Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Some random and ultimately pointless commentary

Some random and ultimately pointless commentary

Scheduled Pinned Locked Moved The Lounge
javajavascriptpythoncomsysadmin
38 Posts 22 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R Rage

    This is probably meant to be read "instead of anywhere else on the C drive". There is a Windows Policy to backup the desktop at power off, and restore it at power on, so this makes somehow sense. If my computer crashes at work, I will have my desktop back including all the content just by logging on a new computer.

    Do not escape reality : improve reality !

    F Offline
    F Offline
    F ES Sitecore
    wrote on last edited by
    #15

    No, they thought the desktop was some kind of special entity of the operating system that only the person currently logged on could access. They had no idea it was just a folder on the drive and the desktop an application that renders those files as icons.

    D K 2 Replies Last reply
    0
    • M Marc Clifton

      From the cybersecurity training: > Nonpublic information should only be saved to your network drive Why do we even have hard drives then on our computers? IMO, non-public information includes source code, proprietary in-house and third party documentation, and so forth. WTF? But this one: > The information on your computer is only fully protected by encryption when it is powered off or in hibernate mode. Simply locking your computer is not sufficient for encryption. :laugh: Yeah, information is definitely "protected" when the computer is off. But how encryption protects your data when the computer is off is beyond me. Maybe I'm not as smart as I thought. And unrelated, when I browsed over to norsecorp.com (live feed of cyberattacks, yeah, right) I got this (my bold): > This page is currently offline. However, because the site uses Cloudflare's Always Online™ technology you can continue to surf a snapshot of the site. We will keep checking in the background and, as soon as the site comes back, you will automatically be served the live version. Dude. You really don't want to use "currently offline" and "Always Online" in the same sentence. :laugh:

      Latest Article - Building a Prototype Web-Based Diagramming Tool with SVG and Javascript Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny Artificial intelligence is the only remedy for natural stupidity. - CDP1802

      E Offline
      E Offline
      Eric Lynch
      wrote on last edited by
      #16

      I don't know what it is specific to the topic of cyber-security, but all of the training that's been foisted upon me has contained similar nonsense. This in itself would be bad, but that same training usually contains at least one dangerous bit of technically inaccurate information. Anyhow, the "currently offline" site that is "Always Online" made me burst out laughing...seriously, spittle was involved :) As I'm in the midst of some drudge work right now, the laugh was much appreciated.

      1 Reply Last reply
      0
      • F F ES Sitecore

        No, they thought the desktop was some kind of special entity of the operating system that only the person currently logged on could access. They had no idea it was just a folder on the drive and the desktop an application that renders those files as icons.

        D Offline
        D Offline
        dandy72
        wrote on last edited by
        #17

        Not knowing the exact situation, I might still give them the benefit of doubt and assume they were using folder redirection. You can set up folders - and the desktop is a perfectly good candidate - to be rerouted to some server share. I'm not a domain policy expert, but I'd be surprised if it couldn't be done and that some organizations are doing exactly that today.

        F R 2 Replies Last reply
        0
        • M megaadam

          Hype!! I found the only true guarantee for security here: [OneSafe Software – Official Website – Utility software for PC & Mac](https://onesafesoftware.com/software/) It makes your PC safe! But! I can see in the photos that it also makes Mac's safe! (Even if the ⌘-key is black.) :mad: What really bugs me is that frauds like this appear on big sites, in this case Yahoo! They should really be able to maintain a minimum degree of advertising hygiene.

          ... such stuff as dreams are made on

          D Offline
          D Offline
          dandy72
          wrote on last edited by
          #18

          megaadam wrote:

          What really bugs me is that frauds like this appear on big sites, in this case Yahoo! They should really be able to maintain a minimum degree of advertising hygiene.

          These days Yahoo will take anyone's advertising money.

          1 Reply Last reply
          0
          • M megaadam

            While that may be true, I was spewing anger over the general phenomenon of malware ads on very big sites.

            ... such stuff as dreams are made on

            D Offline
            D Offline
            dandy72
            wrote on last edited by
            #19

            It's not necessarily the size of the site that matters. Just wait until your bank does it.

            1 Reply Last reply
            0
            • M Marc Clifton

              > The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents that remain readable in the seconds to minutes after power has been removed. I was working with a video capture card (B&W) in the 80's. I had turned the machine off, pulled the card out of the slot and moved it to another computer, then booted that computer. Crazily, even after a couple minutes of no power, a good 80% of the image that had been in memory was still there and recognizable. We're talking minutes, not seconds, and not SRAM either.

