Andrew McGlashan wrote:
> On 8/04/2015 12:08 AM, Russell Coker wrote:
>> At the meeting there was a mention of the fact that we now have a legal
>> precedent for film companies to force ISPs to divulge the names of customers
>> who might have torrented movies.
> This was bound to catch up with iiNet [and other] users....
>
>> Is there any good anonymous peer to peer software? Something that uses tor
>> hidden services for all communications?
> Much better to just keep to legal and proper downloads, don't you think?
Well of course that goes without saying !
the very idea of owning movies which I haven't paid for;
or even converting DVD's so they are playable outside of brain-dead DVD
players,
(which mostly also seem incapable of playing them);
is abhorrent to my higher moral self.!
I even believe there are some who have copies of that other OS what was
it called .....;
anyway they have not paid for it apparently.
There seems to exist a whole category of software ..shareware ?
where such behaviour is rife.
This software philosophy, what's it called 'open-source' ?;
why it's just encourages such an attitude !
Oh Andrew; how I concur with you regarding the wickedness of the world !
regards Rohan McLeod
Hey folks,
Is anyone in need of more 'vintage' computer gear?
There's a stack of stuff I've got:
* BBC + assorted parts
* 386 and up motherboards
* 486 and up CPUs
* Assorted RAM (FP/EDO and up)
* 2x APC rack mount 700VA UPSs
* Pentium, PPro, P3, P4, Cel D etc. and up computers (one even has a Video Blaster SE100 in it, with the cables)
* Many assorted IO cards (ISA, VLB)
* Labtam X term (might even be able to rustle up an AUI adapter for it)
* Assorted tower cases (AT, ATX)
* 2x Wyse60 serial terminals
* Multiple 10/100 switches (a couple may be managed) of varying sizes (16-24 port I think)
* Multiple WiFi routers with and without modems, one 3G
* Cisco SHDSL modem (dumpster dive)
* 3Com business routers (another dumpster dive)
* HP DL380 (G3 I think)
* IBM xSeries 336
* DLT IV (I think ... VS80?) drive
* Assorted 33.6 and 56K modems
* Parallel port scanner (UMAX Astra 600)
* Assorted CRT displays
* Assorted 3.5" and 5.25" drives
I'm thinking a trip to local eWaste collection point might be in order,
but before turfing stuff, like to see if it'll get another go.
A lot of it's in the "I never got around to using it", or "I haven't
used it in ages" category :)
Hello All,
I have a windows based family member who is sending out going invoices via
email, I think using a Telstra Bigbond email account.
Somehow somebody is copying my relatives outgoing emails, replacing the
contact details with their (very similar) contact details, and replacing
the bank account details with their bank account details. All the other
unique details in the invoice are the same and customized for the client.
The attacker responds to emails to the new (but almost identical) email
address that was in the email, and impersonates my relative in email
conversations.
I think (need to check) the client gets two copies of the invoice, one good
and one bad.
This results the clients paying the wrong account.
My relative has changed his email password, had a complete virus scan of
his computer; however the issue is still occurring.
It seems like a very much targeted attack. It is becoming somewhat
expensive.
Any ideas? Apart from sending invoices postal? Which may or may not work
depending on what access the attacker has? Is there anyone I could refer my
relative to in order sort out this mess?
Unfortunately, I think "use GPG" isn't an option. Even if his emails had
signatures, it is unlikely his clients would know how to check them.
Obviously this goes to show how insecure email is, however I am speculating
that the intruder doesn't have access to the network to monitor the SMTP
sessions.
Regards
On Tue, 29 Sep 2015 at 16:36 David Tulloh <david(a)tulloh.id.au> wrote:
> As an immediate solution I suggest switching to an online email system
> such as GMail. This can be done easily by redirecting the account or using
> gmail fetcher to check the external server, outgoing emails can be sent
> with the existing from address so there is visible change.
