Is Replay going under or just cancelling new units ?

Page 2 - Seeking answers? Join the Tom's Guide community: where nearly two million members share solutions and discuss the latest tech.
G

Guest

Guest
Archived from groups: alt.video.ptv.replaytv (More info?)

On Mon, 06 Sep 2004 10:55:24 GMT, John in Detroit
<Blanked@sbcglobal.net> wrote:

>Doing some major quote back snipping here
>
>
>
>Mark Lloyd wrote:
>
>(referring to doing a 2 step download (RTV->Mini Tower -> Laptop)
>
>>
>>
>> The entire operation (from The time the recorded show comes on TV to
>> when it's all available on your computer) should be a little slower.
>> The second transfer (from DVA server to computer) will be much faster
>> than the first transfer (Replay to DVA server), but you have to wait
>> for BOTH to have the file available.
>
>Yes, but since the Mini-Tower can download when the laptop is "off site"
>being a laptop and then the laptop can d/l when I'm sleeping, I really
>do not notice the additional time that much
>

OK. I get that benefit with my system. It's set up to transfer show
shows Automatically, and I just find them on the computer.

>
>(Discussing future plans for a seriously password protected FTP server)
>
>
>> That's good, since a password like that would be hard to remember and
>> type. Are you really THAT worried about someone else getting your
>> shows, are is there going to be some other valuable data on that
>> server?
>
>I was a paid professional paranoid for 25 years (I'm not kidding, I
>really was paid, in part, to be paranoid about folks trying to get data
>that they were not entitled to) and it's hard to get over that
>
>Don't know yet what will go on that server, But use of serious passwords
>is kind of in-built into my operating system
>

OK

>I'm also thinking about making it open to the Rtv show share site
>

What? P2p?

>But the idea of leaving a server, which may well be a thousand miles
>from where I'm sitting, on the net "open" ..... Well, there used to be a
>bunch of 14 year old hackers who I"d ticked off big time. They should
>be adults now... But once attacked one tends to remember
>
>(What really ticked them off was try as they might, they could not
>succeed in gaining access to my computer It really bothered them and
>they wound up committing ssome serious crime trying... But they never
>got into my computer. Mostly because I was remoting operating a Linux
>system most of the time, with ... Well, let me put it this way.. If you
>compare a 56K modem to a 1/2 inch water hose.... The Linux box (My
>ISP's) was plugged into about a 12 foot diameter water main. So DNS
>attacks were a joke, plus I had fast acting macros to do them in. and
>my personal computer was Windows 3.1 and actually running 16 bit DOS so
>their 32 bit windows hacks ..... Did not do well at all. All the wrong
>protocols. Oh well... I was protected then, and am still believe in
>strong and NESTED firewalls. My main computer is behind 3 firewalls and
>that is just one of the protections on it since it's hooked up
>broadband, This box has multiple layers as well. I keep cleaning up
>other people's computers... Haven't had to clean mine in a long long
>long time (and back then I was still running 3.1)

One thing I remember, once I was running a web server from home. That
was during the time people were having trouble with the "code red"
worm. I could see the numerous attempts to infect my server. All
failed, since I was not using MS software.

Also, I get very few spyware infections. That's mainly befause of not
opening suspicious attachments (commonly .SCR). For doing that, it
helps to disable the "hide file extensions" thing. That's one of the
first things I do when installing Windows (stupid default in every
version). The firewall (software firewall) is important. Too many
people thing they don't need a firewall (of that a router firewall is
enough).

I have cable internet now, and it looks like somebody tries to connect
at least every 500mS (more often some times, that just seems to be the
limit of the connection LED). The router log shows a lot.

--
110 days until the winter solstice celebration

Mark Lloyd
http://notstupid.laughingsquid.com
 
G

Guest

Guest
Archived from groups: alt.video.ptv.replaytv (More info?)

Mark Lloyd wrote:

> One thing I remember, once I was running a web server from home. That
> was during the time people were having trouble with the "code red"
> worm. I could see the numerous attempts to infect my server. All
> failed, since I was not using MS software.
>
> Also, I get very few spyware infections. That's mainly befause of not
> opening suspicious attachments (commonly .SCR). For doing that, it
> helps to disable the "hide file extensions" thing. That's one of the
> first things I do when installing Windows (stupid default in every
> version). The firewall (software firewall) is important. Too many
> people thing they don't need a firewall (of that a router firewall is
> enough).
>
> I have cable internet now, and it looks like somebody tries to connect
> at least every 500mS (more often some times, that just seems to be the
> limit of the connection LED). The router log shows a lot.


Steve Gibson (www.grc.com) has some interesting stories about hackers
attacking him.

I can't say how many E_mail viruses were delivered to me, and tossed in
the bit bucket direct without ever de-coding from their encoded for
transmission (MIME) form. Today I use web mail, they don't even get
delivered, back then I was using a DOS client, it was virus proof

But no matter how you cut it..... They are out there and they are out to
get us. That is not paranoia. Just reality. I've cleaned up far too
many unprotected computers
 
G

Guest

Guest
Archived from groups: alt.video.ptv.replaytv (More info?)

