact that you "repaid" the subsidy a long, long time ago.
And, even they had some signficance sometime or somewhere, why should I care about how they manage lines of ancient code?
Because they roll up the money they make on re-selling the same code base year after year, insert the money in their nostrils, then finally, they separate out single lines of code and snort them.
What about the time when everything requires it?
Need we truly agonize over monitor selection at the End of Days?
TVs, PCs, even your router and modem are very low on the list.
Gotcha. You said medical equipment was priority 0, so we've marked the TV/PC/Cable modem as -1.
This IS Slashdot, after all!
By far my favorite feature of Win7. Windows key -> type want I want to run (usually under 4 characters) -> Enter. Very efficient.
That was my favorite feature of Vista.
There is one, it's called Slashdot. Use your moderator points properly and dumb posts aren't an issue.
I would, but then I can't post on the same story, even if it's in a different comment thread.
It sucks that the discussions I'd most like to spend my mod points on are also those in which I'm more likely to comment in, but that's just the way it is around here.
I wonder if there's a solution to the conflict of interests that presents though. Perhaps they could unlock moderation on a discussion if your comment itself gets moderated?
"Use em or lose em" they say. More often than not, I opt to lose them
We're all freaks and flirt with each other all the time. Whether it gets serious or not is a different story (and one I have many of.)
We, the users of Slashdot, would like to collectively subscribe to your newsletter.
The above example pertains to boot loaders, except that you have the first boot loader set the environment to "boot something" which happens to not be an operating system (actually boot loaders can not differentiate between an OS and a boot loader, because at that level, there are just programs).
Precisely! The thing I'm hung up on is that UEFI secure boot maintains a chain of trust via signed code all the way up from the system firmware level. Even if you manage to use a signed bootloader that allows the loading of unsigned code (or that doesn't verify signatures, same difference I suppose), as soon as you break the signature chain from the system firmware, the next step in the process would be a chainloaded Windows Boot Manager. Because it doesn't have a valid signature chain, it will refuse to run any further. (..right?)
You could, from there, load a compromised bootmgr.efi, but then its signature wouldn't be valid, and the Windows kernel will refuse to load, and so on.
Without the motherboard configured to only boot signed boot loaders, any number of intermediate boot loaders could be inserted which could then hijack the booting process
Naturally. But of course, Microsoft won't allow OEMs to ship systems that have secure boot disabled out of the box, so that's a bit of a moot point, no?
the bootloader can be configured to load a Linux kernel that chain-loads a compromised Windows kernel
That strikes me as an odd proposition.... The Windows kernel has a lot of requirements out of its bootloader. It's not compatible with any of the plethora of [awesome] boot specifications that many Linux kernels support, like multiboot for example. BOOTMGR (or NTLDR for older OSes, but that of course will never support UEFI or secure boot) does a very significant amount of Windows-specific voodoo to get the system into a condition where the kernel can run, like loading boot start drivers and so on. Unless you patch the entire chain (which may include the MBR program... not as familiar with UEFI boot processes as I am with BIOS booting) to remove the signature requirement, from BOOTMGR, OSLoader, Winload, the kernel, and probably WinResume as well, you couldn't even start to get unsigned drivers working. Without invoking test mode, of course
It's absolutely possible, of course, but the sheer amount of hackery that is required to make it work is just mind boggling... at least to me. Can you link anything that explains your concept?
"no to pizza"
Why would you make up an acronym for a concept that doesn't exist for words that cannot be spoken?
That's so easy, it's unfair: Stuxnet and Flame, of course.
I answer the same to that question.
I think it's a lot more reasonable to assume that Iran or any other country at war with the US would likely not be dropping nukes all over the place, even if they had them. Weaponized malware, on the other hand, has already proven to be VERY effective, and the most chilling aspect of those weapons is that they completed their missions without even being detected.
The thought of some clandestine scheme to wreak havoc with the precision that computer viruses can have but that nuclear weapons most certainly cannot is not only more plausible in my mind, but it's already been done. And no one is sitting back, looking at the horrible collateral damage they caused.
So as this type of warfare continues---and it most definitely will---and some day a SCADA system fails and it kills people, there won't be the "benefit" of a giant, impossible-to-miss mushroom cloud sitting on the horizon to tell us why it happened.
Scary because you can't see it. Much like ionizing radiation... but at least that is something relatively straightforward to detect, and doesn't reprogram your geiger counter to tell you everything is just fine while you suck up lethal doses of gamma rays.
Sabotage: yes. Cyber terrorism? No. Warfare, yes, but not terrorism.
To be fair, terrorism is rather broadly any act that incites fear, specifically for political purposes. I don't know about you, but Stuxnet and Flame scare the hell out of me.
And I don't even begin to represent their targets.
Computer Science is merely the post-Turing decline in formal systems theory.