>
How does BigPond work? I assumed it would be an web based online system,
maybe that is a bad assumption my part.
In which case, if it is something like outlook on his computer talking
SMTP/POP/IMAP need to make sure it is secure, like other people have
mentioned.
It is is a desktop computer, would be surprised if it is using WIFI, but
something I should check.
Are compromised routers common?
There a number of possibilities here. I don't like to suggest random
changes unless I can get some proof that the change addresses the actual
attack vector. e.g. changing to a gmail account would not help if there is
some sort of hidden keyboard logger on the computer. Apparently it is a
bluetooth keyboad, how secure are bluetooth keyboards? Or if my relative
changed an obvious password to another easy to guess password.
Assembled cognoscenti; just idle curiosity really.
I am wondering about , causes of anomalous difference in execution time,
same application (FreeDVDDecrypter),
same OS (XP x64),
different boxes ?
Box 1: Asus M4A79XTD_EVO; 16GB RAM;CPU AMD Phenom II x4 (4 core) 965 3.4GHz
takes about 30min for 6GB DVD, with 1 core obviously flat-chat ~100%
Box 2: Asus_P6T-intel-i7; 20GB RAM; CPU Intel i7 (4 core) 940 2.93 GHz
takes about 10min for same 6GB DVD, with no core seemingly particularly
active
regards Rohan McLeod
--------------------------------------------
On Sun, 16/8/15, spyder.king(a)yahoo.com.au <spyder.king(a)yahoo.com.au> wrote:
Subject: The 30th anniversary of a long wait for some ...
To: luv-talk(a)luv.asn.au
Received: Sunday, 16 August, 2015, 4:47 AM
SNIP
I've read a lot of places
that even in the USA, Amigas weren't available until
September 1985, the same month as the MsDOS application (not
OS!) Microsoft Windows (undeserved
™). ("Microsoft Blind" or
"Microsoft Curtain" would have described it more
truthfully since it was in some ways covering over the O.S.
)
SNIP
------------------------------------------------------------------------------------------------
Actually, MAUG http://tech.groups.yahoo.com/group/MAUG/ will have the 30th anniversary meeting, (and AGM I think), tonight and some kind of sale ( mostly Amiga stuff) next month, unless they don't. In other words, check the website b4 going, you don't need to be a member of the Yahoo group to read their discussions, but you will need a recent common graphical web-browser.)
Not long after the first Amiga and first Microsoft Windows releases in September, 1985, the Free Software Foundation was born.
https://fsf.org/fsf30/celebration I think there is no clear ranking between the significance of these three occurrences since we can only speculate what would have happened if one, two or all of them hadn't happened.
For example, I can well imagine that a GNU-like licence would likely not have been widely adopted for some time if ever, so if Linus had still written his kernel he would have used a compiler with a different licence, perhaps a totally unfree one. Perhaps he would have used an MIT licence for his software, or maybe something quite else. Maybe GEM or Geoworks would have come to be on most IBM compatibles' presumably at a slower pace without Microsoft's involvement. Maybe X86 P,ieces of C.rudity would not have so dominated for so long. As for the Amiga, while anything above a "watch" or *duino works more like an Amiga than an IBM PC or Macintosh from 1985, it's innovations' (for that price point), like eg. those of Charles Babbage, Konrad Zuse, Ivan Sutherland, Doug Engelbart, Charles F. Moore etc were often less influential than they were pioneering.
~~~~~~~~~~~~~~
Dav-id
" .... We hand over the most cordial congratulations by the Soviet government on the occasion of splendid success of German Wehrmacht. Guderian's tanks broke through to the sea near Abbeville, powered by Soviet fuel, the German bombs, that razed Rotterdam to the ground, were filled with Soviet pyroxylin, and bullet cases, which hit the British soldiers retreating from Dunkirk, were cast of Soviet cupronickel alloy..."
Vyacheslav Molotov, then Foreign Policy Minister of the supposedly opposite USSR.
