topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Wednesday November 12, 2025, 5:52 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 22 23 24 25 26 [27] 28 29 30 31 32 ... 264next
651
Developer's Corner / Re: CodePlex is shutting down.
« Last post by IainB on January 09, 2018, 02:49 AM »
The shutdown of Codeplex had been widely broadcast from the start, months ago.
The earliest notice I had of the details of the shutdown plans seemed to be rather abrupt - it had evidently been thought through, but there seemed to have been no courtesy to the community in the form of a prior warning of what was likely to be going on. It seemed to be a fait accompli.  I could have missed the prior warning if there had been one, I suppose. Anyway, that earliest notice was the post dated 2017-03-31 on Brian Harrys blog:
Shutting down CodePlex
tags: Uncategorized, Codeplex
03/31/2017 by Brian Harry MS
Almost 11 years after we created CodePlex, it’s time to say goodbye.  We launched CodePlex in 2006 because we, like others in the industry, saw a need for a great place to share software.  Over the years, we’ve seen a lot of amazing options come and go but at this point, GitHub is the de facto place for open source sharing and most open source projects have migrated there.
 (more at the link)...
_____________________________
Copied from: bq | Codeplex - Brian Harrys blog  -
 <https://blogs.msdn.microsoft.com/bharry/2017/03/31/shutting-down-codeplex/>

It's quite an informative post, so, worth a read if one wanted to know the background to the shutdown plans.

Since then, many live projects have been migrated from Codeplex, emptying the place out somewhat by this stage.
It was also mentioned in little warning messages in the Codeplex Daily Summary pages <http://www.codeplex.com/site/feeds/rss

It's not that I'm necessarily well-informed, though I do try to keep current. I'm a bit lazy (can't be bothered to make the time/effort to read and memorise everything that I probably should) and I happened to have feeds to the above sources in my Bazqux feed-reader. I regularly scan the headlines of all posts, but read only the few that particularly catch my current interest for one reason or another. The feeds provide a corpus that makes for a good reference source as well. For example, it only took a couple of minutes to search quickly back through those feeds just now, to locate the date of what seemed to be the earliest notice of the shutdown that I recalled having read some time ago.

Hats off to Bazqux feed-reader.    :Thmbsup:
R.I.P. Google Reader.
652
Living Room / Re: Meltdown + Spectre - Malwarebytes update notes.
« Last post by IainB on January 08, 2018, 11:48 AM »
MBAM has some useful comment (and about the performance hit):
(Copied below sans embedded hyperlinks/images.)
Meltdown and Spectre: what you need to know
https://blog.malware...at-you-need-to-know/

tags: Security world, AMD, ARM, Intel, Meltdown, memory, processor, Spectre
Malwarebytes Labs
UPDATE (as of 1/04/18): Since the Malwarebytes Database Update 1.0.3624, all Malwarebytes users are able to receive the Microsoft patch to mitigate Meltdown.

Overview
If you’ve been keeping up with computer news over the last few days, you might have heard about Meltdown and Spectre, and you might be wondering what they are and what they can do. Basically, Meltdown and Spectre are the names for multiple new vulnerabilities discovered and reported for numerous processors. Meltdown is a vulnerability for Intel processors while Spectre can be used to attack nearly all processor types.

The potential danger of an attack using these vulnerabilities includes being able to read “secured” memory belonging to a process. This can do things like reveal personally identifiable information, banking information, and of course usernames and passwords. For Meltdown, an actual malicious process needs to be running on the system to interact, while Spectre can be launched from the browser using a script.

Microsoft, Google, Mozilla, and other vendors have been releasing patches all day to help protect users from this vulnerability. Some of the updates from Microsoft may negatively interact with certain antivirus solutions. However, Malwarebytes is completely compatible with our latest database update. The best thing to do to protect yourself is to update your browsers and your operating system with these patches as soon as you see an update available.

For a quick guide on how to protect yourself from this threat, please check out “Meltdown and Spectre Vulnerabilities – what you should do to protect your computer” on the Malwarebytes support knowledge base.

Details
The Google Project Zero team, in collaboration with other academic researchers, has published information about three variants of a hardware bug with important ramifications. These variants—branch target injection (CVE-2017-5715), bounds check bypass (CVE-2017-5753), and rogue data cache load (CVE-2017-5754)—affect all modern processors.

