Wow. It's a shame no one will ever see this.
Wow. It's a shame no one will ever see this.
Yeah, that's crazy. What were they all doing?
They could have just shut down the reactor and had them all pedal!
Look under Settings/Privacy
There is a switch, which reads 'Send Microsoft info about how I write to help us improve typing and writing in the future'
This the collection of keystroke data. They can do anything they want with this. Definitely makes it even more creepy to log in to someplace else on a Windows 10 box.
Another thing which is standard practice is to list all kinds of serious and unlikely reasons they'll use your data, followed by 'or any other legal purpose' which does not mean for some 'legal' matter, which it's meant to sound like, but for ANY purpose which is not SPECIFICALLY ILLEGAL. Which means anything.
You can turn off the keystroke thing, but Microsoft routinely resets preferences, including privacy preferences, when you run an update. So you have to keep checking it and make sure it's off. However, I doubt very much if it matters. You're sending EVERYTHING to Microsoft and they can use it for any purpose.
Nailed it! 'nuf said...
If the 16 port switch is a SMART switch, you can, make the last port a TAGGED port, that carries tagged vlan traffic.
Make each of the other ports (except number one) an UNTAGGED vlan. (keep number one stock so you can access the switch!)
Maybe reserve one for the windows box.
Then, on your computer, run a linux instance with vlans configured, like eth0.2, eth0.3 openwrt would be great for this, you can run it on a little router or a VM.
On the linux box, (openwrt) set up address translation with DNAT and SNAT to make the same IP on each of the VLANS appear as a unique IP on the same network as the windows box. (There's a little voodoo because you don't want any routing to happen, since you have several networks with the same address scheme.) Then, you can run upgrades simultaneously to several different IPs on the windows box (if it lets you) and the physical box it goes to will just depend on which port it's plugged in to.
This VLAN trick is a great way to fake having a whole bunch of network cards in a single box, even a virtual one.
I do this sort of thing a lot.
I have found that a 160MB hard drive is probably too old to do the sort of autodetect that most USB-ATA adapters require. These were the days of entering the harddrive parameters in setup...
The best bet for this is to get a PCMCIA network card that has PXE boot capability. Or, a PCMCIA card with a supported Etherboot binary on a floppy disk.
Then boot into a diskless linux setup over the network, and transfer as needed. My oldest net boot image for this is Redhat 9. You might want an even older one, look at Redhat 5 or Slackware 3.3.
This would be most painless because you can just transfer the whole thing over nfs. No messing around with hard drive parameters or matching up new and old hardware. No dealing with windows and dos network drivers beyond just etherboot, which has always worked great for me.
Note that you can do wonders with the old Slackware 3.3 boot disks, boot.i and net.i, maybe pcmcia.i With a PCMCIA network card and the slackware floppies, you may be able to get to an NFS mount in only two or three floppies and no PXE boot. They're also super handy because they'll detect your hardware in that dinosaur and tell you what it is.
If you stay in DOS land you'll have to zip up everything and transfer it with a terminal program, which works but requires lots of space and takes forever.
Also getting networking to work on Windows 3.11 if it wasn't already set up long ago is a big pain and should be avoided.
Best not to mess with the hardware or installed software on it at all. PXE is your friend!!
It's a terrible and impractical idea. There is no need for it, other than app makers and data miners trying to make more money, and the police having a new reason to take your phone. It does not improve on the present system which is already computerized.
But more important, will there soon be laws REQUIRING people to carry a phone?
We use custom scripts, that work very well. They're not very complex. We're SMSing through a third-party provider, which is not my first choice, but it is easy to manage.
This is not, of course, extremely secure, but with all the SMS management credentials kept completely separate, it's pretty good.
It gives us the 'something you have' and 'something you know' requirements. You need the phone. In a very well planned and determined attack they could probably get past this, but there are other measures in place, and it makes it hard enough that if they're that determined, they'll try something else.
You can set up 2nd factor using SMS pretty easily, and have it text you a second password that's good for five minutes.
Definitely the cheapest option.
If you make your own token with an arduino and an LCD and a real time clock and a battery you've already paid for the RSA tokens.
'Astrology' means 'the study of stars'. When real scientists began to study stars, this term had already been taken over by crackpots.
So, they adopted 'Astronomy' which is the NAMING of stars, because the more correct term now meant something else.
So, really, astronomy should be called astrology, and astrology should be called bunk.
I thought they owned that word.
Here it is, right on this site, from six years ago.
This goes for land line carriers as well.
Did any of these people stop to consider that CPNI data is routinely sold by Verizon and all other carriers unless they specifically opt out?
How many Americans who are complaining about this have opted out of the CPNI sharing clause of their contracts?
You are already giving permission, by not opting out, to your wireless and landline carriers to sell your metadata to ANYONE for ANY REASON, including the government, who may buy it on the open market just like anyone else. This data is seldom anonymized, and when it is, you can still search for specific characteristics to find the information of a specific person. And, any entity willing to pay for the information may have it, and it can be bought through a third-party data aggregator who will de-anonymize it and bundle it with plenty of other interesting facts about YOU.
How many people have actually read their terms of service? Have they gone through the arcane process of opting out of the voluntary sharing of CPNI data? (Every year, for each carrier?) Will they now complain that no one warned them? Did they expect their politicians to keep them informed? If the politicians had tried, would they have listened? They didn't care when this became the norm 10 years ago, and now suddenly it's intrusive?
This is what happens when you don't pay attention.
A killer robot costs way more than a human soldier, and is much harder to replace.
It will be very interesting when this comes into the equation. Are these really to protect the soldiers?
Who will end up protecting whom, and who is more 'expendable'?
Lo! Men have become the tool of their tools. -- Henry David Thoreau