|
But is your dog likely to send your personal details to criminals?
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
No, she died last August of congestive heart failure while chasing squirrels.
CQ de W5ALT
Walt Fair, Jr., P. E.
Comport Computing
Specializing in Technical Engineering Software
|
|
|
|
|
Sorry to hear that
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Dr.Walt Fair, Jr. wrote: I have a hidden bavck door in my house. It's where the dog goes in and out. Ours is for the cat.
He comes in, takes complete control, loads up with everything he wants, then leaves a pile of cr@p behind him when he goes.
I've had such backdoors since before computers became household things, which only goes to show that nothing's really changed.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
I've put backdoors in many of my commercial software because I needed to find out the problem when my customers called for support. No personal information was ever exposed, just logs related to the software performance.
CQ de W5ALT
Walt Fair, Jr., P. E.
Comport Computing
Specializing in Technical Engineering Software
|
|
|
|
|
I don't question the need of logs in software, but IMO enabling anyone - including the provider of the software - to access them should be up to the user.
Again IMO, the correct way to do this would be to ask the user to either send you the logs or to explicitly grant you access so you can read them. Leaving a back door means that anyone can potentially access sensitive parts of the system.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Daniel Pfeffer wrote: I don't question the need of logs in software, but IMO enabling anyone - including the provider of the software - to access them should be up to the user.
I agree,
Daniel Pfeffer wrote: Leaving a back door means that anyone can potentially access sensitive parts of the system
That depends, I left a backdoor to just my software, so I could access it running on their system to see personally the problems they reported and only when I was given remote access by the user. I never sawny sensitive parts of their system.
CQ de W5ALT
Walt Fair, Jr., P. E.
Comport Computing
Specializing in Technical Engineering Software
|
|
|
|
|
A new report indicates that the majority of users are continuing to use the Windows 10 April 2018 Update rather than upgrading to the latest October 2018 update. I can't imagine why
|
|
|
|
|
As the new ones were much better
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Quote: Using 5,000 Microsoft Store apps that are utilize the AdDuplex SDK ad framework, AdDuplex surveyed approximately 100,000 PCs Just one more reason to detest the Microsoft Store. Not that we aren't being watched in a thousand other ways...
Really surprised to find people use MS store apps, unless it is just the default Candy Crush install.
|
|
|
|
|
I’d actually be surprised if the default bloatware wasn’t used like that.
TTFN - Kent
|
|
|
|
|
I recently accidentally upgraded to it on two systems without issue. It actually has some obscure features that are useful for my product's purposes.
|
|
|
|
|
The only Win 10 PC is herself's laptop - and it gives me 10 times the headache as the three other Linux machines combined...
"The greatest enemy of knowledge is not ignorance, it is the illusion of knowledge". Stephen Hawking, 1942- 2018
|
|
|
|
|
I frequently do a net stop wuauserv , along with a proper SoftwareDistribution-folder cleaning. It already saved me hours of rebooting I think. I just have to be extra carefull to which sites I visit. Maybe one day a missing security patch will come and bite me in the back, though.
There is also this C:\Program Files\rempl folder, on which I deactivated any NTFS ACL inheritance, and gave access only to my user account. Since then my system is relatively peaceful, I get to choose when it reboots at least.
noop()
|
|
|
|
|
This week MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) announced that a 20-year-old cryptographic puzzle was just solved by a self-taught programmer from Belgium, 15 years earlier than MIT scientists expected. They haven't cracked ROT13 yet, have they?
"There have been hardware and software advances beyond what I predicted in 1999." Yup.
|
|
|
|
|
FAKE NEWS! I didn't see the word 'quantum' anywhere in the article!
|
|
|
|
|
Which means that not much of cryptography in it...
"The greatest enemy of knowledge is not ignorance, it is the illusion of knowledge". Stephen Hawking, 1942- 2018
|
|
|
|
|
Oh, well...umm...it's not that he really solved the puzzle.
He just waited while the computer completed the "80 trillion successive squarings of a starting number".
I thought he had figured something out ( a formula for speeding up the process or discovered a backdoor). We just finally got to the place where the hardware was fast enough.
|
|
|
|
|
This study suggests we start thinking seriously about how we handle digital remains. "DON'T THINK OF IT AS DYING, JUST THINK OF IT AS LEAVING EARLY TO AVOID THE RUSH"
|
|
|
|
|
MB wrote: about how we handle digital remains. They're not digital remains, it is data on FB. They'll be very interested in knowing who's alive, since those accounts are worth more than unverified accounts.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Everyone is priveledged to become Soylent Green
CQ de W5ALT
Walt Fair, Jr., P. E.
Comport Computing
Specializing in Technical Engineering Software
|
|
|
|
|
It never fails to amaze me how academics and businesses need "studies" to allow them to see the bleeding obvious.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
New research shows Microsoft TypeScript's popularity is rocketing and that nearly all JavaScript developers are worried about open-source security. please?
|
|
|
|
|
It's from Microsoft? I can't imagine a better argument against its use.
"They have a consciousness, they have a life, they have a soul! Damn you! Let the rabbits wear glasses! Save our brothers! Can I get an amen?"
|
|
|
|
|
"Inbox zero" often feels like the ultimate unattainable goal. You can spend hours organizing your email, and somehow a deluge of new messages will always emerge. That's funny - "YouPS" is what I say when I see certain emails in my inbox
More or less.
|
|
|
|