If you’re wondering if you could be impacted, the answer is most certainly yes.

The vulnerabilities, named Meltdown and Spectre, are particularly nasty, since they take place at a low level on the system, which makes them hard to find and hard to fix.

Modern computer architecture isolates user applications and the operating system, which helps to prevent unauthorized reading or writing to the system’s memory. Similarly, this design prevents programs from accessing memory used by other programs. What Meltdown and Spectre do is bypass those security measures, therefore opening countless possibilities for exploitation.

The core issue stems from a design flaw that allows attackers access to memory contents from any device, be it desktop, smart phone, or cloud server, exposing passwords and other sensitive data. The flaw in question is tied to what is called speculative execution, which happens when a processor guesses the next operations to perform based on previously cached iterations.

The Meltdown variant only impacts Intel CPUs, whereas the second set of Spectre variants impacts all vendors of CPUs with support of speculative execution. This includes most CPUs produced during the last 15 years from Intel, AMD, ARM, and IBM.

It is not known whether threat actors are currently using these bugs. Although due to their implementation, it might be impossible to find out, as confirmed by the vulnerability researchers:

Can I detect if someone has exploited Meltdown or Spectre against me?
Probably not. The exploitation does not leave any traces in traditional log files.

While there are no attacks reported in the wild as of yet, several Proof of Concepts have been made available, including this video that shows a memory extraction (using a non-disclosed POC). This is particularly damaging because 1. There aren’t many options for protection currently and 2. as previously stated, even if threat actors do spring to action, it might be impossible to verify if that’s the case.

Mitigations
Because the Meltdown and Spectre variants are hardware vulnerabilities, deploying security programs or adopting safer surfing habits will do little to protect against potential attack. However, a patch for the Meltdown variant has already been rolled out on Linux, macOS, and all supported versions of Windows.

According to our telemetry, most Malwarebytes users are already able to receive the latest Microsoft update. However, we are working to ensure that our entire user base has access to the patch.

Unfortunately, Microsoft’s fix comes with significant impact on performance, although estimates of how much vary greatly. An advisory from Microsoft recommends users to:

Keep computers up to date.
Install the applicable firmware update provided by OEM device manufacturers.
If you are having issues getting the Windows update, please refer to this article, as Microsoft has stated some possible incompatibility issues with certain security software.

No software patch for Spectre is available at the time of this article. Partial hardening and mitigations are being worked on, but they are unlikely to be published soon.

The Spectre bug can be exploited via JavaScript and WebAssembly, which makes it even more critical. It is therefore recommended to apply some countermeasures such as Site Isolation in Chrome. Mozilla is rolling out a Firefox patch to mitigate the issue while working on a long-term solution. Microsoft is taking similar action for Edge and Internet Explorer.

Cloud providers (Amazon, Online.net, DigitalOcean) also rushed to issue emergency notifications to their customers for upcoming downtimes in order to prevent situations where code from the hypervisor could be leaked from a virtual machine, for example.

The aftermath from these bugs is far from being completely understood, so please check back on this blog for further updates.

Vendor advisories:

Intel: https://newsroom.int...y-research-findings/
AMD: http://www.amd.com/e...peculative-execution
ARM: https://developer.ar...port/security-update
The post Meltdown and Spectre: what you need to know appeared first on Malwarebytes Labs.

Copied from: bq | Malwarebytes Unpacked - <https://blog.malwarebytes.com/security-world/2018/01/meltdown-and-spectre-what-you-need-to-know/>
653
Aannd...it's started:
Disable Meltdown Fix on AMD CPUs After Installing KB4056892
The Meltdown vulnerability and AMD CPUs
AMD CPUs are not affected by the Meltdown vulnerability. However, depending on the usage scenario, the fixes released to the operating system can cause notable performance slow down. Also, there are reports coming from AMD CPU users that the Windows patch, KB4056892 is causing serious issues for them.

While one can quickly uninstall the appropriate update package, which is KB4056892, there is also a Registry tweak you can apply to disable the Meltdown fix.

This could improve your computer's performance.

