Raspberry brings out 5 dollar computer

On Fri, 27 Nov 2015 12:24:00 -0500, Phil Hobbs Gave us:

Show me where FIPS standard is being hacked successfully. THAT is what the NSA uses.

Reply to
DecadentLinuxUserNumeroUno
Loading thread data ...

You can also use a wifi or Ethernet dongle to do any software installs then remove it when done. It's not like you won't need to hook up stuff on any embedded computer to install or develop software.

--

Rick
Reply to
rickman

On 11/27/2015 4:46 AM, Jeff Liebermann wrote: ...snip...

And like a house door, any crook worth his salt can open a common lock in 30 seconds.

I'm backing up right now!

--

Rick
Reply to
rickman

I gotta run away for a free lunch and a day away from the computah. I'll dredge up some recycled security wisdom, later.

You might find this rant on lousy security interesting or at least entertaining: "Everything Is Broken" by Quinn Norton

--
Jeff Liebermann     jeffl@cruzio.com 
150 Felker St #D    http://www.LearnByDestroying.com 
Santa Cruz CA 95060 http://802.11junk.com 
Skype: JeffLiebermann     AE6KS    831-336-2558
Reply to
Jeff Liebermann

Maybe you read different news sources, but in security publications here the number of Linux servers that have been broken in to is observed with great concern.

Reply to
Rob

Fails, hmm? How about

formatting link

formatting link

formatting link

formatting link

formatting link

formatting link

The OpenSSL folks' vulnerabilities list at

formatting link

lists 11 "high severity" or "moderate severity" vulnerabilities.

OpenSSL is over 500 kloc, which means that it is virtually impossible to fully secure.

Cheers

Phil Hobbs

--
Dr Philip C D Hobbs 
Principal Consultant 
ElectroOptical Innovations LLC 
Optics, Electro-optics, Photonics, Analog Electronics 

160 North State Road #203 
Briarcliff Manor NY 10510 

hobbs at electrooptical dot net 
http://electrooptical.net
Reply to
Phil Hobbs

Some of the clean-slate designed-for-security replacements have already been found to be penetrable and defective. "New one in" just means the hackers have a new set of bugs to find and utilise, as well as the old ones that are still widely deployed.

Reply to
Clifford Heath

I've written enough multi-threaded apps too. That's not the point.

Neither is it the point that 99% of programmers don't think they can write correct multi-threaded apps (they mostly don't need to).

The point is that of the 1% who *think* they can, 99% still can't.

Luckily, we only need a very few multi-threaded apps... most commonly operating system kernels, graphics drivers, and DBMS cores. Everyone else gets the benefit.

Clifford Heath

Reply to
Clifford Heath

The situation isn't anywhere near as dire as that. I've written clusterized code with over 100 threads. Debugging is harder, that's all.

Cheers

Phil Hobbs

Reply to
Phil Hobbs

Rob here was simulating a polyphase switcher in LT Spice. It was running pretty slow on his 8-core Dell, so he signed up to run it on a

32-core Amazon virtual machine, which costs about $1 per hour. It wasn't any faster.
Reply to
John Larkin

Good news--it _won't_ run Windows 10, a security feature! (You need the Pi-2 for that.)

formatting link

"Because it has an ARMv7 processor, it can run the full range of ARM GNU/Linux distributions, including Snappy Ubuntu Core, as well as Microsoft Windows 10."

Cheers, James Arthur

Reply to
dagmargoodboat

On Fri, 27 Nov 2015 13:32:59 -0500, rickman Gave us:

That is why cheap 27 to 150k houses have cheap locks. In a 2 to 3M home, one puts high end locks on and nobody picks them. IF they decide to break in, the word BREAK is their key to gaining entry. They are ALL too stupid to actually pick a well made lock, and some cannot be picked. Just call and ask any locksmith.

formatting link

Reply to
DecadentLinuxUserNumeroUno

My clusterized EM simulator scales very neatly linearly up to at least 28 cores.

Cheers

Phil Hobbs

Reply to
Phil Hobbs

On 27 Nov 2015 19:22:13 GMT, Rob Gave us:

Yes and their administrators are typically fired with great ease.

Show me cloud break ins. Show me ISP break ins. Show me satellite gateway break ins.

Maybe Cisco systems get hacked by disgruntled ex-Cisco employees..

Show me Juniper hacks. Not six year old crap either. Recent.

Reply to
DecadentLinuxUserNumeroUno

On Sat, 28 Nov 2015 08:46:29 +1100, Clifford Heath Gave us:

Not a vulnerability, but an administration failure.

Reply to
DecadentLinuxUserNumeroUno

Why bother dicking around with a lock when there is a window right next to it. Locks only keep out the neighbor kids and make insurance companies happy.

I'm about to do a restore on my laptop :-(

Reply to
krw

On a sunny day (Sat, 28 Nov 2015 08:51:59 +1100) it happened Clifford Heath wrote in :

Na, I disagree, multi threaded is often inescapable. I use threads in many programs, do not know if I do it 'right' but it works. The threads usually do not use a lot of resources, Their main reason is to handle some tasks so then the main program is not time bound and simpler. For that reason running those threads on a different core makes no sense.

In video processing / encoding however there are specific things that can be done on a core, although these days most is done in hardware say for example encoding. This is the point, write some HDL and do it in FPGA. There is nothing special about writing code with threads. Plenty of C code for Linux you can download from my site that work and is used everyday. But I keep it simple. Hey even the PIC asm I write uses interrupts to run different code pieces, what is a 'thread', what is in a name?

Just fighting over words. I do not see any Linux programmers having problems with threads, '99 cannot' WTF are you talking about. Link with -lpthread pthread_create() write a start() and stop() and a function that does something, done. :-)

Reply to
Jan Panteltje

On a sunny day (Fri, 27 Nov 2015 15:03:00 -0800 (PST)) it happened snipped-for-privacy@yahoo.com wrote in :

I have seen cheap little PCs with I think it was win10? (not sure) for as low as 199 $. Either its is a total flop (win10) or they give it for free with that hardware.

With Balmer gone, it (MS) will be eaten by speculators and other financial geniuses. Linux is everywhere, in every embedded piece of equipment, from my cable modem, to my robot vacuum cleaner, to my WiFi modem, to my TV, to my security video recorder, and with the 'internet of things' (tm) coming it probably will appear in your fridge and shaver too:-) Who needs MS?

Reply to
Jan Panteltje

Here's my office front door in 2010: These days, smash and grab is the operant paradigm.

I should take my own advice. Last month, my home XP machine decided to get confused and gobble a few sectors of the hard drive. My last image backup was 8 months old. Oops. It took me a while to put Humpty Dumpty back together again, but I managed. I'm now back to my regular once per month image backup schedule. In celebration, I bought three more 2TB USB drives: That was Apr 2014. Today, I have at least twice as many drives. Drives are cheap. My time is not.

--
Jeff Liebermann     jeffl@cruzio.com 
150 Felker St #D    http://www.LearnByDestroying.com 
Santa Cruz CA 95060 http://802.11junk.com 
Skype: JeffLiebermann     AE6KS    831-336-2558
Reply to
Jeff Liebermann

fully glazed really needs bars or laminated double glazing.

NT

Reply to
tabbypurr

ElectronDepot website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.