|
It's not just you.
As well as not liking being startled, there are specific low level noises that really bug me too.
The fact that my wife of 50+ years is going deaf faster than I am does not help!
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
Back in the day when I was still using a monitor with a tube, I had one of those AOL CD-ROMs we all got in the mail stuck in a binder clip with the shiny side facing me. If anyone came up to my desk they would be reflected in the CD so I would notice the motion and not go through the ceiling.
I’ve given up trying to be calm. However, I am open to feeling slightly less agitated.
|
|
|
|
|
I can't sit with my back to a doorway or a walkway between cubicles. People walking behind me disturbs my concentration far more than seeing them in the edge of my vision when I'm concentrating.
|
|
|
|
|
|
And the value of what they are holding has also dropped.
"For the year", banks, etc. have had better "returns" than the average crypto "investor". There.
It was only in wine that he laid down no limit for himself, but he did not allow himself to be confused by it.
― Confucian Analects: Rules of Confucius about his food
|
|
|
|
|
That's not all: ANOM: Hundreds arrested in massive global crime sting using messaging app[^]
8 tons of cocaine? That's about 7,250 Kg, and assuming it's "street grade" that's about $450,000,000 (but it won't be, so the actual value is probably 5 to 10 times that)
I expect the price of bitcoin to plummet, again.
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
I *like* it. Will probably wear a smile till bedtime tonight!
Get me coffee and no one gets hurt!
|
|
|
|
|
You and me both!
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
napalm.
Hackers are bad, but we really need to get serious. If you have a system that is mission critical, you need to have a come to Jesus moment right now.
Charlie Gilley
<italic>Stuck in a dysfunctional matrix from which I must escape...
"Where liberty dwells, there is my country." B. Franklin, 1783
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
|
|
|
|
|
We could track down Osama and deal with him appropriately, why not these scumbags?
Get me coffee and no one gets hurt!
|
|
|
|
|
lack of will. Someone with balls needs to make a decision and stick with it. This is why we have dangerous men in the dark that you don't want to meet. Take off the gloves.
Charlie Gilley
<italic>Stuck in a dysfunctional matrix from which I must escape...
"Where liberty dwells, there is my country." B. Franklin, 1783
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
|
|
|
|
|
charlieg wrote: Someone with balls needs to make a decision and stick with it.
The problem is that there are a lot of old women among the men.
charlieg wrote: This is why we have dangerous men that you don't want to meet in the dark.
Sending in armed forces to foreign countries is frowned upon, especially if that country possesses a large army of its own and nukes (as Russia does). I'm told that most intelligence services these days concentrate on electronic intelligence gathering; James Bond (and Felix Leiter) are passé these days.
--
The problem of ransomware will not be solved by brute force; it's too easy for a ransomware gang to move its operation elsewhere. It must be solved by technical means.
One (partial) solution would be separating the internet into a secure and non-secure segments. A protocol should be defined that (a) forces identification of the origin of data in some way, and (b) ensures that recording a transaction would be useless by including a nonce in each packet. Using such a protocol in the interface between the secure internet and the non-secure internet would make it almost impossible to hack the secure internet - you would need the correct hardware device, the current nonce, and the nonce generation algorithm in order to get past the gateway. You could also ensure that security-sensitive operations such as changing the access rights for devices may only be performed from a device physically attached to the secure network, i.e. not via the unsecure network.
This idea would not solve the issue of a crooked employee selling his/her device to criminals, but would make it easy to plug the leak when it is discovered - revoke the access rights of the particular hardware used to access the secure segment.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
There are ways to put pressure on countries that harbor these criminals without the need to send in armed forces. I just feel that we are too soft on countries like Russia from where these scumbags operate with impunity. And yes, you are right. It can be done without armed intervention.
Get me coffee and no one gets hurt!
|
|
|
|
|
I wonder if DOJ will get a recovery fee? Interesting that DOJ/feds have had this ability to 'hack the hackers' and 'follow the money' but are only now using that ability.
They only got away with around $1M. I'd prefer a stronger message for the ransomware gangs.
"Go forth into the source" - Neal Morse
"Hope is contagious"
|
|
|
|
|
Quote: I'd prefer a stronger message for the ransomware gangs
Yup! A MUCH stronger message!
Get me coffee and no one gets hurt!
|
|
|
|
|
Does Pepsi fire employees if they test positive for Coke?
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
Not sure, let me consult with Dr. Pepper.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
They have their own special health program. Anyone testing negative for artificial additives is fired.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Would Diet Caffeine Free Varieties give a false positive or a false negative?
To err is human to really elephant it up you need a computer
|
|
|
|
|
Just false sweetness.
- I would love to change the world, but they won’t give me the source code.
|
|
|
|
|
There is actually a lot of truth in that joke.
|
|
|
|
|
|
As they've clearly lost their sparkle they'd be fired flat-out.
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
I have an old Android tablet past its Best Before date that I only use these days to display my router's real-time bandwidth usage monitor.
Every once in a while, it'll show I have some device downloading something at a steady 2-3mbps, for either minutes or even hours on end. This is not maxing out my bandwidth, but that's at least 10 times the amount of bandwidth being burned when, for example, I have a Teams call (audio) going on with coworkers.
Problem is, I have no idea what device it might be. Ordinarily I'd blame random machines trying to download Windows updates at some (bad) time of their choosing, but all my Windows-based machines (physical + virtual) are part of a domain that has a policy set to get updates from a local WSUS server. So none of them should ever hit the WAN for this. And the patch server is configured so I have to approve updates before they get downloaded.
The router itself seems rather useless at telling me what device is sucking up the most bandwidth. It's running DD-WRT, on a D-Link DIR-859. Obviously, any command I run on a given system will only report what that system knows about, so if I want to identify what's sucking up the bandwidth, it seems to me the way to go about it is to interrogate the router itself. I know enough about MIBs and SNMP to get myself in trouble, but I don't quite see how to go about it.
How would you approach this problem? This doesn't happen in a predictable fashion, so it's not like I can turn everything off and power things back on one device at a time until I start seeing it happen again...
|
|
|
|
|
Wireshark.
Capture the traffic, keep watch on when the abnormal consumption happens and then delve into the log.
GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|