Copied from: Disable Meltdown Fix on AMD CPUs After Installing KB4056892 - <https://winaero.com/blog/disable-meltdown-fix-amd-cpus-installing-kb4056892/>

That was quick, but not unexpected.
654
Living Room / Re: Your Stuff Really Is Breaking Faster Than It Used To
« Last post by IainB on January 07, 2018, 04:54 PM »
@tomos: I don't think there are any tracking links there. They are there for information and to give credit to Gary North. whose email I had copied.
One of them might take you to a logon page, or something, but that's not going to do anything if you don't already subscribe to Gary North's website.
655
Gary North's latest newsletter would seem to pretty much describe Apple's apparently appallingly cynical, corporate-approved behaviour (re these batteries) to a "T":
 
Subject: iPhone $29 Battery Replacement
From: "Dr. Gary North's Weekly Tip" <[email protected]>

GARY NORTH'S TIP OF THE WEEK
Apple for years has used its OS updates to slow down older iPhones. This pressured users to buy the latest model. The money flowed in!

Now the class action lawsuits are flowing in.

Here was Apple's official explanation, after the policy was exposed: the enforced slowdown was due to older batteries, which were depleted too fast by the upgraded OS. To reduce battery depletion, the company wrote the OS code so that it would be slow on older models. https://www.garynorth.com/snip/1308.htm

As to why the company concealed this policy, the company's lawyers apparently have decided to avoid this issue until the trials.

To try to undo the PR damage, Apple is now offering a deal to owners of older models: an upgrade for $29. To find out how to take advantage of this, go here: https://www.garynorth.com/snip/1307.htm

Gary "Flip Phone" North
Visit my site, www.garynorth.com, for the latest charts on the U.S. dollar, gold's price, and Federal Reserve statistics.
---
656
Someone posed me the question:
How to capture/copy text into OneNote from:
  • online .PDF files, or
  • .PDF image files, or
  • security-copy/printing-locked .PDF files.

There are two approaches I would suggest:
  • 1. Print to OneNote: Normally, if you can print the image of the .PDF file to OneNote, then the embedded text in that image (or in images of its pages) can be OCRed and indexed for searching/copying in OneNote.
  • 2. Image clip OCR scan: If it is not possible to take the first approach, then the simple answer is to use the OneNote image clipping tool on the page context as displayed on your PC display screen. (Consider rotating the screen 90° so that landscape view becomes vertical portrait mode, to capture more of the page in each clip.)
    • Those image clips are saved into a default location in a OneNote Notebook, and OneNote will automatically OCR scan them and index for search any identifiable text in the images.
    • Alternatively: You could use the ABBY ScreenshotReader to OCR scan directly from the screen, and paste the text thus identified into a OneNote Notebook. This is worth considering, as ABBY SR seems to have a consistently lower error rate in OCR scanning than does OneNote (as I demonstrate in this thread), and also can scan tables with columnar text, retaining the columnar layout, for pasting into OneNote or (say) Excel.

A bit off-topic, but might come in useful:
Some years back, on a very large and important documentation conversion project for an electrical engineering company, I tested and deployed for use a piece of excellent software (Omnipage) which operated on similar principles as above. The documents were vitally important assets as they related to specs of specific high-voltage electrical equipment (physical assets) in the field (e.g., transformers and substations in the National Grid), which had to be updated as and when the  equipment had maintenance/changes carried out on it - this was quite literally a matter of life-or-death risk for the field engineers who had to service the equipment, because sometimes the equipment isolation procedure was changed/modified during maintenance, and this had to be logged in the specs. Thus the new isolation procedures were documented to make it safe for the next engineer who might work on that asset in future - the engineers relied absolutely on the documentation for performing correct isolation.

Unfortunately, a lot of the documentation assets could not be updated, As they were security-locked and the relevant security passwords had been lost during a prior corporate takeover.    :o
Omnipage  was able to bypass security-copy/printing-locked .PDF and other document files by simply reading in the file to RAM as a series of images, and then OCRing the images in RAM. It could then output copies of the images in RAM as a new and separate (unlocked) .PDF file, (usually without errors), or as an editable/indexable .PDF file (usually with very few errors). It also handled diagrams, etc. as discrete images in the file. Very handy if one needed to have text-editable/copyable/indexable copies of previously "locked" documents!    :Thmbsup:

Here, for info:
Never retype another document
Don't spend hours retyping documents. With OmniPage Standard, the world's best selling OCR software, scan and convert different types of documents, such as paper, PDF files or images into editable and searchable files with ease.

