|
True. Some puns are larder than life.
... such stuff as dreams are made on
|
|
|
|
|
So, we're back bacon jokes about the fat again?
Sent from my Amstrad PC 1640
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
I sure he a grease with you.
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
It seemed like a great idea at the time. But in rindsight I am not so sure.
... such stuff as dreams are made on
|
|
|
|
|
This is getting a little rough around the edges Griff.
And would pigsellated swine be edible to VGAns?
I'm pretty sure I would not like to live in a world in which I would never be offended.
I am absolutely certain I don't want to live in a world in which you would never be offended.
Freedom doesn't mean the absence of things you don't like.
Dave
|
|
|
|
|
Bacon!
Everyone has a photographic memory; some just don't have film. Steven Wright
|
|
|
|
|
From the cybersecurity training:
Nonpublic information should only be saved to your network drive
Why do we even have hard drives then on our computers? IMO, non-public information includes source code, proprietary in-house and third party documentation, and so forth. WTF?
But this one:
The information on your computer is only fully protected by encryption when it is powered off or in hibernate mode. Simply locking your computer is not sufficient for encryption.
Yeah, information is definitely "protected" when the computer is off. But how encryption protects your data when the computer is off is beyond me. Maybe I'm not as smart as I thought.
And unrelated, when I browsed over to norsecorp.com (live feed of cyberattacks, yeah, right) I got this (my bold):
This page is currently offline. However, because the site uses Cloudflare's Always Online™ technology you can continue to surf a snapshot of the site. We will keep checking in the background and, as soon as the site comes back, you will automatically be served the live version.
Dude. You really don't want to use "currently offline" and "Always Online" in the same sentence.
|
|
|
|
|
Someone I know worked somewhere they were told to keep confidential files on their desktops rather than the C drive.
Edit - file as in data file not physical file, and desktop as in Windows desktop, not their physical desk.
|
|
|
|
|
F-ES Sitecore wrote: to keep confidential files on their desktops rather than the C drive.
|
|
|
|
|
This is probably meant to be read "instead of anywhere else on the C drive".
There is a Windows Policy to backup the desktop at power off, and restore it at power on, so this makes somehow sense. If my computer crashes at work, I will have my desktop back including all the content just by logging on a new computer.
|
|
|
|
|
No, they thought the desktop was some kind of special entity of the operating system that only the person currently logged on could access. They had no idea it was just a folder on the drive and the desktop an application that renders those files as icons.
|
|
|
|
|
Not knowing the exact situation, I might still give them the benefit of doubt and assume they were using folder redirection. You can set up folders - and the desktop is a perfectly good candidate - to be rerouted to some server share. I'm not a domain policy expert, but I'd be surprised if it couldn't be done and that some organizations are doing exactly that today.
|
|
|
|
|
dandy72 wrote: Not knowing the exact situation
They're idiots. That's the exact situation.
|
|
|
|
|
That's a perfectly honest answer if I've ever heard one!
|
|
|
|
|
Windows has Roaming Profiles which are copied back and forth when you log on or off. One issue my company ran into under XP was that the IE cache folders were in the user profile so the copy process would take forever.
|
|
|
|
|
Roland M Smith wrote: Windows has Roaming Profiles...
Not by default it doesn't. If you set up the servers, Active Directory and Group Policy correctly it will have.
Michael Martin
Australia
"I controlled my laughter and simple said "No,I am very busy,so I can't write any code for you". The moment they heard this all the smiling face turned into a sad looking face and one of them farted. So I had to leave the place as soon as possible."
- Mr.Prakash One Fine Saturday. 24/04/2004
|
|
|
|
|
That's not the policy I had in mind.
In any case - I remember that one very well - a few years ago, when MSDN still shipped on CDs/DVDs, they made the mistake at one point of installing 1+ GB worth of data to the roaming profile...which slowed down logins to the point where it rendered systems unusable. I'm a first-hand witness in this case.
|
|
|
|
|
Lots of people refuse to believe me when I tell them that super-cryptic login password on your home PC is a poor joke if your computer is stolen (or seized by some authorities, if that is what you fear). I have had to open their PC and pick out the disk, then install it as the D: drive on my own PC (with my own login), and show them: Look here, I can read your files that you thought were secret because I couldn't log in with your password! I see their open mouths and the horror in their faces...
You can take some measures, such as using Windows' built in encryption of your private files. Once you log in, giving your password, Windows inspects it: Yes, that's what I expected, then I will decrypt your files for you. ... But Windows knew in advance all it needs to decrypt the files. If some FBI agent puts the disk with the encrypted files into his special-edition Windows, telling it: Now pretend that Joe Smuggler just has specified his login password, and go ahead: Decrypt his files for me, as you would for him! - then Windows has all the info it needs to do the job. My version of Windows won't accept an order to simulate a Joe Smuggler login, but I am sure that such versions exist.
In the IDE days, I had a hardware encryption device on the IDE cable, with a physical key (looking like a USB stick) that had to be plugged in when the machine was rebooted, then it could be unplugged and hidden away. In those days, the electronics were not fast enough to handle more than a 40 bit key, yet I consider that far more safe than today's BitLocker where Windows doesn't need you to supply a single bit of secret key: It will decrypt without that. It has all the information it needs to open up the disk. I never saw such encryption devices for SATA; maybe the FBI has made them illegal in the USA. They could be marketed in other countries, though!
Unless I have to supply a key that Windows doesn't know, doesn't save, the files are not protected against eavesdropping, period. In theory, Windows could have a keylogger and an analysis program that knows which applications are encryption programs, and save the password typed along with the file name in a secret database, but I am not that paranoid; I don't think Windows does.
|
|
|
|
|
Marc Clifton wrote: how encryption protects your data when the computer is off is beyond me
When the power goes off, the decryption key field that is generated by the processor fan stops, and the HDD then loses the ability to decrypt it's magnetically stored data.
(With SSD drives, it's all down to little tiny Leprechauns who live in the SATA cable)
Sent from my Amstrad PC 1640
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
OriginalGriff wrote: the decryption key field that is generated by the processor fan stops
Ah, that explains why I can never move a hard drive to another computer. The decryption key is specific to the unique quantum fluctuations of every computer's fan!
As to Leprechauns, I always new there was magic in this world!!!
|
|
|
|
|
Remind me to integrate this stuff into the drivers my 82C55 DIY IDE controller.
I have lived with several Zen masters - all of them were cats.
His last invention was an evil Lasagna. It didn't kill anyone, and it actually tasted pretty good.
|
|
|
|
|
OriginalGriff wrote: (With SSD drives, it's all down to little tiny Leprechauns who live in the SATA cable) What did they do to the homunculus that used to have that job? You didn't cheap out and get the Leprechaun version, did you?
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
The manufacturers outsourced the work to Ireland years ago.
Sent from my Amstrad PC 1640
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
|
The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents that remain readable in the seconds to minutes after power has been removed.
I was working with a video capture card (B&W) in the 80's. I had turned the machine off, pulled the card out of the slot and moved it to another computer, then booted that computer. Crazily, even after a couple minutes of no power, a good 80% of the image that had been in memory was still there and recognizable. We're talking minutes, not seconds, and not SRAM either.
|
|
|
|