<insert Flight of the Valkyrie>

Posts
-
Super Smash Bros... on a CALCULATOR!!!!!posted in Water Closet
Super Smash Bros, on a calculator... Well... hmmm,... yeah, I've got nothing else to say
http://kotaku.com/yup-someone-put-super-smash-bros-on-a-ti-83-calculato-1658930927
and also
http://tinycartridge.com/post/102627220562/smash-bros-for-ti-83-84-calculators-obviously -
RE: Random Threadposted in Announcements
@Joyfano said:
@nadnerB said:
Nice! That's a very important word.
I had Cheerios and milk for brekkie. Coffee was installed shortly after arriving at work.
You mean Cuppa? lols
That's also very important. I started one shortly before finding your reply

-
RE: Random Threadposted in Announcements
Nice! That's a very important word.
I had Cheerios and milk for brekkie. Coffee was installed shortly after arriving at work.
-
RE: Which of the 16 Are You?posted in Water Closet
I really liked the way the personality types were explained.
Made a lot of sense as to why I do things a certain way. -
RE: Which of the 16 Are You?posted in Water Closet
Here's mine:
Personality: INFP
Variant: Assertive
Role: DiplomatYou are one of the Diplomats - an empathic and idealistic individual who enjoys exploring interesting ideas and prizes morality. You are known for your poetic nature, intuitive skills and pure, childlike enthusiasm.
EDIT: Apparently, I'm part of just 4% of the population...
-
RE: The logic behind so-called "best practices". Question one: password expirationposted in IT Discussion
@scottalanmiller said:
@nadnerB said:
@scottalanmiller well, no one said it's a one size fits all :p. To keep within our requirements, that's how we have to play it.

I understand, you are doing it because some civil servant decided that making a forced insecure requirement would look better on getting a promotion than actually protecting the government. Same way it works here. It's just a form of corruption - in this case, probably some combination of inept, lazy or just willing to be insecure to avoid the same issues from inept or lazy people above them. Somewhere, someone who doesn't understand security (we hope that's all that it is) makes the decisions as an administrator and not as an IT pro. It's corrupt because obviously they know that they don't know anything about security, yet they make the judgement call anyway. Hopefully their corruption is just in being inept and being willing to do a job they don't know how to do.
That's a lot of pent up frustration, bad experience or just frustration at ignorant buttheads making rules they don't understand?
Anyway... Yeah, sounds about right.
-
RE: The logic behind so-called "best practices". Question one: password expirationposted in IT Discussion
@scottalanmiller well, no one said it's a one size fits all :p. To keep within our requirements, that's how we have to play it.

Yes, a lot of our end users are incrementers as a result. I choose not to be.
I prefer a very strong and long-life password over a frequently changed weak password.
-
RE: Microsoft Passes ExxonMobil to Become Second Largest US Firmposted in News
I see that the fruity firm is still up top.
Whilst that doesn't supprise me, the massive gap between first and second places certainly does. -
RE: How Net Neutrality Really Worksposted in Water Closet
@Dashrender said:
OK, so other than HUGE start up costs, what keeps more ISPs from moving into cities offering real choices to consumers?
tl;dr available
Here in Australia, >90% of in ground infastructure is owned by one telco, Telstra.
Telstra used to be owned by the Australian Government but was privatised for a cash injection for the federal budget (well, that's how I took it)... bla blah blah Monopoly blah blah fair go for competitors blah blah blah Telstra required by law to allow competing ISPs to put their stuff in Telstra's telephone exchanges blah blah blah Telstra whining blah blah blah.So now any new ISP can get access to any exchange to put their equipment in. Yay? I think not.
- If it's only Telstra in the exchange, upgrades need to happen to make space, upgrade air con etc... can be up to $2m. Telstra are not required to help financially. Any other ISP can come along and offer services in that area and are not required to pay one red cent to the company that footed the bill for the upgrade... as a result, most smaller towns only have Telstra access (unless you want to pay a $20 tax to another ISP for having to use Telstra's equipment.
- Sub-exchanges/RIMs are not included in the reqired "openness". Vendor lock-in at it's finest
In saying all that Telstra's customer service has improved dramatically over the last few years. As a broadband ISP, their service has been pretty reliable. I just like to suport the little guys, when I have the choice.
tl:dr, not much stopping ISPs in the city as most can make the population density is there.
-
RE: Look Up a Hardware Vendor Based on MAC Addressposted in IT Discussion
Nice find!
I remember doing this ages a go but had forgotten that it could be done.
Shows how often I've needed it
-
RE: The logic behind so-called "best practices". Question one: password expirationposted in IT Discussion
I think that with end users being end users, forced change is a good thing but it has to be more than 30 days for reasons already mentioned by @scottalanmiller .
I think 90 days is probably the winner as... Well... It just smells better.
60 days seems a bit odd
42 is just strange (I don't make the policies)
And 30 is just too short. -
RE: The logic behind so-called "best practices". Question one: password expirationposted in IT Discussion
tl;dr all the others.
Our password policy is change every 42 days with complexity and length requirements... Because audit requirements.
Lolwut? I hear you ask, well working is a subsidiary of a government department means we are still a part of it and are entitled to have these forced upon us.
-
RE: Microsoft Patches 19 Year Old Bugposted in News
I wonder how many times this has already been exploited?
-
RE: iOS Masque Attackposted in IT Discussion
@JaredBusch said:
No. They will fall for it because they clicked on a get this app free link.
General end users have no clue that one system is more secure than another. That only comes in to play in the more technical circles.
Very true.
-
RE: iOS Masque Attackposted in IT Discussion
@scottalanmiller said:
Not too much risk for businesses then, really focused on end user data.
Isn't that 90% of apples clientele?
Seriously though, I don't actually know but I figure that a good portion of Apples users would fall for it mainly because of the "Macs are immune to this crap" type of mentality. -
RE: iOS Masque Attackposted in IT Discussion
Here's the post from the FireEye blog: http://www.fireeye.com/blog/technical/cyber-exploits/2014/11/masque-attack-all-your-ios-apps-belong-to-us.html
-
iOS Masque Attackposted in IT Discussion
Well, this sucks for iOS users. There's another way of exploiting the hole that WireLurker is using but this time, no PC is required.
Have a read of this: http://www.tomshardware.com/news/ios-masque-attack-wirelurker-enhanced,28052.html#xtor=RSS-998
The important bits:
- "Masque Attack" works much like WireLurker in that it takes advantage of Apple’s enterprise provisioning to bypass other security checks on iOS.
- Unlike WireLurker, though, Masque Attack doesn’t even need to infect the user's PC
- FireEye reported the malware to Apple months ago (July 26, to be exact), Apple doesn’t seem to have fixed the loophole yet
I haven't watched it but one of articles I found [au.pcmag.com] when fact checking has a demo of the attack in action: https://www.youtube.com/watch?v=3VEQ-bJUhPw
-
RE: Miss Windows 98? Now you can put it on your iPhone 6posted in Water Closet
Still has poor external drive support and all the icons are squares. Not really an upgrade IMO

-
RE: What Are You Doing Right Nowposted in Water Closet
Tinkering with my xubuntu lappy.
(the back up machine when Mrs nadnerB takes over the desktop)