Get OmniPage Standard for £79.99

Copied from: OmniPage Standard | Nuance (UK) - <https://www.nuance.com/en-gb/print-capture-and-pdf-solutions/optical-character-recognition/omnipage/omnipage-standard.html>
657
Living Room / Re: Whatsapp Desktop: can it do videocalls?
« Last post by IainB on January 07, 2018, 06:22 AM »
LINE also has full chat and video functionality from:
  • The Android app.
  • The Windows Phone app.
  • The PC-based app (does not require an emulator to be installed first).

Not sure whether this is of any use/help though.
658
@mwb1100:
Yes. Method is described per links in my comment above:
From <https://danielmiessler.com/blog/simple-explanation-difference-meltdown-spectre/>
   1. The meltdown paper: <https://meltdownattack.com/meltdown.pdf>
   2. The spectre paper: <https://spectreattack.com/spectre.pdf>

By the way, "FUD" in the context that I was using it, refers to:
"Fear, uncertainty and doubt, known as the FUD concept, was coined in the 1970s by computer architect Gene Amdahl when he left IBM to start his own company. Amdahl later accused the prominent technology corporation of using FUD tactics to scare consumers into sticking with "safe" IBM products instead of purchasing competitors' products."
 - <https://www.thefreelibrary.com/Effective+decision-making%3A+managing+fear%2C+uncertainty+and+doubt%3A+...-a0278509274>

Similarly, sales of Y2K "risk mitigation" projects were arguably - and from experience - largely reliant on FUD. As a species, we seem to be gullible and susceptible to FUD, as the folk tale of Henny Penny so adroitly displays. Most scams have the precursors of FUD and/or Greed, where the Fear component is typically the fear of an imaginary potential risk/loss - an irrational illusion - that takes on the nature of a concrete and incontrovertible reality in the victim's paradigms.
(See also "the precautionary principle" and "the improbability drive".)
659
Living Room / Re: Whatsapp Desktop: can it do videocalls?
« Last post by IainB on January 07, 2018, 02:38 AM »
Try it and you tell us.
:Thmbsup:
"Nullius in verba/verbo." Motto of the Royal Society, London, UK. Literally, "Take nobody's word for it; see for yourself".
This motto indicates that currently, legitimate science seems to be based on the rejection of trust.
660
Clipboard Help+Spell / Re: Clip Order and Duplicate Copies
« Last post by IainB on January 07, 2018, 02:28 AM »
Thanks for asking. Actually there was no resolution to this issue as much as a confirmation that when a piece of text is copied more than once it is treated as one clipboard item.
I will have to make some differentiation between my placeholders if they are consecutive like * and **

You could try: CHS Options--> Misc. Options 1 --> When duplicate found: "Don't check for duplicates"

I haven't tried it, but I would presume that that could probably sort out your requirement to preserves duplicates in the stack in the order in which they arrive.
Just a thought.

Maybe we need a "CHS Experiential Tips and Tricks" thread, or something, in this forum. There's so much thoughtfully-designed functionality in CHS that even its creator - @mouser - sometimes seems to forget about bits of it.
661
N.A.N.Y. 2018 / Re: NANY 2018 Release: Constant Info
« Last post by IainB on January 07, 2018, 01:51 AM »
 ;)
662
^^ Good link. Thanks. And the author is right - it is FUD, and generally, wherever one finds FUD, one will usually find an accompanying $commercial and/or a political motivation, if not simply an "ulterior" motive.
663
Living Room / Re: Knight to queen's bishop 3 - Snowden <--> James Risen.
« Last post by IainB on January 06, 2018, 01:23 AM »
I was reading a post on democracynow.org of the transcript of a 5th January 2018 video interview with Pulitzer prizewinner James Risen - an American journalist. The transcript is well worth a read, as it is quite educational, but the 15,000-word article referred to in the transcript - "The Biggest Secret" (see link in the quote below) - seems to be excellent journalism and provides a background as to what Snowden later revealed and the events leading up to Risen winning the Pulitzer, though it sometimes seems quite frightening in its implications for suppression of freedoms and especially freedom of the press to print the truth without punishment/retribution and to protect their legitimate sources, where Truth and the advocates of Truth are the main casualties in this, what seems to be, post-fact, post-truth, "truthism" and "fake news" era.