Posted by: spyder.king(a)yahoo.com.au
Reply
via web post
•
Reply to sender
•
Reply to group
•
Start a New
Topic
•
Messages in this
topic
(1)
Visit Your Group
• Privacy • Unsubscribe • Terms of Use
.
__,_._,___
#yiv2475127030 #yiv2475127030 --
#yiv2475127030ygrp-mkp {
border:1px solid #d8d8d8;font-family:Arial;margin:10px
0;padding:0 10px;}
#yiv2475127030 #yiv2475127030ygrp-mkp hr {
border:1px solid #d8d8d8;}
#yiv2475127030 #yiv2475127030ygrp-mkp #yiv2475127030hd {
color:#628c2a;font-size:85%;font-weight:700;line-height:122%;margin:10px
0;}
#yiv2475127030 #yiv2475127030ygrp-mkp #yiv2475127030ads {
margin-bottom:10px;}
#yiv2475127030 #yiv2475127030ygrp-mkp .yiv2475127030ad {
padding:0 0;}
#yiv2475127030 #yiv2475127030ygrp-mkp .yiv2475127030ad p {
margin:0;}
#yiv2475127030 #yiv2475127030ygrp-mkp .yiv2475127030ad a {
color:#0000ff;text-decoration:none;}
#yiv2475127030 #yiv2475127030ygrp-sponsor
#yiv2475127030ygrp-lc {
font-family:Arial;}
#yiv2475127030 #yiv2475127030ygrp-sponsor
#yiv2475127030ygrp-lc #yiv2475127030hd {
margin:10px
0px;font-weight:700;font-size:78%;line-height:122%;}
#yiv2475127030 #yiv2475127030ygrp-sponsor
#yiv2475127030ygrp-lc .yiv2475127030ad {
margin-bottom:10px;padding:0 0;}
#yiv2475127030 #yiv2475127030actions {
font-family:Verdana;font-size:11px;padding:10px 0;}
#yiv2475127030 #yiv2475127030activity {
background-color:#e0ecee;float:left;font-family:Verdana;font-size:10px;padding:10px;}
#yiv2475127030 #yiv2475127030activity span {
font-weight:700;}
#yiv2475127030 #yiv2475127030activity span:first-child {
text-transform:uppercase;}
#yiv2475127030 #yiv2475127030activity span a {
color:#5085b6;text-decoration:none;}
#yiv2475127030 #yiv2475127030activity span span {
color:#ff7900;}
#yiv2475127030 #yiv2475127030activity span
.yiv2475127030underline {
text-decoration:underline;}
#yiv2475127030 .yiv2475127030attach {
clear:both;display:table;font-family:Arial;font-size:12px;padding:10px
0;width:400px;}
#yiv2475127030 .yiv2475127030attach div a {
text-decoration:none;}
#yiv2475127030 .yiv2475127030attach img {
border:none;padding-right:5px;}
#yiv2475127030 .yiv2475127030attach label {
display:block;margin-bottom:5px;}
#yiv2475127030 .yiv2475127030attach label a {
text-decoration:none;}
#yiv2475127030 blockquote {
margin:0 0 0 4px;}
#yiv2475127030 .yiv2475127030bold {
font-family:Arial;font-size:13px;font-weight:700;}
#yiv2475127030 .yiv2475127030bold a {
text-decoration:none;}
#yiv2475127030 dd.yiv2475127030last p a {
font-family:Verdana;font-weight:700;}
#yiv2475127030 dd.yiv2475127030last p span {
margin-right:10px;font-family:Verdana;font-weight:700;}
#yiv2475127030 dd.yiv2475127030last p
span.yiv2475127030yshortcuts {
margin-right:0;}
#yiv2475127030 div.yiv2475127030attach-table div div a {
text-decoration:none;}
#yiv2475127030 div.yiv2475127030attach-table {
width:400px;}
