I was wondering when Hawking would finally weigh in on this subject.
hah, what a newb.
I really wish Greg would have told us which distro he is using though.
The first tip-off that this story is BS is that this charging technique doesn't even require an Apple-branded microwave.
There is no way that Apple would introduce a new feature that does not require new Apple hardware.
...have you seen their fans? http://cdn2.bigassfans.com/images/BAF-Dairy1.jpg
I don't think there is another accurate way to describe them. other than, 'whoa, that is a big ass fan!'
yea, is difficult to see how it could cost *that* much. although, I would argue that it could be a little more complicated than you mention, if you don't have a perfect inventory of all of your software and devices.
it was/is a serious enough bug that it was drop everything and start patching/mitigating the problem...since it can take time to determine if your software/devices are vulnerable, it is likely that people had to work overtime (does anyone actually get paid overtime anymore?).
it also probably meant running scans across your public IP space to see if you have anything listening that is vulnerable that you somehow missed, then tracking down exactly what that device is.
I've heard that some CA's were charging for either the revoke, or re-issue on certs as well. although I never actually confirmed that.
you then had to roll all passwords used on those devices, and any passwords that were used on external sites.
after the initial rush to patch/scan your network...it came out that all heartbleed scanners are not accurate. so lots of people probably re-scanned with better tools.
if you work with a lot of external partners, people probably spent time scanning them as well, to see if they were still vulnerable, and reached out to them to get them to patch.
in a perfect world, a lot of the above is fairly automated...but I'd imagine most of us don't live in that perfect world...so the above tasks take a fair amount of time, which detracts from other work..so shows up as the cost of heartbleed. multiply that times X companies....and add in costs for consultants/contractors for some companies...and it gets to be big number.
Why would they want to intercept the traffic when they could just read it off the server?
feel free to hunt away.
"Hunting is an effective way to manage goose populations and prevent conflicts. Regulations, seasons and municipal bylaws must be followed. You may hunt geese in the open season with a valid hunting licence for migratory birds. You can also encourage hunting on your property. "
t's the legion of over 35 housewives that hang off her every word
I always heard that she had an army..but I never heard an actual number put to it.
so she has roughly 37 ladies who will do what she says.
these must be some very rich ladies!
The author obviously doesn't know very much about government security practice, even though their handbook is available online for anybody who can Google.
hrm..you might want to google that author's name before you say that...here
Rob "CmdrTaco" Malda
Jeff "Hemos" Bates
Jonathan "CowboyNeal" Pater
Vodka is better than beer.
I'm surprised to hear you say that VodkaGuy...I had you pegged as more of a wine-drinking-guy.
SSH can't be proxied like SSL traffic
yep, it can. there are a few commercial fw's that do it...check out page 191 of McAfee's (.pdf) userguide
if you don't wanna read the
"Put the network firewall in charge of security again with integrated comprehensive network gateway protection technology, including:
Encrypted traffic inspection (SSH/SSL)
Lord... Whats a qubit?
it is more of who than a what...Qubit is Q*Bert's Chinese cousin.
What is now proved was once only imagin'd. -- William Blake