That non-sense?
If any bad guys compromised any of the proxies, he/she would have unlimited access to credit card numbers and passwords, and that's just direct money, let's forget the indirect ones.
That non-sense?
If any bad guys compromised any of the proxies, he/she would have unlimited access to credit card numbers and passwords, and that's just direct money, let's forget the indirect ones.
I believe the primary reason that Google mandated HTTPS for search result is for evading the censorship by certain government. The primary reason is not related to session cookies.
Come to think of it, I don't know of any sites that are over HTTPS and don't have user logins. At least none that I use.
Well... I don't use Google account, but Google use it for it's common search page and results.
Humm... Switch to MUMPS would have been easier.
And that should be able to scare whoever wants to help away.
I thought NuGet (and it's PowerShell based console) has been with us for a long time.
Although it only have plugins, and libraries, and libraries for libraries.
EDIT: Btw, we have Web Platform Installer for other kind of free stuffs too (which also have function to solve dependencies).
Plus the "Disaster Recovery" system decides to...lose all active database operations? I thought we had figured out ACID like 40 years ago.
Btw, I think we had systems that support "sudden powerloss tolarating database file" property around Y2K. Given the database size mentioned in the article (The equivalent of 100 DVD's worth of raw data entered the databases each day), do you think that the holidays are long enough for the data-migration part of database upgrade. I suspect it's still using old system with just new UI.
No, I just don't believe that a guy can simply go and make a random hardware change in a computer handling 20% of the world's stock trading.
A colleague of mine one day decided to perform a change during the day without authorisation, which was foolish, but **not uncommon**.This suggest that they've done it before many many times, so don't think there is any problem for the action. Given that there is a script for bring the new disk online on-the-fly, maybe the system is designed to allow extra disk space be added right away on need.
Emmm... strange. It's not shown in the original post even if I clicked "raw source".
Something about different handling of pasted content?
Although people commonly address them as "cow" regardless of gender, I've got impression that when people say "cow" they're referring to the female type. For males they'd call them "ox".
EDIT: I wrote "15" + ".", and got "1" and "." in the end only, where does the other characters go?
Sure.
Just tried and found that "finding images with mouthwater waterfall" is surprisingly difficult.
Btw, I think it's one of the main characters in anime "No Game No Life".
I suppose you have them mixed up.
.getName() is Java and .GetName() is C#.
Actually, I see KLite codec pack come with tool for check whether the video and audio codec is installed for particular media file, so I'll assume at least on Windows, it can somehow be done (because those codecs have to be usable by Windows Media Player, it have to somehow offer standard way to expose it's presence).
Not sure if there's agreed way exist on *nix (Apple and Linux) side.
I think you cited the wrong (or rather, missing) RFC. Take a look on RFC 2361 as that addresses the issue more directly.
I found it because your reply includes video/avi but I know AVI itself does not specify what codec it needs. In this specification, it suggests the correct entry be sent as:
video/vnd.avi; codec=XXX
Although I still think it lacks the specification on the audio codec. There is no good to claim you can play the movie unless you can also play the sound (except when there is no sound, of course).
No. HTTP is for transfer of data so it can be handled that way. To play a media file, like what swayde said you need to ensure the corresponding audio and video codec exist, which cannot be done unless you've opened and read the file header.
So at best the browser can just say "probably", and for "webm" to say "maybe" because there could be future revision of the codec.
Your bet on the old cars get their firmwares updated?
Oh, I understand now. But you're not fully select the quotes either. (Hint' the "user name" and time is in the quote tag too)
Try click "Reply" and select "Quote whole post"if the button is available in the toolbar of reply textbox.
@swayde said:@abarker said:NO_REPROThat quote does not belong to @FrostCat. It was nested below his reply. (Too lazy to fix it by hand on mobile)
Nest.
3-level nested. Still seems okay.
EDIT: Multi-level nested actually. Not noticed the the expand/collapse button in inner level of nested message.
@abarker said:NO_REPROThat quote does not belong to @FrostCat. It was nested below his reply. (Too lazy to fix it by hand on mobile)
Nest.
And "AskFortuneTeller" - you need to ask a fortune teller whether the browser can play your media.
Use this response when the browser decided not to support this query.
It's so bad that won't cut it, you need double faceplam.
I'll add that by sending the C&D request to Techdirt too, they're making sure the news spread as far as it can reach.
Btw, I'm surprised seems noone mentioned the possibility of having locks of internal sealed parts (also controlled by computer system in car so only mechanics working in authorized repair shop can open the cover and replace/repair it) opened. Wouldn't it be dangerous to have these parts opened when the car is on the road, moving?
IMO, having the carbinet doors opened (also controlled by computer system) while the car is running is dangerous enough.
Of course it's always banned in air-coned area, but it used to be allowed to smoke at stairs where everybody usually go with lifts when need to go in/out the buildings.
Not necessarily demoralizing, just that it will affect work performance.
Much like the effect of banning smoking inside buildings for the smokers.
On the other hand, try only have plain water in pantry for a week, and disallow whatever "instant" drinks for reason that "smell generated will distract others from their work",
A note to myself... never use try to help out questions that regarding API which need to bind to an account to use again.
There was question regarding how to use Google Blogger API. I see there is no direct material on how to use it so go and try to create example. Now Google APIs requires you to get secret key binded with your Google account to use, so I think no big deal and go ahead.