              Latest Article - Building a Prototype Web-Based Diagramming Tool with SVG and Javascript Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny Artificial intelligence is the only remedy for natural stupidity. - CDP1802

              R Offline
              R Offline
              Rick York
              wrote on last edited by
              #20

              That's one reason why memory was so much slower back then. They used actual capacitors to retain the charge in the memory bit and apparently they had rather low leakage current so they could hold it for a while.

              D 1 Reply Last reply
              0
              • D dandy72

                Not knowing the exact situation, I might still give them the benefit of doubt and assume they were using folder redirection. You can set up folders - and the desktop is a perfectly good candidate - to be rerouted to some server share. I'm not a domain policy expert, but I'd be surprised if it couldn't be done and that some organizations are doing exactly that today.

                F Offline
                F Offline
                F ES Sitecore
                wrote on last edited by
                #21

                dandy72 wrote:

                Not knowing the exact situation

                They're idiots. That's the exact situation.

                D 1 Reply Last reply
                0
                • R Rick York

                  That's one reason why memory was so much slower back then. They used actual capacitors to retain the charge in the memory bit and apparently they had rather low leakage current so they could hold it for a while.

                  D Offline
                  D Offline
                  den2k88
                  wrote on last edited by
                  #22

                  Leakage current has always been minuscule but the surface of the CMOS, which is the source of the "parasite capacity" used to actually store data in DRAM dropped by a huge factor, so it became relevant.

                  GCS d-- s-/++ a- C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- ++>+++ y+++*      Weapons extension: ma- k++ F+2 X

                  1 Reply Last reply
                  0
                  • M Marc Clifton

                    From the cybersecurity training: > Nonpublic information should only be saved to your network drive Why do we even have hard drives then on our computers? IMO, non-public information includes source code, proprietary in-house and third party documentation, and so forth. WTF? But this one: > The information on your computer is only fully protected by encryption when it is powered off or in hibernate mode. Simply locking your computer is not sufficient for encryption. :laugh: Yeah, information is definitely "protected" when the computer is off. But how encryption protects your data when the computer is off is beyond me. Maybe I'm not as smart as I thought. And unrelated, when I browsed over to norsecorp.com (live feed of cyberattacks, yeah, right) I got this (my bold): > This page is currently offline. However, because the site uses Cloudflare's Always Online™ technology you can continue to surf a snapshot of the site. We will keep checking in the background and, as soon as the site comes back, you will automatically be served the live version. Dude. You really don't want to use "currently offline" and "Always Online" in the same sentence. :laugh:

                    Latest Article - Building a Prototype Web-Based Diagramming Tool with SVG and Javascript Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny Artificial intelligence is the only remedy for natural stupidity. - CDP1802

                    P Offline
                    P Offline
                    patbob
                    wrote on last edited by
                    #23

                    Marc Clifton wrote:

                    The information on your computer is only fully protected by encryption when it is powered off or in hibernate mode. Simply locking your computer is not sufficient for encryption.

                    :laugh: Yeah, information is definitely "protected" when the computer is off. But how encryption protects your data when the computer is off is beyond me. Maybe I'm not as smart as I thought.

                    You don't necessarily need a password to get a locked running OS to do stuff for you as the current logged in user (e.g. via a USB attack), and since it can read the encrypted files... If they've enabled the full-drive encryption, and especially the encryption build into the hardware of 2.5" drives, then even if you have physical access, you're going to need the password before you can read the data on the drive if the computer is off when you get there.

                    I live in Oregon, and I'm an engineer.

                    1 Reply Last reply
                    0
                    • M Marc Clifton

                      From the cybersecurity training: > Nonpublic information should only be saved to your network drive Why do we even have hard drives then on our computers? IMO, non-public information includes source code, proprietary in-house and third party documentation, and so forth. WTF? But this one: > The information on your computer is only fully protected by encryption when it is powered off or in hibernate mode. Simply locking your computer is not sufficient for encryption. :laugh: Yeah, information is definitely "protected" when the computer is off. But how encryption protects your data when the computer is off is beyond me. Maybe I'm not as smart as I thought. And unrelated, when I browsed over to norsecorp.com (live feed of cyberattacks, yeah, right) I got this (my bold): > This page is currently offline. However, because the site uses Cloudflare's Always Online™ technology you can continue to surf a snapshot of the site. We will keep checking in the background and, as soon as the site comes back, you will automatically be served the live version. Dude. You really don't want to use "currently offline" and "Always Online" in the same sentence. :laugh:

                      Latest Article - Building a Prototype Web-Based Diagramming Tool with SVG and Javascript Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny Artificial intelligence is the only remedy for natural stupidity. - CDP1802

                      D Offline
                      D Offline
                      David Crow
                      wrote on last edited by
                      #24

                      Marc Clifton wrote:

                      Nonpublic information should only be saved to your network drive

                      So "private" information then? If it's private to me, I'm not sure it should be made "publicly" available.

