|
patbob wrote: one of my other laptops got abandoned between 8.0 & 8.1
That is really terrible.
Sorry to hear that.
|
|
|
|
|
No luck finding drivers elsewhere? It's a PITA because you need to find the hardware IDs (IIRC buried on a sub dialog of the device mangler) to Google on; but since unless you've got something weird, your assorted embedded components are also in various other companies laptops you can often piggyback on them to find drivers for newer OS versions.
I most recently did it a year ago to get an ancient Vista laptop running Win7. Everything but the SD card reader is working; and that is only not because I don't give an :elepant: about it and never tried to find its driver.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Dan Neely wrote: No luck finding drivers elsewhere? It's a PITA because you need to find the hardware IDs That's a good idea. I hadn't thought of searching for the hardware IDs to find a driver, mainly because its a laptop, so its an integrated one-off hardware design, and I wouldn't expect anyone but the manufacturer to make drivers for it. For the important drivers, they all work fine under 8.1, it was just the gall that the company would abandon the hardware a year after initially offering it (I was an early adopter). If it was an off brand instead of one of the major ones, I wouldn't have been so disappointed. They did eventually support Win 10, so they may have backported drivers for 8.1 by now, but I don't miss the busted features.. very often.
|
|
|
|
|
|
I do not support the concept of hacking, no matter the flavor.
I am on the fence when it comes to hacking for national security reasons, for obvious reasons.
Edit: I feel the more types of hacking we allow, the more it will become mainstream, then it will become industry standard, and the next thing you know recruiters will be searching openly on LinkedIn for hackers.
|
|
|
|
|
They already do; they just go by the moniker "Penetration Testers".
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
Nathan Minier wrote: They already do; they just go by the moniker "Penetration Testers". I believe you accidentally looked up a bridal registry . . .
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
I've always thought it sounded more like a bad porno name.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
|
Alas, I do something akin to it for certain types of spammers - made a tool to send out mail via SMTP. Just tell it how many time to repeat.
Also, will spoof source address with random string addresses, with the option to make them all major domains (like gmail.com, yahoo.com, etc.) so they're not so easily blocked.
And, for good measure, to add variations to the subject and body to further ward off the filters for a while.
Use: to get spammers to stop spamming me. I actually get little spam, anyway, as I've too many email addresses via forwards. The Mrs., however, has needed this aggressive defense on a number of occasions.
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
It's a bit like breaking into a suspected thieves house to nick back the stuff you think he stole, and trashing his living room on your way out.
It's vigilantism to my mind.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
I say its like kicking the stuffing out of a bully. One doesn't stop a bully by running to mommy.
|
|
|
|
|
No, and calling it 'white hat' doesn't change what it is...
From the article, they 'suspected' the people were guilty, but there was no proof, so they used illegal methods to get the proof.
And, if we suspect the bank is using underhanded tactics, can we 'hack' the bank to read their correspondence in an attempt to prove our suspicions?
|
|
|
|
|
Tim Carmichael wrote: And, if we suspect the bank is using underhanded tactics, can we 'hack' the bank to read their correspondence in an attempt to prove our suspicions?
That of course is exactly what the media in the US is allowed to do. They are allowed to take data that has been stolen (obtained in a method that the owner did not approve) and then read it and then decide if it has any value to be published.
So the media reads it and makes the decision. Not the courts nor any legal entity.
They cannot request that theft but they are untouchable otherwise. Note they do not have to publish either. So if someone hacks a CEOs email for years and then gives it to some online blogger and it has nothing more interesting than a couple titillating emails with the significant other they don't publish. But it was still read.
|
|
|
|
|
According to the article, 'It was effective'. I don't see anything wrong with it...it'd be better if there was some personal pain and suffering involved for the criminals.
Honeypots are effective as well. I have a FTP server with a read-only FTP account of Administrator and a password of Admin. Dictionary attacks that used to last for an hour are a thing of the past.
"Go forth into the source" - Neal Morse
|
|
|
|
|
I think a logic bomb would be a much better method of dealing with hackers, perhaps initiated by accessing data from an unauthorized system. That would be more like the ink packs that banks will put in with the cash.
If someone steals data which proceeds to destroy their system, I'm fine with that.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
Yes, if it involves separating the hackers' heads from their bodies at one of the cervical vertebrae using a large axe. The detached heads should then be mounted on pikes outside the castle walls as a warning to others.
Software Zen: delete this;
|
|
|
|
|
Gary Wheeler wrote: Yes, if it involves separating the hackers' heads from their bodies
I like this thinking!...sends a clear message...better than just a finger or two! Hope you have a speedy recovery with yours!
"Go forth into the source" - Neal Morse
|
|
|
|
|
I wholeheartedly agree with you!
Get me coffee and no one gets hurt!
|
|
|
|
|
My upvote for you!
Get me coffee and no one gets hurt!
|
|
|
|
|
Thank you sir!
Cornelius Henning wrote: Get me coffee and no one gets hurt! My policy:
Cup #1: I decide to live.
Cup #2: I decide to let the rest of you live.
Cup #3+: Attitude improves from here.
Software Zen: delete this;
|
|
|
|
|
No, hacking is wrong... plain and simple. (message for those whom I'm wronged)
As a side note, most definitely support it. If it wasn't for hackers politicians and large corporations will be left to their own corrupt devices, and we will be pulling at the shorted end. (already very much like that, but gives them something to think about)
|
|
|
|
|
R. Erasmus wrote: As a side note, most definitely support it. If it wasn't for hackers politicians and large corporations will be left to their own corrupt devices, and we will be pulling at the shorted end. (already very much like that, but gives them something to think about)
I do not think hackers are stopping politicians or corporations........
Hacking is bad in any form. The above argument from Mr/Ms Erasmus is not acceptable.
Just a method to try and justify it.
Hackers are a nasty bug in Internet with is slowly being killed by this infection.
|
|
|
|
|
"I do not think hackers are stopping politicians or corporations........"
Maybe not yet... but it is definitely exposing some of them. In my country at least. And if this corruption keeps on getting exposed and this happens more frequently, people are going to think twice before going down that road.
|
|
|
|
|
I'd much rather see all that effort go into improving security against hacking, or minimizing the damage caused by successful hacks.
|
|
|
|