#yiv2475127030 div.yiv2475127030file-title a, #yiv2475127030
div.yiv2475127030file-title a:active, #yiv2475127030
div.yiv2475127030file-title a:hover, #yiv2475127030
div.yiv2475127030file-title a:visited {
text-decoration:none;}
#yiv2475127030 div.yiv2475127030photo-title a,
#yiv2475127030 div.yiv2475127030photo-title a:active,
#yiv2475127030 div.yiv2475127030photo-title a:hover,
#yiv2475127030 div.yiv2475127030photo-title a:visited {
text-decoration:none;}
#yiv2475127030 div#yiv2475127030ygrp-mlmsg
#yiv2475127030ygrp-msg p a span.yiv2475127030yshortcuts {
font-family:Verdana;font-size:10px;font-weight:normal;}
#yiv2475127030 .yiv2475127030green {
color:#628c2a;}
#yiv2475127030 .yiv2475127030MsoNormal {
margin:0 0 0 0;}
#yiv2475127030 o {
font-size:0;}
#yiv2475127030 #yiv2475127030photos div {
float:left;width:72px;}
#yiv2475127030 #yiv2475127030photos div div {
border:1px solid
#666666;height:62px;overflow:hidden;width:62px;}
#yiv2475127030 #yiv2475127030photos div label {
color:#666666;font-size:10px;overflow:hidden;text-align:center;white-space:nowrap;width:64px;}
#yiv2475127030 #yiv2475127030reco-category {
font-size:77%;}
#yiv2475127030 #yiv2475127030reco-desc {
font-size:77%;}
#yiv2475127030 .yiv2475127030replbq {
margin:4px;}
#yiv2475127030 #yiv2475127030ygrp-actbar div a:first-child {
margin-right:2px;padding-right:5px;}
#yiv2475127030 #yiv2475127030ygrp-mlmsg {
font-size:13px;font-family:Arial, helvetica, clean,
sans-serif;}
#yiv2475127030 #yiv2475127030ygrp-mlmsg table {
font-size:inherit;font:100%;}
#yiv2475127030 #yiv2475127030ygrp-mlmsg select,
#yiv2475127030 input, #yiv2475127030 textarea {
font:99% Arial, Helvetica, clean, sans-serif;}
#yiv2475127030 #yiv2475127030ygrp-mlmsg pre, #yiv2475127030
code {
font:115% monospace;}
#yiv2475127030 #yiv2475127030ygrp-mlmsg * {
line-height:1.22em;}
#yiv2475127030 #yiv2475127030ygrp-mlmsg #yiv2475127030logo {
padding-bottom:10px;}
#yiv2475127030 #yiv2475127030ygrp-msg p a {
font-family:Verdana;}
#yiv2475127030 #yiv2475127030ygrp-msg
p#yiv2475127030attach-count span {
color:#1E66AE;font-weight:700;}
#yiv2475127030 #yiv2475127030ygrp-reco
#yiv2475127030reco-head {
color:#ff7900;font-weight:700;}
#yiv2475127030 #yiv2475127030ygrp-reco {
margin-bottom:20px;padding:0px;}
#yiv2475127030 #yiv2475127030ygrp-sponsor #yiv2475127030ov
li a {
font-size:130%;text-decoration:none;}
#yiv2475127030 #yiv2475127030ygrp-sponsor #yiv2475127030ov
li {
font-size:77%;list-style-type:square;padding:6px 0;}
#yiv2475127030 #yiv2475127030ygrp-sponsor #yiv2475127030ov
ul {
margin:0;padding:0 0 0 8px;}
#yiv2475127030 #yiv2475127030ygrp-text {
font-family:Georgia;}
#yiv2475127030 #yiv2475127030ygrp-text p {
margin:0 0 1em 0;}
#yiv2475127030 #yiv2475127030ygrp-text tt {
font-size:120%;}
#yiv2475127030 #yiv2475127030ygrp-vital ul li:last-child {
border-right:none !important;
}
#yiv2475127030