|
W∴ Balboos, GHB wrote: In fact, the closest thing available is paper that comes in rolls and this is rarely suitable for printing.
Cash register paper rolls?
@code-witch, there's your next project - write a driver to interface your graphics library to a cash register printer.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
With an obscure bug that results in the execution of
while(true) cout << '\f';
|
|
|
|
|
actually... that wouldn't be hard, and I've done something similar before while writing point of sale, to order ticket integration for restaurants.
Real programmers use butterflies
|
|
|
|
|
Looking to sell my Delorean, good shape, low mileage.
Only driven from time to time.
|
|
|
|
|
Time vs. mileage.
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Only driven a few years?
|
|
|
|
|
Was driven by an eccentric scientist who only used it on a special track to drive into the past.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
No drivers license. I was talking about the missus:
Mike Hankey wrote: good shape, low mileage.
Only driven from time to time.
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
in the future or in the past?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Heavy. 
|
|
|
|
|
Systems mostly on CentOS, mostly Java applications, mostly Postgresql databases.
Compliance requires separating infrastructure operations, application operations, computer operations to be separated.
This means that an infrastructure operator is su to be root on a server, an app operator su to be root on a database and have some su rights do keep the apps running, and a computer operator is a lesser mix of the two.
Root password and some high priority passwords managed by Password Manager Pro, released after a four-eye check, and changed by PMP after use.
But this is not enough. Looks like the gold old four eyes rule is required.
Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.
|
|
|
|
|
Peter Adam wrote: Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys. Yes. We call it "common sense", as you would.
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Eddy Vluggen wrote: We call it "common sense", as you would.
Though, of course, "common sense" is an illusion.
EDIT
Came back to say :
The illusion is shattered the instant anything goes wrong and managers become involved.
After that it's all just finger-pointing.
|
|
|
|
|
raddevus wrote: The illusion is shattered the instant anything goes wrong and managers become involved Managers being famous for not having the common sense.
raddevus wrote: After that it's all just finger-pointing If you a manager yes. All others keep records.
raddevus wrote: Though, of course, "common sense" is an illusion. We just call them Americans
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
raddevus wrote: The illusion is shattered the instant anything goes wrong and managers become involved.
After that it's all just finger-pointing. That's after it facked up and becoming a Hollywood movie.
Common sense says not to be an American. Ehr.. I meant, "before you fack up".
Nearly the same.
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
There is no common sense nor trust when the daily amount of just the change money measured in 1E3 €s...
|
|
|
|
|
Only if you trust $.
Those that do, have trouble with intrinsic value. The paper, EU or US, has none. More debt in those currencies being created, to "save the economy".
ha
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Much like "We had to destroy the village to save it."
|
|
|
|
|
|
I have been. Only once ofcourse, one doesn't keep making the same errors.
So. I have to say no to your proposal
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
How many people stood there to watch and testify that you both said "Yes"? Was it about $?
|
|
|
|
|
You pissed me off with your question.
Peter Adam wrote: How many people stood there to watch and testify that you both said "Yes"? Without parents, just two. Of those two, she facked one.
Will not make that mistake again.
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Peter Adam wrote: Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys
This is an interesting idea.
It's almost the idea of two-factor but with an additional check that the person with the 2nd factor is not the same person who attempted the login.
So Op1 attempts to login.
Op2 gets a 2-factor notification on her phone and has to accept.
|
|
|
|
|
We had 2 people with half the password each, then they needed backup for leave/sick events.
This naturally was a complete PITA when SA access was required and that invariably occurred when you could not locate both halves of the password. So it became a team of people for each half password at which point the entire thing became a farce.
Never underestimate the power of human stupidity -
RAH
I'm old. I know stuff - JSOP
|
|
|
|
|
Back in the mid 1980s, very early days of EFT, I was involved in setting up the crypto infrastructure for a major independent player. Before the days of Diffie-Hellman etc, there was a requirement for link master keys (typically 2 x 56bit DES for EDE) to be manually entered in the other party's crypto box.
At least half of the big 4 banks just gave the left and right halves of each key to different people.
... Oh nice. I've got one half. I only need to try about 2^28 possibilities (which was just about feasible in those days) to crack the whole thing.
They got all s*itty when we insisted on three full length components to be entered separately, and XORed inside our secure box to make the actual key.
Reason for 3 not 2? So there is no leakage through the parity bits in the key. Each component can be odd parity, like the final key.
Drove them nuts, but afaik it was never compromised during the 15+ year lifetime of that system.
By the time the successor system was implemented, the whole crypto (and comms) landscape had shifted.
Cheers from an(other) old fart,
Peter
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|