It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
20 Freescale [Semi-conductor] staff on vanished Malaysia Airlines flight MH370
IBM employee also missing after jetliner feared to have crashed into South China Sea
The masses will begin to see what's going on, and anyone defending this behavior can be properly shunned while the rest of us try to solve the problem.
originally posted by: talisman
Everyone, doesn't this mean they have Hillary's Emails? They capture everything sent or recieved? They could easily produce the "missing emails"
So did they not do so, because it "Was In the Interest of National Security"?
Instead, most go "meh, what are you gonna do?" and go on about their lives because, mortgage/rent, groceries, insurance bills, etc.
The fact that our intelligence apparatuses have they own internal power structure and drive that is wholly separate from any sort of authority should be enough to get millions of people in the streets. Instead, most go "meh, what are you gonna do?" and go on about their lives because, mortgage/rent, groceries, insurance bills, etc.
So User #71468 is working on a tool to (among other things) trash somebody's files. Handles are being stolen, files are being corrupted, its all good! It reminded me of another tool written by User #75251 back in the day with a little help from yours truly.
We were trashing data. It was awesome. We were even overwriting files opened for exclusive write by using direct writes to the physical drive (XP only folks, Vista and up broke the ability to do that.) We were targeting multimedia files, and the requirements said "thou shalt interrupt playback".
We figured trashing the files at such a low level would obviously stop the playback, right? No bytes, no playback? Turns out, we were wrong. The system's filesystem read cache was happilly keeping the entire file in memory and the media player was happily playing it from the cache as if nobody had come in and barfed garbage bytes all over the clusters. Frustration ensued. Rage++... but what were we to do?
The answer came from a single StackOverflow post that mentioned a side-effect of opening a volume handle in a peculiar way. Although the author of the post cautioned the technique may not be reliable, we found in our testing that it was 100% effective on our target platform (Windows XP x64).
Here's the code in question:
(omitted for length)
Once we added that function in and called it after trashing a certain number of bytes or files, we suddenly started seeing playback of media files interrupted as requested by the customer. And it was good.
Now, with the way User #71468 is stealing handles, he may not actually need this technique. But if he does, it will be right here waiting for him.
Neither do I. But that doesn't mean they aren't still trying.
Maybe that other user was right then, about you not 'getting it.'
Sure that's probably true, but it still doesn't change the fact that there is an actual reason to be "outraged"
It just seems silly and "scapegoat-ey" that you are just repeating the same rhetoric to everyone when in truth you know the truth
originally posted by: bknapple32
Im pretty sure I once lived ina country wher ethe following would never be tolerated by any of the populace:
The CIA walks into your living room and bedroom and sets up a 24/7 camera feed
The CIA takes your fingerprint to have on record, despite not being guilty of a thing
The CIA essentially will sit in your car and have the ability to turn it on, off, and where your car can go
Im pretty sure if only one of the above happened before the year 2000, we would have a true revolution. All three are happening on a daily basis, and we sit and twiddle our thumbs.