Jump to content

lewmur

Members
  • Content Count

    3,600
  • Joined

  • Last visited

Community Reputation

355 Excellent

About lewmur

  • Rank
    Discussion Deity
  1. This "nobody should be offended" BS has been taken to the point that one of the greatest women this country has ever seen, Sect Condalisa Rice was barred from speaking at an Ivy League University graduation because some students would find her views "offensive". I FIND THAT OFFENSEIVE!!!!!!!! edit; How much do you want to bet the mod will delete this post????
  2. So long folks. Its been good to know you but I'm out of here. I appreciate the fact that people in this forum are supposed to treat each other with courtesy but when it gets to the point where you can't chastise someone for totally misrepresenting what you say, then "being nice" smells too much like PC BS. And this crusty old codger isn't up to putting up with PC BS. Bye Bye.
  3. Think of it this way. The accepted method of sending data is that you send eight bit bytes of data in a packet. Each byte contains all the bits of an ascii character or maybe a pixel data for an image. Instead, a packet could contain only the first bits of the byte, the second bits etc. Then the receiver would only need to know what eight packets to assemble to restore the data. But no one intercepting individual packets would have any way of deciphering them.
  4. I'm an NOT talking about "parallel computing". I merely used the old printers as an example of all of the bits not needing to be in the same stream. And as to your "giant documents", you might want to go back and read the OP in the thread. I made it very clear that not all computing need be done on the same OS and that my suggestions applied ONLY to text and numeric data. ALL "bookeeping" falls into that category. Yes, medical people need instant access to high res images to diagnose illnesses. But that does NOT mean that the "patient's info" needs to be included with the images. That can be sent over a more secure LOW BANDWIDTH system. I really wish that people would carefully read what I actually say and NOT try to put their own interpretation on it.
  5. And totally irrelevant to what I'm proposing.
  6. Let me make sure everyone is understanding what I'm talking about. Every text char or numeral is made of an eight bit byte. When you encrypt, you scramble those bits. What I'm talking about is NOT sending the bits together. Every bit could be sent in a different data stream. Much like the old printers where each bit was sent on a separate wire. Btw, almost all encryption to today is based on algorithms and depend on a single key. A "book" code is based on both ends using the same "book" in the same manor and therefore never repeats. It is repetition that makes codes "breakable". At one time, book codes were fairly limited in that a spy could only carry around so many books. Today, a spy can carry around the entire Library of Congress, and more, on a tablet. And one isn't limited to using only books. Any "digital media", such as video or music CDs, could be used.
  7. Yes, please do think about it. Opensource has hackers all over the world looking at ways to invade your system. Remember, I'm not talking about replacing all of a companies computers with the private system but rather ONLY the ones handling and transmitting sensitive DATA. Linus Torvald's original Linux OS, which he wrote BY HIMSELF, could handle that task.
  8. I disagree entirely. Why would a bug in a simpler system be harder to fix? As Spock would say, that is illogical. BTW, the Western Union system was the ONLY system allowed, for a very long time, for sending International Letters of Credit because it didn't HAVE any vulnerabilities. Primarily because it WAS a "closed system". Even their transoceanic cables were private.
  9. There seems to be a tendency to feel technology has put us in an insecure environment where we sacrifice security for convenience. I think this is selling tech short. To me the real problem is we depended on way too few companies in the development of computers and now we have billions of systems all using the same systems. Learn to hack one and you can hack billions. We depend on ONE SINGLE protocol for networking ALL computers. The WEB!!! I believe that it is not only possible but necessary that companies develop their own data storage and transmission protocols. ASCII, afterall, isn't the only method for streaming data. IBM had their own for decades and Western Union did also. But I believe one of the easiest methods for securing data transmissions would be to break up the data into multiple streams and using different routing for each stream. That way, only the sending and receiving portal would ever see the entire stream. And by streams, I don't mean "packets". I mean data bit one in one packet and data bit 5 in another. For decades the MS crowd has been claiming for decades, that the reason Linux didn't get hacked as much was simply because not as many systems used it. What does that say about a company that has is own, private, copyrighted OS?
  10. Communication is necessary in today's international marketplace. Any large business that tried to avoid all interconnection would soon be out of business. Do you really think all banking transactions could be handled via paper?
  11. In my not so humble opinion, 99% of corporate security problems arise from one misguided principle. "All software applications have an underlying general use OS." IOW, they need Windows, Linux, Unix, iOS or the like to build upon. Afterall, you can't write your own OS and networking protocols. Or can you? If you are willing to abandon high res "graphics" to separate systems, yes you can. Why should your company record keeping not be done with "text" documents? Again, most corporate computer hacks are to steal "data". Not pretty pictures. Writing a BIOS, which is all it would take, to handle only "data", and, BTW, encrypt the data with an unbreakable "book code", would be an easy task. Note, I'm not saying that companies should abandon their MS, Linux or iOS computers but that they remove their "bookeeping" from them. Instead, have someone write your very own, very private, BIOS to run on something like a Raspberry Pi, to handle sensitive DATA. And if you were sending only data from point to point, you could even use secured phonelines with 56k modems, instead of the NET. Think outside the "box".
  12. So, does this mean that if you get an update that breaks your system, and you have to revert to a restore point, that you'll never be able to get another update? I guess if it breaks enough systems, they'll fix the update. But if the issue is one like I had with the Dell Touchpad re-installing itself, you're just out of luck.
  13. When Windows 7 Update listed "Dell Touchpad" in the updates, I was able to hide it. But Windows 10 makes it almost impossible to hide individual updates. Apparently, there is a "module" for the "Windows PowerShell" app that allows you to find and hide individual updates and I was able to find the "module". But after hours of "hair pulling", and still can't figure out how to get PowerShell to install the "module". I may have found a solution. From the Control Panel clicked /System/Advanced System Setting/Hardware/Device installation settings and chose "No". This should prevent Win Update from install device drivers and apps from the manufacturer. But I'm not going to claim victory this time until Win Update has gone at least a few days without reinstalling Dell Touchpad. Good thing I didn't claim victory. That didn't work either. Apparently the update isn't considered a driver. But I finally found the way to block individual updates. MS has an "addon" that does the trick. It is "wushowhide.diagcab". I uninstall the Dell Touchpad from Programs and Features and reboot and immediately run the diagcab and then click "Hide". The app then shows the available updates with a checkbox to block the update.
  14. When Windows 7 Update listed "Dell Touchpad" in the updates, I was able to hide it. But Windows 10 makes it almost impossible to hide individual updates. Apparently, there is a "module" for the "Windows PowerShell" app that allows you to find and hide individual updates and I was able to find the "module". But after hours of "hair pulling", and still can't figure out how to get PowerShell to install the "module". I may have found a solution. From the Control Panel clicked /System/Advanced System Setting/Hardware/Device installation settings and chose "No". This should prevent Win Update from install device drivers and apps from the manufacturer. But I'm not going to claim victory this time until Win Update has gone at least a few days without reinstalling Dell Touchpad.
  15. There are several free web hosting sites and free email accounts are always included. Or you could even buy a domain for the amount you say inbox.com is asking and that would also give you email accounts. I pay $14/yr for my .com domain but there are much cheaper ones. Just be careful because many providers sucker you with cheap first year rates but hide the fact that the second year price skyrockets.
×
×
  • Create New...