Jump to content

sman

Honorary Members
  • Posts

    2,277
  • Joined

  • Last visited

  • Days Won

    5

Everything posted by sman

  1. How end-end encryption has been a farce in Whatsapp etc. with breaches every now & then , Wi-fi security even the latest WPA3 also with issues. so nothing is secure, encryption has to be fool-proof. But can it be?
  2. Absolutely on the mark, when you say something, one shoudld stand with it, not do anything deceptive in the background..
  3. Microsoft's "Love" of Linux "http://pedrocr.pt/text/microsofts-love-of-linux/" Recently Microsoft has been making a lot of announcements and releases of technology that fall under a supposedly “Microsoft Loves Linux” type of strategy. This is particularly noteworthy given the history of Microsoft since the end of the 90s. Their internal policy was a full attack on Linux1. and they were convicted by a US court of anti-trust violations for acting out that strategy2. If they have indeed now fully turned around and now “love” Linux that would indeed be big news. Two particular strategies became famous in how Microsoft treated Linux (and also other technologies and competitors): Fear, Uncertainty, and Doubt (FUD): a marketing strategy designed to discredit the technology and it’s proponents by spreading that open-source software infringes on Microsoft patents and is costlier to operate among other claims3. Embrace, Extend, and Extinguish (EEE): a technical and market strategy of starting by becoming compatible with an upcoming technology only to extend its monopoly by creating incompatible extensions and using them to push out the original competitors4. To finish, this is a theory, and as any good theory needs to be falsifiable. So here are the kinds of news that would require re-evaluating it because they would definitely signal some kind of “love” for Linux: Microsoft launches Office for desktop Linux or otherwise makes the Linux Office experience go from fourth-rate6 to first-rate (e.g., by making Office a web-only product accessible from any standards-compliant browser). DirectX, Win32 and other Windows-only APIs are dropped. New apps opt-in to a brave new world of .NET/Vulkan/etc that can be equally run on Linux and old apps run in backwards compatibility mode like DOS apps. Active Directory and associated technologies are released as 1) a set of closed source containers or VMs to be launched in the Linux cloud of your choice and 2) a fully featured open-source client stack that plugs into standard Linux technologies allowing corporate admins to manage Windows and Linux clients with the same tools I think all of these would be strategic blunders from the point of view of Microsoft shareholders. But they’re the kind of things you do for love.
  4. hmm.. All with one mission, to target user activity with different mktg. strategies..
  5. The Trouble with VPN and Privacy Review Sites "https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/" There's a massive problem in the privacy world. Websites, social media accounts, and other platforms are constantly popping up out of nowhere, telling you to buy The Greatest Service Ever in order to solve all your privacy woes, whatever that may be. These websites often employ marketing teams to make sure their "reviews" are what you see first when you begin your research. Some of them are even operated by VPN providers themselves, operating under anonymous business entities to hide their bias, or doing it right out in the open, hoping you'll mistake their advertising-filled press releases and blogs as insider knowledge of the VPN space. When a seemingly "unbiased review" on a site is merely a paid advertisement in disguise, that website is breaking their reader's trust. From a consumer's point of view, affiliate marketing and other paid promotional techniques like this make it near impossible to know when a review is genuine or not. Furthermore, their list includes NordVPN, a company notable for not disclosing security breaches in a timely fashion, and ExpressVPN, a provider notable for once using weak 1024-bit encryption keys to protect their users. By any objective standard, these providers do not deserve to be included in a top 10 recommendations list for securing anybody's information. This review site in particular claims to have set criteria for their recommendations, but this just demonstrates that any criteria can be adjusted to fit any goal you may have.
  6. So, it's a hopeless situation, with no end. So, no trusting what ever one may say, the techies with 'crocodile tears' may come up with.
  7. Then why not bring in laws / acts to make it reality and adherence by the techies?
  8. A million dollar question.. if such a possibility exists, it would have been in place way back..
  9. Audio Reading Service Podcast A service of the Allen County Public Library specifically designed for and directed to people who have visual, physical, learning or language challenges to reading normal printed materials. Reader’s Digest – November 19, 2019 This week’s Reader’s Digest. Updated every Tuesday. "https://audioreadingservicepodcast.com/2019/11/19/readers-digest-november-19-2019/"
  10. In recent years, the United States has been either the world's largest or second largest exporter of pork and pork products, with exports averaging over 20 percent of commercial pork production in most years. China is the No. 2 buyer of U.S. pork. In 2017, it imported $1.07 billion worth of pork meat, based on U.S. government data compiled by the U.S. Meat Export Federation.