                      Marc Clifton wrote:

                      Dude. You really don't want to use "currently offline" and "Always Online" in the same sentence. :laugh:

                      I understand what you are saying, but perhaps since the latter is a proper noun (i.e., capitalized), it's not really referring to a state, thus those terms can co-mingle. :confused:

                      "One man's wage rise is another man's price increase." - Harold Wilson

                      "Fireproof doesn't mean the fire will never come. It means when the fire comes that you will be able to withstand it." - Michael Simmons

                      "You can easily judge the character of a man by how he treats those who can do nothing for him." - James D. Miles

                      M 1 Reply Last reply
                      0
                      • OriginalGriffO OriginalGriff

                        Marc Clifton wrote:

                        how encryption protects your data when the computer is off is beyond me

                        When the power goes off, the decryption key field that is generated by the processor fan stops, and the HDD then loses the ability to decrypt it's magnetically stored data. (With SSD drives, it's all down to little tiny Leprechauns who live in the SATA cable)

                        Sent from my Amstrad PC 1640 Bad command or file name. Bad, bad command! Sit! Stay! Staaaay... AntiTwitter: @DalekDave is now a follower!

                        W Offline
                        W Offline
                        W Balboos GHB
                        wrote on last edited by
                        #25

                        OriginalGriff wrote:

                        (With SSD drives, it's all down to little tiny Leprechauns who live in the SATA cable)

                        What did they do to the homunculus that used to have that job? You didn't cheap out and get the Leprechaun version, did you?

                        Ravings en masse^

                        "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

                        "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

                        OriginalGriffO 1 Reply Last reply
                        0
                        • D David Crow

                          Marc Clifton wrote:

                          Nonpublic information should only be saved to your network drive

                          So "private" information then? If it's private to me, I'm not sure it should be made "publicly" available.

                          Marc Clifton wrote:

                          Dude. You really don't want to use "currently offline" and "Always Online" in the same sentence. :laugh:

                          I understand what you are saying, but perhaps since the latter is a proper noun (i.e., capitalized), it's not really referring to a state, thus those terms can co-mingle. :confused:

                          "One man's wage rise is another man's price increase." - Harold Wilson

                          "Fireproof doesn't mean the fire will never come. It means when the fire comes that you will be able to withstand it." - Michael Simmons

                          "You can easily judge the character of a man by how he treats those who can do nothing for him." - James D. Miles

                          M Offline
                          M Offline
                          Marc Clifton
                          wrote on last edited by
                          #26

                          David Crow wrote:

                          but perhaps since the latter is a proper noun (i.e., capitalized), it's not really referring to a state, thus those terms can co-mingle.

                          Quite so, but the proper noun is a product that "guarantees" delivery of a cached static page when your server is down. Which (the cached static page) wasn't working. :rolleyes:

                          Latest Article - Building a Prototype Web-Based Diagramming Tool with SVG and Javascript Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny Artificial intelligence is the only remedy for natural stupidity. - CDP1802

                          D 1 Reply Last reply
                          0
                          • M Marc Clifton

                            David Crow wrote:

                            but perhaps since the latter is a proper noun (i.e., capitalized), it's not really referring to a state, thus those terms can co-mingle.

                            Quite so, but the proper noun is a product that "guarantees" delivery of a cached static page when your server is down. Which (the cached static page) wasn't working. :rolleyes:

                            Latest Article - Building a Prototype Web-Based Diagramming Tool with SVG and Javascript Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny Artificial intelligence is the only remedy for natural stupidity. - CDP1802

                            D Offline
                            D Offline
                            David Crow
                            wrote on last edited by
                            #27

                            Maybe that page falls outside of the "limited copy" range, or it's perhaps not considered "popular."