On Mon, 06 Sep 2004 22:04:49 GMT, John in Detroit
<Blanked@sbcglobal.net> wrote:

>Mark Lloyd wrote:
>
>> One thing I remember, once I was running a web server from home. That
>> was during the time people were having trouble with the "code red"
>> worm. I could see the numerous attempts to infect my server. All
>> failed, since I was not using MS software.
>>
>> Also, I get very few spyware infections. That's mainly befause of not
>> opening suspicious attachments (commonly .SCR). For doing that, it
>> helps to disable the "hide file extensions" thing. That's one of the
>> first things I do when installing Windows (stupid default in every
>> version). The firewall (software firewall) is important. Too many
>> people thing they don't need a firewall (of that a router firewall is
>> enough).
>>
>> I have cable internet now, and it looks like somebody tries to connect
>> at least every 500mS (more often some times, that just seems to be the
>> limit of the connection LED). The router log shows a lot.
>
>
>Steve Gibson (www.grc.com) has some interesting stories about hackers
>attacking him.
>

I read that site a lot. The port security analysis is boring since I
have a router and everything is "stealth" except for the ports used
for my Replays, but there's interesting things there to read. That
site is where I got the recommendation for the Linksys router.

>I can't say how many E_mail viruses were delivered to me, and tossed in
>the bit bucket direct without ever de-coding from their encoded for
>transmission (MIME) form. Today I use web mail, they don't even get
>delivered, back then I was using a DOS client, it was virus proof
>

Yes, web mail is one way to protect yourself from viruses and other
nasty stuff in email. I use another way, that is don't use a
HTML-capable mail/news program. A good firewall helps too, if
something manages to get by you. Don't let strange programs use port
25 (SMTP).

>But no matter how you cut it..... They are out there and they are out to
>get us. That is not paranoia. Just reality. I've cleaned up far too
>many unprotected computers

I never understood whe way those people think, wanting to hurt
someone. Of course, there's still a lot of that going on.

--
110 days until the winter solstice celebration

Mark Lloyd
http://notstupid.laughingsquid.com
 
G

Guest

Guest
Archived from groups: alt.video.ptv.replaytv (More info?)

Mark Lloyd wrote:

> On Mon, 06 Sep 2004 22:04:49 GMT, John in Detroit

>>But no matter how you cut it..... They are out there and they are out to
>>get us. That is not paranoia. Just reality. I've cleaned up far too
>>many unprotected computers
>
>
> I never understood whe way those people think, wanting to hurt
> someone. Of course, there's still a lot of that going on.

Well... There are two main problems with hackers

1: They tend to be teens, and they tend to think they can get away with
anything due to laws that generally wipe their records clean when they
turn 18 or 21, so they do

2: In the early days if you wanted a job as a computer security expert
you started by hacking. Since the computer companies did not wish to
admit that could be done they hired you instead of jailing you.


The solution is simple. Use every available resource to track the
hackers and once you find them hang them (in a manner of speaking) Put
them in a nice facility without computer access of any kind. And once
they turn 21 enjoin them from ever touching a computer of any kind
(note, this precludes them driving, since cars today are also computers)
and if they violate the injunction... Back to the hole w/o access.

You got to get serious. You have to treat hacking as though it were
mass murder, Mostly because it might be. Many hospitals use computers
after all and hackers have already caused medical problems on occasion.
 
G

Guest

Guest
Archived from groups: alt.video.ptv.replaytv (More info?)

On Tue, 07 Sep 2004 21:46:58 GMT, John in Detroit
<Blanked@sbcglobal.net> wrote:

>Mark Lloyd wrote:
>
>> On Mon, 06 Sep 2004 22:04:49 GMT, John in Detroit
>
>>>But no matter how you cut it..... They are out there and they are out to
>>>get us. That is not paranoia. Just reality. I've cleaned up far too
>>>many unprotected computers
>>
>>
>> I never understood whe way those people think, wanting to hurt
>> someone. Of course, there's still a lot of that going on.
>
>Well... There are two main problems with hackers
>
>1: They tend to be teens, and they tend to think they can get away with
>anything due to laws that generally wipe their records clean when they
>turn 18 or 21, so they do
>

Maybe so, but it still takes a bad attitute to do the kind of things
they do.

>2: In the early days if you wanted a job as a computer security expert
>you started by hacking. Since the computer companies did not wish to
>admit that could be done they hired you instead of jailing you.
>
>
>The solution is simple. Use every available resource to track the
>hackers and once you find them hang them (in a manner of speaking) Put
>them in a nice facility without computer access of any kind. And once
>they turn 21 enjoin them from ever touching a computer of any kind
>(note, this precludes them driving, since cars today are also computers)
>and if they violate the injunction... Back to the hole w/o access.
>
>You got to get serious. You have to treat hacking as though it were
>mass murder, Mostly because it might be. Many hospitals use computers
>after all and hackers have already caused medical problems on occasion.

You should know that "hacker" is not the proper word for this.

--
109 days until the winter solstice celebration

Mark Lloyd
http://notstupid.laughingsquid.com
 
G

Guest

Guest
Archived from groups: alt.video.ptv.replaytv (More info?)

Mark Lloyd wrote:

> You should know that "hacker" is not the proper word for this.
>
Yes, Cracker is a better word (Hacker comes from folks who hacked into
their OWN computers, physically that is, in order to figure out how it
worked... I've done some of that myself, It is an honorable title, or
was till it got hijacked by criminal crackers.

The proper words are criminal, thief, and in some cases murder