The link to the transcript is: The Biggest Secret: James Risen on Life as a NY Times Reporter in the Shadow of the War on Terror | Democracy Now!

I found the transcript very interesting, because it sheds light on the US government prohibition/suppression of reporting of US state-sponsored spying - which spying Snowden eventually blew the whistle on - including the warrantless wiretapping and the broader effort to gather email and phone records of Americans in a "massive program that we later learned was codenamed Stellar Wind."

The intro to the post is a good summary of its relevance (my emphasis):
We spend the hour with former New York Times reporter James Risen, who left the paper in August to join The Intercept as senior national security correspondent. This week, he published a 15,000-word story headlined “The Biggest Secret: My Life as a New York Times Reporter in the Shadow of the War on Terror.” The explosive piece describes his struggles to publish major national security stories in the post-9/11 period and how both the government and his own editors at The New York Times suppressed his reporting, including reports on the Bush administration’s warrantless wiretapping program, for which he would later win the Pulitzer Prize. Risen describes meetings between key Times editors and top officials at the CIA and the White House. His refusal to name a source would take him to the Supreme Court, and he almost wound up in jail, until the Obama administration blinked.

Copied from: The Biggest Secret: James Risen on Life as a NY Times Reporter in the Shadow of the War on Terror | Democracy Now! - <https://www.democracynow.org/2018/1/5/the_biggest_secret_james_risen_on>
664
Ah, I see. You might well be right, though it goes against the grain to admit that I might be at fault for not having perceived that on first reading his comment. I wouldn't like people to think that I might be one matchstick short of a full box. That wouldn't dovetail well into my own sense of self-identity. I would prefer them to think that I was a cut above the rest.
No need to bridle. The plane truth is that, in order to shine, you must ignitor go down in flames butt neither burn a hole in your pocket nor singe a finger.
-cranioscopical (January 05, 2018, 01:21 PM)
Cor, strike a light! That's a good one!
665
Official Announcements / Re: Big News: New DonationCoder Server
« Last post by IainB on January 05, 2018, 01:33 PM »
And Mexico will pay for it!
Waycist.
666
Interesting:
"Best explainer yet for Meltdown and Spectre"
Refer <https://www.askwoody.com/2018/best-explainer-yet-for-meltdown-and-spectre/>
- and link to <https://danielmiessler.com/blog/simple-explanation-difference-meltdown-spectre/>

There are 2 .PDF (academic) papers (Meltdown.pdf and Spectre.pdf) downloadable from the latter link, which seem quite illuminating, sometimes in what they do not say. It seems the researchers may have been working on identifying the type and extent of these vulnerabilities since 2016, at least.
There is evidence of co-ordination between the parties involved, so it seems that someone is co-ordinating this business, but quite who they are or the mechanism of how they are doing it, or for how long they have been doing it (and why) is not immediately apparent.
667
"I believe Japan doesn't yet understand Christmas."
Very droll. That is priceless. Is it real or a photoshopped job?
I can't quite believe it.

EDIT: I checked on Snopes.com - <https://www.snopes.com/holidays/christmas/santacross.asp>
 - but it just seems to pontificate with a load of spurious BS.
Seems to have gone to the dogs somewhat.

