|
Phew, dodged the bullet!
Updated yesterday and still fine!
|
|
|
|
|
First thing I did, killed the Update service.
Oh yeah, I'm actually using W10 on a laptop I recently purchased.
Marc
Latest Article - Merkle Trees
Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny
Artificial intelligence is the only remedy for natural stupidity. - CDP1802
|
|
|
|
|
I don't know why people keep complaining about the best windows ever.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
The only sensible option if you are required to use Windows 10 is a LTSB version.
I know it is only an option of you have SA or in Education, but it's the only way to go.
You do have some drawbacks (if you consider then as drawbacks, I don't):
No Windows Store (only a private store if at all)
No Built-in UWP Apps (Apps via side-loading, and this is only possible if the app has an "offline" licensing model)
No Edge (is that really a draw-back?)
Full control of updates and Telemetry
I'll let you decide...
Cheers
Phil
Who the f*** is General Failure, and why is he reading my harddisk?
|
|
|
|
|
New research is turning on its head the idea that legacy systems -- such as Cobol and Fortran -- are more secure because hackers are unfamiliar with the technology. "Old age and treachery will always beat youth and exuberance"
|
|
|
|
|
I suspect it's more that there are many layers to actually get to the COBOL systems.
|
|
|
|
|
Kent Sharkey wrote: New research is turning on its head the idea that legacy systems -- such as Cobol and Fortran -- are more secure because hackers are unfamiliar with the technology.
Seems like a flawed conclusion... if you take a close look at the results it is actually security through obscurity[^] that is responsible for the decrease in incidents on legacy systems. It is simply that not many groups have the necessary penetraton tools for those legacy systems.
Best Wishes,
-David Delaune
|
|
|
|
|
Which per se is dangerous too, because they might lack of those tools or capable persons as well to make the additions or the fixes...
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Security through obscurity is the primary logical fallacy of the security business; it's meaningless from a professional standpoint.
Not only do you have an untenable maintenance gradient, most of the time the systems are not equipped to leave enough of a trail to determine if a breach even occurred.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
Hi,
Nathan Minier wrote: Security through obscurity is the primary logical fallacy of the security business; it's meaningless from a professional standpoint.
Yep, I somewhat agree but I do consider security through obscurity to be a valid layer of security. For example if the remote target machine is on custom DoD hardware (128 bit processor and no x86 or x64 instruction set) and running a customized operating system... this would make it extremely difficult to penetrate. Security through obscurity can be the most powerful layer for intrusion prevention and detection.
Nathan Minier wrote: Not only do you have an untenable maintenance gradient, most of the time the systems are not equipped to leave enough of a trail to determine if a breach even occurred.
I agree. The older equipment needs to rely more on network layer for intrusion detection.
Best Wishes,
-David Delaune
modified 17-Mar-17 18:12pm.
|
|
|
|
|
Randor wrote: For example if the remote target machine is on custom DoD hardware (128 bit processor and no x86 or x64 instruction set) and running a customized operating system... this would make it extremely difficult to penetrate.
If intrusion were the only security concern I might agree. It's not, though, and if such a system were networked and exposed to a public network it would get owned pretty fast through DDOS and basic recon/exploitation tactics. That's the problem with proprietary systems, they are not as rigorously tested against some strangely basic stuff, like buffer overflows.
I'd also like to point out that "Availability" is a leg of the triad, and if it can't talk to other systems (and needs to) due to its "unique" character, the system just DOSed itself.
As it is, though, most of those proprietary systems are only locally networked, if at all, and generally will have administrative and physical controls to compensate for the lack of logical ones. That's just the nature of the risk model used by the RMF, which everyone on the Federal side is supposed to comply with.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
We had floppy disks long before we had CDs, DVDs, or USB thumb drives. Here's the evolution of the portable media that changed everything about personal computing. No mention of notching the single-sided ones to make them double-sided
|
|
|
|
|
Kent Sharkey wrote: No mention of notching the single-sided ones to make them double-sided
And no picture of an actual 8" or 5 1/4" floppy. That plastic thing pictured isn't very "floppy."
Marc
Latest Article - Merkle Trees
Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny
Artificial intelligence is the only remedy for natural stupidity. - CDP1802
|
|
|
|
|
I think I threw out all my 5-1/4" a few moves back. Does anyone still have any, and if so, can you still use them?
TTFN - Kent
|
|
|
|
|
|
Yes. My museum corner has a stats library on 8", a whole bunch of stuff on 5 1/4" and 3 1/2".
And, for the piece de resistance, a TAIHAHO notcher, in original box, complete with $10.48 price sticker. The instructions on the box are worth a laugh:
INSTRUCTIONS FOR USING DISK COUPLER:
1. HOLD DISK AND DISK COUPLER
AS SHOWN BACKSIDE.
2.PLEASE MAKE SURE THE DISK
IS INSERTED INTO LEFTSIDE
OF DISK COUPER & SLIDING
ALL THE WAY TO THE END
OF THE POSITION GUIDE.
3. DEPRESS HANDLE TO MAKE
A PRECISELY POSITIONED NOTCH.
4. FOR USERS OF APPLE II,
ATARI, COMMODORE,
FRANKLIN, KAYPRO & ALL
COMPATIBLE COMPUTERS ETC... Cheers,
Peter
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
The protective sleeve may be as stiff as it likes as long as the disc inside is floppy.
|
|
|
|
|
Quote: Before the Internet was open to the public, it was floppy disks that let us create and trade programs and files.
And BBSs!
|
|
|
|
|
We had no any networking so BBS was not an option, but we could send and get letters with floppy inside, or subscriber to newspapers...
But even before that we had radio programs that at the end they were broadcasting programs, and we were recording it on cassettes... I learned a lot from programs recorded that way...
Skipper: We'll fix it.
Alex: Fix it? How you gonna fix this?
Skipper: Grit, spit and a whole lotta duct tape.
|
|
|
|
|
My very first job at the age of 15 was aligning the heads on 8 inch floppy drives. Micropolis, as I recall. I think that was the first time I got to use an oscilloscope for a practical purpose.
|
|
|
|
|
Our capacity to create new technological solutions leads to four key challenges: security concerns, unexpected behaviors from what we create, technological deficiencies and negative social impacts. DYB DYB DYB, DOB DOB DOB
Wait. That's six.
Edit: my spalling is waful todai
modified 16-Mar-17 18:47pm.
|
|
|
|
|
security concerns, unexpected behaviors from what we create, technological deficiencies and negative social impacts.
In other words, it's like having children.
Marc
Latest Article - Merkle Trees
Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny
Artificial intelligence is the only remedy for natural stupidity. - CDP1802
|
|
|
|
|
Yeah, best to be involved only at the start...
|
|
|
|
|
Let me guess: money, power, dominance, money, and money ?
«When I consider my brief span of life, swallowed up in an eternity before and after, the little space I fill, and even can see, engulfed in the infinite immensity of spaces of which I am ignorant, and which know me not, I am frightened, and am astonished at being here rather than there; for there is no reason why here rather than there, now rather than then.» Blaise Pascal
|
|
|
|
|
Contrasting the agile development world with the world of IoT and embedded development is night and day. Embedded is full of these deploy and forget devices whose code is never updated. It's almost like it requires more rigour when you deal with hardware. Whodathunkit?
|
|
|
|