                            "One man's wage rise is another man's price increase." - Harold Wilson

                            "Fireproof doesn't mean the fire will never come. It means when the fire comes that you will be able to withstand it." - Michael Simmons

                            "You can easily judge the character of a man by how he treats those who can do nothing for him." - James D. Miles

                            1 Reply Last reply
                            0
                            • W W Balboos GHB

                              OriginalGriff wrote:

                              (With SSD drives, it's all down to little tiny Leprechauns who live in the SATA cable)

                              What did they do to the homunculus that used to have that job? You didn't cheap out and get the Leprechaun version, did you?

                              Ravings en masse^

                              "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

                              "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

                              OriginalGriffO Online
                              OriginalGriffO Online
                              OriginalGriff
                              wrote on last edited by
                              #28

                              The manufacturers outsourced the work to Ireland years ago.

                              Sent from my Amstrad PC 1640 Bad command or file name. Bad, bad command! Sit! Stay! Staaaay... AntiTwitter: @DalekDave is now a follower!

                              "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                              "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                              1 Reply Last reply
                              0
                              • M Marc Clifton

                                From the cybersecurity training: > Nonpublic information should only be saved to your network drive Why do we even have hard drives then on our computers? IMO, non-public information includes source code, proprietary in-house and third party documentation, and so forth. WTF? But this one: > The information on your computer is only fully protected by encryption when it is powered off or in hibernate mode. Simply locking your computer is not sufficient for encryption. :laugh: Yeah, information is definitely "protected" when the computer is off. But how encryption protects your data when the computer is off is beyond me. Maybe I'm not as smart as I thought. And unrelated, when I browsed over to norsecorp.com (live feed of cyberattacks, yeah, right) I got this (my bold): > This page is currently offline. However, because the site uses Cloudflare's Always Online™ technology you can continue to surf a snapshot of the site. We will keep checking in the background and, as soon as the site comes back, you will automatically be served the live version. Dude. You really don't want to use "currently offline" and "Always Online" in the same sentence. :laugh:

                                Latest Article - Building a Prototype Web-Based Diagramming Tool with SVG and Javascript Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny Artificial intelligence is the only remedy for natural stupidity. - CDP1802

                                Sander RosselS Offline
                                Sander RosselS Offline
                                Sander Rossel
                                wrote on last edited by
                                #29

                                Some people have a mouth that is Always Online™ even when their brain is currently offline :D

                                Best, Sander Continuous Integration, Delivery, and Deployment arrgh.js - Bringing LINQ to JavaScript Object-Oriented Programming in C# Succinctly

                                1 Reply Last reply
                                0
                                • D dandy72

                                  Not knowing the exact situation, I might still give them the benefit of doubt and assume they were using folder redirection. You can set up folders - and the desktop is a perfectly good candidate - to be rerouted to some server share. I'm not a domain policy expert, but I'd be surprised if it couldn't be done and that some organizations are doing exactly that today.

                                  R Offline
                                  R Offline
                                  Roland M Smith
                                  wrote on last edited by
                                  #30

                                  Windows has Roaming Profiles which are copied back and forth when you log on or off. One issue my company ran into under XP was that the IE cache folders were in the user profile so the copy process would take forever.

                                  L D 2 Replies Last reply
                                  0
                                  • R Roland M Smith

                                    Windows has Roaming Profiles which are copied back and forth when you log on or off. One issue my company ran into under XP was that the IE cache folders were in the user profile so the copy process would take forever.

                                    L Offline
                                    L Offline
                                    Lost User
                                    wrote on last edited by
                                    #31

                                    Roland M Smith wrote:

                                    Windows has Roaming Profiles...

                                    Not by default it doesn't. If you set up the servers, Active Directory and Group Policy correctly it will have.

                                    Michael Martin Australia "I controlled my laughter and simple said "No,I am very busy,so I can't write any code for you". The moment they heard this all the smiling face turned into a sad looking face and one of them farted. So I had to leave the place as soon as possible." - Mr.Prakash One Fine Saturday. 24/04/2004

                                    1 Reply Last reply
                                    0
                                    • M Marc Clifton

                                      From the cybersecurity training: > Nonpublic information should only be saved to your network drive Why do we even have hard drives then on our computers? IMO, non-public information includes source code, proprietary in-house and third party documentation, and so forth. WTF? But this one: > The information on your computer is only fully protected by encryption when it is powered off or in hibernate mode. Simply locking your computer is not sufficient for encryption. :laugh: Yeah, information is definitely "protected" when the computer is off. But how encryption protects your data when the computer is off is beyond me. Maybe I'm not as smart as I thought. And unrelated, when I browsed over to norsecorp.com (live feed of cyberattacks, yeah, right) I got this (my bold): > This page is currently offline. However, because the site uses Cloudflare's Always Online™ technology you can continue to surf a snapshot of the site. We will keep checking in the background and, as soon as the site comes back, you will automatically be served the live version. Dude. You really don't want to use "currently offline" and "Always Online" in the same sentence. :laugh:

                                      Latest Article - Building a Prototype Web-Based Diagramming Tool with SVG and Javascript Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny Artificial intelligence is the only remedy for natural stupidity. - CDP1802

                                      J Offline
                                      J Offline
                                      Joe Woodbury
                                      wrote on last edited by
                                      #32

                                      I think it was HP that had a laptop that was insanely secure, but may have been slightly less so if you were already logged in.

