Sujet : Re: GIMP 3.0.0-RC1
De : WokieSux283 (at) *nospam* ud0s4.net (WokieSux282@ud0s4.net)
Groupes : comp.os.linux.misc comp.os.linux.advocacyDate : 12. Feb 2025, 22:56:06
Autres entêtes
Organisation : WokieSux
Message-ID : <r2ydnQZz4eBqhTD6nZ2dnZfqn_idnZ2d@earthlink.com>
References : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
User-Agent : Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.13.0
On 2/12/25 1:58 PM, rbowman wrote:
On Wed, 12 Feb 2025 09:08:35 -0500, CrudeSausage wrote:
Lisa was a flop because it didn't make any kind of sense to ask people
to spend as much on a computer than they would on a car. It was a very
capable machine, and it was nice to discover that the Lisa went on to be
refurbished as popular Macs in certain areas of the United States, but
you can't ask people to spend as much as they were asking. As for the
Mac 128K, I admit that if I were buying a computer in 1984, I would have
wanted one. Of course, I would probably very quickly buy a hard disk and
a RAM upgrade for it. If I were buying in 1985 though, I'm certain that
I would have opted for either an Atari or an Amiga though... probably
the Amiga if I had witnessed their impressive tech demo. It wouldn't
have mattered to me, as a teacher, if it didn't have a serious
reputation or not.
The original Mac toasters had one unique feature -- they met the TEMPEST
requirements of the day.
https://en.wikipedia.org/wiki/Tempest_(codename)
PCs leaked like a sieve. Most still do. Back in the toaster's day
cybersecurity was worrying about Boris and Natasha squatting out in the
bushes with their radio gear.
Well - they DID sometimes !
Worth looking into, it's amazing how much can be
gleaned from random signals not only from cpus
but from keyboards and mice and printers. Even
delays in hitting keystrokes can be mapped against
the querty layout and, with enough, samples ....
Far more efficient these days to just phish a VP
and they'll send you both passwords AND all the
data files (then blame it on the secretary).
Hmmm ... was reading a security article a few
years ago and the author provided an example
link to one of those companies that monitor
*everything*. It was a LIVE login though, and
backtracking a few steps I could see the latest
stuff - including an HP office printer in
the UK. Was able to access it, see the last
few docs in the reprint buffer and, for fun,
made it print a test page. THAT'S insecurity.