Now there is a gitch... my Google account is linked to certain website that uses Google account to access, but is created before no-foreigner policy. When I try to setup my account to use the Google API I have to fill in a lot of fields that I was not needed to fill before (after I created that account, I just use it to login the other websites and not tried to login Google related services like GMail for a long time). Now after I finished the example project and uploaded it, I found I no longer be able to login that website and got redirect to some other website without deposits and other stat. Now I have to figure out a way to let me go back there.
Actually, if they don't clear your session cookies before log-in and don't bother to mark the cookies as Secure, it'll make the website open to certain type of attack.
The policy of Demonestration of Craziness.
No. This morning I read from a Taiwanese forum regarding some chips manufactorer still doing that and there was heated debate on whether the policy still makes sense. The post does provide background that it was this way because some years ago, one of the staffs taken photo of an undisclosed (at that time) prototype of product and product line and put it on web, this gives advantage to the competitors, though.
Man... This is getting old as I've seen similar things 10+ years ago. The list need to be updated.
Say, "Employees are strictly prohibited from bring smartphones into premise. Any smartphone found by securities will be confiscated, and you'll receive written warning for doing so".
Answer, enable virtualized folder (through local policy) and don't let Steam elevate at all. Those files will then be written to somewhere inside user's folder. But now you have another completely different set of problem.
Hint: It used to be default in Vista and Microsoft disabled it by default in Win7, go figure.
I actually think this combination of command has been given so frequently that, if someone really try that, it'd have been better to just let him/her get rid of the system altogether.
The popup which stops you from directly running downloaded files is hint added by internet explorer in the form of Alternative Data Stream. If you download files through other means, you're not protected by this mechanism.
I found creating task with "run at highest priviledge" and create shortcut for "schtask /run /tn <taskname>" a possible workaround for "running admin process with password prompt" and "allow some application to run with admin right without invoking UAC".
Something similar to config for sudoers... even if not a perfect replacement.
You can export the tasks to XML file to deploy to other machines, and copy the shortcuts there as well.
For a start, there are enough badly behaved applications still out there in 2015 that a significant proportion of the Windows user base has been thoroughly trained just to click that OK button whenever the UAC secure desktop prompt pops up, without any understanding of what they're doing. No amount of technical engineering is ever going to fix what's essentially a social engineering issue.
And finally, Windows 8, 8.1 and 10 allow any admin account to run anything at all, fully elevated, without a UAC elevation step: admin accounts no longer need elevation in order to create a scheduled task that does run elevated, perhaps immediately.
It depends. Some servers are located on datacenter and not readily physically accessible.
On the other hand, you can type "selinux=0" though IPKVMs.
Well, I don't know an admin that's lame enough to shoot their feet by not allowing at least disable it on reboot.
Servers are not like this Android toys, if you f**ked up the policy setting, it can take you some time to restore it.
SELinux does not stop a root user from disabling it.
I think on Windows only domain admins can do it by use GPO to instruct storing the encryption key in AD infrastructure. Local admins cannot do it because it also uses the password as encryption key. (If local admin resets password to an account with EFS/BitLocker encrypted folder, unless account recovery disk is previously created or the user switched back to the previously used password, the data in encrypted folder is lost)
It's data entry error that someone mistyped the amount of one parts needed to make one model of goods... in ten folds of the actual needed number.
This somehow had gone unnoticed originally, but when they use past data to check my calculation, the problematic data become quite visible. While this parts was in small quantity for each piece of goods, it is quite expensive, someone have to take the responsibility for this.
I was willing to play low profile for this by plainly say the ordered quantity is made 10 folds too, the number for this field will be okay, and hope to let it sneak past without raising management's attention (it sounds as if that's one of the many "data entry" problem previously pointed out). But one other merchandiser, don't know whether she had bad relationship with the original one or not, or maybe just try to point to every possible bug to resist using the new form, jumped in and said it's not acceptable, and make me have to explain the actualy nature of "the bug", and in the end the management choose to fire the original merchandiser because of this.
That's the end of story.
It is understandable.
In this way, no matter how many "last minute changes" are given, the poor soul who have to do it manually would do it in roughly the same time, so no increase in the cheque to pay.
You know, ask for new budget is difficult, while people seldom question on-going fixed costs.
While the money may look the same to you, the effort to transverse bureaucracy is quite different.
Once upon a time, I was making VBA macro that helps the merchandisers calculate the material they'll need to produce some goods.
Before the macro goes live to everyone inside the company, some of the merchandisers are appointed to help checking the formulas with past data to ensure it get right.
After a few iterations on cases that my code don't handle, one of the merchandisers send in data related to a past order can circled a number that has large discrepancy when compared with my computed result. After drill in the data, I found that one of the "parts" is ten folds larger than the value that should be.
Don't want to get the helpful merchandiser into trouble, my reply is to attempt to downplay the issue by saying if you enter the number of goods required 10 times the original number, the result calculated would have been correct and hoped she get the idea.
Then another merchandiser who this chain is CC-ed to step-in to say that the number of goods to be ordered should not be changed as a fix to the discrepancy. This leaves me no choice but to explain the issue is because the parts required per order for this item is incorrect.
One month later, the first said merchandiser leaves the company and I'm still feeling sorry for her.
I guess since the science is not done (it's still "doing"), the gun is not ready yet.