Still, it's an amusing pic, and the Japanese Shinto bias and culture probably means that they are unlikely to always fully understand Western/Christian customs/icons/values - though whether that is true in this case seems to be a moot point. (It could be a fake.)
668
N.A.N.Y. 2018 / Re: NANY 2018 Release: Constant Info
« Last post by IainB on January 05, 2018, 11:11 AM »
... I made bold just to be more in your face, especially ...
That will bring the 'attention value' in the same league as double confirmations (1st: 'do you want to delete this?' 2nd: 'are you really sure?'): they won't be noticed anymore, and only dismissed asap without reading/comprehending the message.
A useful feature would be a list of previous notifications (timestamped), easily accessible from the UI
I always recommend putting up text in a 14-point solid black bold font, with a bright green background and flashing yellow highlight on the text - it is generally far more reliable at getting people's attention.
If a reader can't perceive that, then they would arguably already be blind anyway.
669
Awesome.
Anyone else? Would be nice to have some chinese, french, italian, arabic, greek, polish, etc., etc!
Well, I was once fluent in Welsh, though a bit rusty now.
And I speak Esperanto like a native.
My wife might be willing to help with Thai, if I asked her nicely.
Ditto for my daughter and Maori.
670
Target, meanwhile, thought he had espied a different kind of band, and, on closer inspection realised that the word "band" might have an elastic quality.
That's a bit of a stretch! I think it was just a wind-up.
-cranioscopical (January 05, 2018, 08:19 AM)
Ah, I see. You might well be right, though it goes against the grain to admit that I might be at fault for not having perceived that on first reading his comment. I wouldn't like people to think that I might be one matchstick short of a full box. That wouldn't dovetail well into my own sense of self-identity. I would prefer them to think that I was a cut above the rest.
671
@mouser: Thanks for posting this news item from the always-reliable Reuters news. I don't know what to make of it. I had already read similar, elsewhere, as the Internet seems to have gone crazy over "Meltdown" and "Spectre" (such dramatic and scary names!) these last couple of days. They are a "thing", it seems, and may be potentially even worse and more imminently threatening as a national security risk than Climate Change™, or something. Anyway, we must act - and now! There's no debate about that, except perhaps from the usual pointy-headed tinfoil-cap-wearing conspiracy theorists whom we all spurn as less than human - and rightly so.

A report and video interview from the always-reliable CNN investigative reporting team mentions:
  • that the flaws affect "...billions of computers and smartphones" (Oh no!),
  • that "Meltdown" (sounds a bit overheated to me) affects only (all/most) Intel processors(!), whereas,
  • "Spectre" (sounds like code for a sorta James-Bondi ghostly Russian spy system to me) "...exists in almost every computer system" (which sounds scarily pretty comprehensive),
  • that "Intel CEO Brian Krzanich sold about half his stock months after he learned about critical flaws in billions of his company's microchips.", which carried the implicit suggestion that the flaw(s) were deemed to be serious enough for the CEO to risk potentially breaching insider trading regulations constraining the sale of Intel stock - so thus, obviously the flaw(s) are real and serious and need to be remedied ASAP.   :tellme:
  • that these hardware/firmware design vulnerabilities have apparently been known about/discussed for years as being potentially exploitable, and were a known result (trade-off) of chip hardware designers working towards maximising optimum throughput - the implication being that to "fix" them now could necessarily reduce throughput and slow down all our PCS/smartphones. (Mightt we not all need to buy new, non-vulnerable CPUs?)   :tellme:

Oh dear, what a pity, never mind.

The spin seems to be based on a supposition that these are hardware/firmware vulnerabilities/flaws, or something, that were not previously known about (which would seem to not be true), whereas what we can deduce seems to be that this is the first time that some details of these vulnerabilities have been published (I think that, at least could be true).

In the Reuters report you quoted, "Daniel Gruss" (not sure whether that is a real person) is the name assigned to the "discovery" of the "Meltdown" flaw, whereas we are only told - somewhat ambiguously - that "Separately, a second defect called Spectre has been found".
What? Simultaneously? Coincidentally? Just like that?    :tellme:
Woooow, scary; must download the fix ASAP before the bogeyman looks into my laptop/smartphone/raspberry Pi firmware with "X-ray vision" (Yep, that's what it was called.). Then I shall feel safer.

Yeah, right.

The parallel report that the Intel CEO apparently had the audacity to risk potentially flouting insider trading rules and sell off his max limit of stock at a good price before the flaw(s) were published (Shock! Horror! Who would do such a thing! Capitalist scum!) is really interesting. Apparently (per CNN), Intel stock had already dropped 6% on the "bad news" about the chips, or something, so Brian Krzanich could now redeem himself by buying his stock back at a hefty discount, even increasing his stockholding at no extra cost - if he wished. Ahh, serendipity. Bet there wasn't a 99% chance that that price drop wouldn't happen, eh?

Colour me highly skeptical - especially given the history/experience/example(s) I coincidentally referred to in the recent post here:
Unfortunately, history also shows that it generally doesn't seem to make a blind bit of difference whether corporations exhort their personnel to conform to avoidance of this or that unethical or illegal practice or "behaviours", because people (usually senior managers and executives) will attempt to do their damnedest to work around such "ethical" constraints where they see a potential pot of gold, or a savings, or a marketing advantage can be had.

Of course, Microsoft, Intel, AMD, et al are presumably assiduously working collaboratively day and night now, even as I write this, and probably after I have gone to sleep for the night (though I am a bit of an insomniac), to push out a broad "fix" to these terrifying flaws. The last thing we want is people "peeking at our passwords" or, maybe worse, even "looking at what tabs we had open in our browsers". Oh, the horror! It was bad enough when Snowden blew the whistle on the NSA spying. Oh, but wait...     :o

Which rather begs the question as to whether these apparently long-known vulnerabilities (QED) and flaws were not already being (relatively) "harmlessly" exploited by (say) the NSA or other state agencies/organisations, or whether the comprehensive world-wide "fixing" of CPU hardware/firmware is actually necessary, and whether the reality of the "fix" might not be worse than the reality of the supposed vulnerabilities, introducing (say) new backdoors where there were none before... How would we know for sure?    :tellme:
But I suspect that there may not be any consumer option there. It currently rather seems that we WILL get the fix via a remorseless push, and whether we want it or not, and it may have already started.
Ordinarily, I would say that "Doctor knows best.", but - post-Snowdengate -  I'm none too sanguine about these IT medicos and their "You can trust us to do no evil!" (or similar) approach...   I mean, it's not like they have taken the Hippocratic Oath, or something - is it?    :tellme:

I couldn't help thinking that this all seemed to be déjà vu for some reason, and then I recalled the Halcyon days of the Y2K con trick work that I and thousands of others helped to perpetrate carry out, exploiting gullible helping clients who bought into our consultancies' hugely lucrative Y2K risk mitigation proposals. The poor wee darlings couldn't sleep at night for worrying that the sky was falling down - and it was! Yes! It really was! - because all their CPU-controlled systems, including in computer-rooms, elevators, calculators, PC workstations and distributed 3-tier LANs and databases, aircraft control systems, telephone exchanges, etc. were all at risk - very real risk - of stopping dead on the turn of the year 2000. Aircraft would literally fall out of the skies, elevator brakes in tall buildings would come OFF automatically sending the lift and its occupants hurtling to certain destruction below, banks and payment systems would collapse as their systems stopped, food and water would be in short supply due to the banking system collapse and store checkouts not operating, balance sheets would evaporate, huge losses would be incurred, etc..  Oh, the horror!

Well, we put their little minds at rest, so they could sleep peacefully, secure in the knowledge that we had put mitigation plans in place and mitigated the risks for them, the poor dears. So they slept on soundly, whilst we tiptoed off into the sunset of the first day of 2000, laughing all the way to the bank, secure in the knowledge that the suckers clients were convinced that we had delivered them a good service.
Ah, those were the days, eh?    :Thmbsup:
Reminiscing now...
It would be nice if we could catch another gravy train like that...   Oh, but wait...    :o
...looks like the MSM (MainStream Media) may have already climbed aboard. A quick survey seems to show pretty consistent reporting (almost word-for-word) of the narrative coming from all/most "news" sources, with little real variation and no apparent evidence of critical investigative journalism. Speaking as the ex-Principle Marketing Consultant for the AP region, to what was apparently the third-largest IT corporation on the planet at the time, and where my specialism was strategic marketing communications planning (and in which I was regarded as being pretty capable), the MSM chatter on this Meltdown-gate and Spectre-gate (my terms, for want of a better terminology) would seem to have all the markings of a well-orchestrated and well-synchronised public communications launch. Not a bad job at all.
Respect!   :Thmbsup:
672
Target, meanwhile, thought he had espied a different kind of band, and, on closer inspection realised that the word "band" might have an elastic quality.
673
Meanwhile, Tenon saw that the band had stopped playing and had left the stage, to be replaced by bits of stringy rubber.
It was a rubber band.
674
Tooth immediately felt himself warm to Tenon.
675
Tenon looked across the room and saw Tooth wave madly at him.
He waved back with a small wave of his little finger - a microwave.
Pages: prev1 ... 22 23 24 25 26 [27] 28 29 30 31 32 ... 264next