  11. Windows will improve user privacy with DNS over HTTPS "https://techcommunity.microsoft.com/t5/Networking-Blog/Windows-will-improve-user-privacy-with-DNS-over-HTTPS/ba-p/1014229"
  12. Scientists 3-D Print Skin That Develops Working Blood Vessels "https://www.smithsonianmag.com/innovation/scientists-3d-print-skin-develops-working-blood-vessels-180973572/" A promising new technique could lead to lasting skin grafts after burns or other injuries Creating a durable, natural-looking skin substitute to cover burn injuries or other wounds has been a bioengineer’s holy grail for decades. Now, we may be much closer, thanks to a new technique for 3-D printing skin complete with working blood vessels. The research, done at the Rensselaer Polytechnic Institute (RPI) and Yale University, uses living human skin cells turned into a liquid “bio ink.” The bio ink is used to print artificial skin, which then grows its own blood vessel system. “The vasculature is very important because that’s how the host and the graft talk to each other,” says Pankaj Karande, a professor of chemical and biological engineering at RPI, who led the research. "Communication between host and graft is critical if the skin substitute is not to be rejected by the body." Currently, patients in need of skin grafts have two options. First, there are autologous skin grafts, where doctors shave off a piece of healthy skin to cover the damaged area. Second are artificial skin products made from materials ranging from bovine collagen to polymer foam. Both have disadvantages. Autologous skin grafts are painful and create a new wound. Artificial skin products have a range of limitations—they’re often temporary, don’t cover deep wounds or don’t resemble human skin. https://youtu.be/7uM9HDmBeVE
  13. Android bug lets hackers SPY through your camera – and over 100million Samsung and Google owners ‘affected’ "https://www.thesun.co.uk/tech/10378219/google-android-samsung-hacked-spy-camera-update-now/" GOOGLE and Samsung phones could be hijacked by hackers – allowing crooks to take photos and record video from afar. Hundreds of millions of handsets are believed to be affected by the dangerous and widespread flaw. Cyber-experts say the bug let hackers track your phone's location and even record your phone calls automatically. Phone owners are now being urged to update their handsets and apps to the latest versions, to stave off hack attacks. The bug was exposed by cybersecurity firm Checkmarx, who described the hack as "dangerous and malicious". Google has confirmed that the exploit exists, and that users will need to update their phones to stay safe.
  14. "https://www.nature.com/articles/d41586-018-07419-5" "https://www.dicardiology.com/content/transplanting-pig-hearts-humans-one-step-closer" Success for pig-to-baboon heart transplants Of the five baboons, one developed complications and was euthanized after 51 days. Two lived healthily for three months — the original designated endpoint of the experiment. The remaining two were allowed to survive for just over six months, before being euthanized.
  15. Pig to human heart transplants 'possible within three years' "https://www.theguardian.com/science/2019/aug/19/pig-to-human-heart-transplants-possible-within-three-years-terence-english"
  16. Now what do you say of this? Scientists Achieve Breakthrough on Path to Pig-to-Human Heart Transplants "https://www.discovermagazine.com/health/scientists-achieve-breakthrough-on-path-to-pig-to-human-heart-transplants" Although 54 percent of adults in the United States have registered as organ donors, just one in three people die in a way that allows for organ donation. That leaves more than 100,000 people in the United States waiting for a transplant. Many will die waiting. Because demand for organs outpaces supply and probably always will, researchers have looked to xenotransplantation — placing animal organs into human bodies — as an alternative. However, getting to the point where xenotransplantation is safe enough for trials in humans has been a challenge because so many complications can occur. Now, a breakthrough by a group of researchers brings us one step closer to a day when organ shortages are a thing of the past. A research team led by Bruno Reichart at the University of Munich in Germany has developed a technique allowing baboons to survive significantly longer than ever before with transplanted pig hearts. Figuring out how to safely xenotransplant hearts is an important area of study because of skyrocketing rates of heart problems, the researchers said.
  17. even mode of payment, bankers etc. also would have nailed the location..
  18. More than anything, while purchasing, the user info, his contact address etc. would have been provided, which should be the basis for any billing and not IP and if Ip differs from contact location, then it should have been sorted out then 7 there by sales / It team. something which ought to be looked into.
  19. @rsutton7 if you are hesitant to post the info i suggested you may even PM it to forum admin or mail to sales team and take up further.. dont think invoices wil be raised with such glaring errors, so better to give info authenticating location of use and take up further. my view..
  20. @rsutton7 may be you can send screen shots of the system with malwarebytes license page and desktop shot , taskbarshot, what is my IP shot for clarity. this is my view. to help u out..
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.