                                      1 Reply Last reply
                                      0
                                      • M Marc Clifton

                                        From the cybersecurity training: > Nonpublic information should only be saved to your network drive Why do we even have hard drives then on our computers? IMO, non-public information includes source code, proprietary in-house and third party documentation, and so forth. WTF? But this one: > The information on your computer is only fully protected by encryption when it is powered off or in hibernate mode. Simply locking your computer is not sufficient for encryption. :laugh: Yeah, information is definitely "protected" when the computer is off. But how encryption protects your data when the computer is off is beyond me. Maybe I'm not as smart as I thought. And unrelated, when I browsed over to norsecorp.com (live feed of cyberattacks, yeah, right) I got this (my bold): > This page is currently offline. However, because the site uses Cloudflare's Always Online™ technology you can continue to surf a snapshot of the site. We will keep checking in the background and, as soon as the site comes back, you will automatically be served the live version. Dude. You really don't want to use "currently offline" and "Always Online" in the same sentence. :laugh:

                                        Latest Article - Building a Prototype Web-Based Diagramming Tool with SVG and Javascript Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny Artificial intelligence is the only remedy for natural stupidity. - CDP1802

                                        W Offline
                                        W Offline
                                        Wolfgang Schober
                                        wrote on last edited by
                                        #33

                                        Quote:

                                        Nonpublic information should only be saved to your network drive

                                        This means that only public (insensitive) data should be on your computer in case it is lost or stolen?

                                        Quote:

                                        The information on your computer is only fully protected by encryption when it is powered off or in hibernate mode. Simply locking your computer is not sufficient for encryption.

                                        As mentioned before, encryption keys are deleted from memory cache when computer is powered off. I gues that's how BitLocker works, this is talking about disk encryption!

                                        1 Reply Last reply
                                        0
                                        • F F ES Sitecore

                                          No, they thought the desktop was some kind of special entity of the operating system that only the person currently logged on could access. They had no idea it was just a folder on the drive and the desktop an application that renders those files as icons.

                                          K Offline
                                          K Offline
                                          kalberts
                                          wrote on last edited by
                                          #34

                                          Lots of people refuse to believe me when I tell them that super-cryptic login password on your home PC is a poor joke if your computer is stolen (or seized by some authorities, if that is what you fear). I have had to open their PC and pick out the disk, then install it as the D: drive on my own PC (with my own login), and show them: Look here, I can read your files that you thought were secret because I couldn't log in with your password! I see their open mouths and the horror in their faces... You can take some measures, such as using Windows' built in encryption of your private files. Once you log in, giving your password, Windows inspects it: Yes, that's what I expected, then I will decrypt your files for you. ... But Windows knew in advance all it needs to decrypt the files. If some FBI agent puts the disk with the encrypted files into his special-edition Windows, telling it: Now pretend that Joe Smuggler just has specified his login password, and go ahead: Decrypt his files for me, as you would for him! - then Windows has all the info it needs to do the job. My version of Windows won't accept an order to simulate a Joe Smuggler login, but I am sure that such versions exist. In the IDE days, I had a hardware encryption device on the IDE cable, with a physical key (looking like a USB stick) that had to be plugged in when the machine was rebooted, then it could be unplugged and hidden away. In those days, the electronics were not fast enough to handle more than a 40 bit key, yet I consider that far more safe than today's BitLocker where Windows doesn't need you to supply a single bit of secret key: It will decrypt without that. It has all the information it needs to open up the disk. I never saw such encryption devices for SATA; maybe the FBI has made them illegal in the USA. They could be marketed in other countries, though! Unless I have to supply a key that Windows doesn't know, doesn't save, the files are not protected against eavesdropping, period. In theory, Windows could have a keylogger and an analysis program that knows which applications are encryption programs, and save the password typed along with the file name in a secret database, but I am not that paranoid; I don't think Windows does.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups