[05:49] <brobostigon> morning boys and girls.
[06:38] <SuperMatt> morning
[06:39] <brobostigon> morning
[07:23] <MooDoo> howdy all
[07:24] <SuperMatt> G'ning
[07:49] <foobarry> http://imgur.com/a/SYs5z what just happened?
[07:49] <foobarry> my email on a spam list overnight?
[07:55] <popey> foobarry: there's a setting in hangouts which disables unsolicited chat
[07:56] <popey> also, I have noticed a large uptick in comment spam on G+ this week, maybe related
[07:57] <foobarry> strange that i never needed it before
[07:58] <foobarry> but i got a mail from haveibeenpwned this week
[07:58] <foobarry> In late 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Exploit.In". The list contained 593 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the acco
[07:58] <foobarry> unt owner had reused their password
[11:03] <czajkowski> Aloha
[11:12] <BigRedS> Ah, goood morning!
[13:15] <diplo> corebird 1.4.2 from 'diddledan' installed
[13:15] <diplo> Is that this diddledan ?
[13:15]  * diddledan scurries for cover
[13:16] <diplo> hah
[13:20] <diplo> Doesn't work for me, loads if I run from terminal, no desktop icon ( tried logging on and off ) but Request ping/create account doesn't do anything currently. Do I need to reboot for this sort of thing ?
[13:21] <diplo> The name com.canonical.SafeLauncher was not provided by any .service files
[13:21] <diddledan> the request pin button won't work unless you have snapd-xdg-open installed on your host system
[13:22] <diddledan> this is a known issue that the snappy devs STILL haven't fixed months after it was reported
[13:22] <diplo> ta fanx, installing now
[13:22] <diddledan> it seems the plan is to move the functionality of that apt package into snapd itself
[13:23] <diplo> Just went on snapcraft but thought I'd prod you too
[13:23] <diplo> Works better now
[13:24] <diddledan> as to the desktop icon, it seems somewhat flaky - sometimes I get it to install the icon other times I don't
[13:24] <diplo> Works ta, will write my own I guess..
[13:24] <diddledan> I don't know if I'm packaging the snap wrong, or if it's a snapd issue
[13:24]  * diplo will try and remember where .desktop files go
[13:25] <diddledan> for your own sessions only, not system wide, .desktop files can go in ~/.local/share/applications/
[13:26] <diplo> ta
[13:27] <diddledan> the systemwide path is /usr/share/applications
[13:27] <diddledan> or at a pinch I think /usr/local/share/applications will work, too
[13:35] <diddledan> my Winsider is busted
[13:35] <diplo> Cheers, guessing I'll need to logout for it to be available
[13:36] <diddledan> somehow Windows' drivers for NVidia believe my discrete GTX960 card is actually in a laptop (it's in a desktop) running in Optimus mode
[13:45] <diddledan> wait, is Trumpet saying he's copying Nixon's usage of recording devices? https://twitter.com/sarahjeong/status/863027192371961856
[14:14] <diplo> I've set /ignore to most things trump
[14:14] <diplo> But I do follow sarah
[14:37] <diddledan> http://www.bbc.co.uk/news/health-39899646
[14:46] <diplo> Been following that on twitter, knew it wouldn't be long
[14:46] <diplo> Always wondered why they had external access on the machines they keep our records on
[14:47] <diddledan> "Trusts and hospitals in London, Blackburn, Nottingham, Cumbria and Hertfordshire have been affected."
[14:47] <diddledan> yeah, seems a bit wonky to allow remote access to their systems
[14:47] <diddledan> to/from
[14:47] <diddledan> if they need the internet then they should use a different PC
[14:49] <diplo> Yup or a tablet or something, whilst I've been at the docs they've googled before :P
[14:49] <diddledan> when someone says "80% chance of <x> happening" do they mean that in terms of 50% means equal chance of happening as that of not happening, and 0% chance meaning definitely won't happen?
[14:50] <diddledan> diplo: I hope they weren't googling your symptoms :-p
[14:50] <diplo> Well drugs for my symptoms
[15:39] <Laney> oh goddddddddd it's finally raininggggggggggggg
[15:40] <Laney> the allotment is like ":)))))))))))))))))))))))))))))))"
[16:05] <diddledan> blind man coding is epic: https://channel9.msdn.com/
[16:50] <m0nkey_> You can have our rain.
[16:50] <m0nkey_> We've even had a bit of a flood.
[16:50] <zmoylan-pi> but we'll never take your jaffa cakes? :-P
[16:50] <m0nkey_> No Jaffa cakes :-(
[16:51] <diddledan> said by an australian in an american film about scotland made in canada
[16:51] <zmoylan-pi> ... no jaffa cakes... what hell have we sunk too...
[16:51] <diddledan> ok, maybe not made in canada. I donno about that bit
[16:51] <zmoylan-pi> also made in ireland
[16:52] <diddledan> ok, so lets celebrate scotland, by making a film in ireland for an american audience with an australian actor
[16:53] <diddledan> totally makes sense
[16:53] <zmoylan-pi> the irish army supplied the extras iirc
[16:54] <diddledan> well them lot would probably like to give the scots a good hiding
[16:54] <diddledan> ever since the giants' causeway incident
[16:54] <diddledan> that scottish giant was a big meanie!
[16:55] <zmoylan-pi> well the battle went well and created the isle of man...
[16:56] <diddledan> the land of the three legged folk
[16:58] <zmoylan-pi> and tailess cats
[17:30] <ali1234> does anyone else think this nhs cyber attack is really fishy?
[17:31] <popey> triggered by someone who wants to show the NHS are failing, rather than some random russian dude?
[17:32] <ali1234> i'm not going to speculate about motive
[17:32] <ali1234> but it seems odd that all the computers in a national organization would get infected at exactly the same time
[17:33] <ali1234> i mean do they have a shared network drive accessible by all the millions of computers in the country?
[17:38] <ali1234> okay not millions, more like 50,000 probably
[17:40] <MartijnVdS> ali1234: Telefonica is also hit -- there are rumours there's some kind of "port 445" based worm going around
[17:40] <MartijnVdS> quoting my ISP friends/ex-coworkers here
[17:40] <popey> i dont think they all are infected
[17:40] <ali1234> port 445 as in samba?
[17:40] <popey> quite a lot I imagine
[17:40] <popey> and precautionary take them all offline
[17:40] <popey> so no more get infected
[17:40] <MartijnVdS> ali1234: port 445 as in SMB over IP
[17:41] <ali1234> i doubt they have the ability to take all systems offline remotely
[17:42] <ali1234> given the way the NHS is structured, and the fact they only centralized the records what, 4 years ago?
[17:43] <ali1234> oh, apparently they scrapped it anyway
[17:43] <ali1234> so are these systems even connected together at all?
[17:45] <MartijnVdS> ali1234: check out this: https://twitter.com/search?q=445&src=typd
[17:45] <MartijnVdS> people are claiming it's a MS17-010 based thing
[17:45] <ali1234> is that the thing that was in the news yesterday/this morning?
[17:46] <MartijnVdS> well it's from march, but it's a RCE (system privs, basically "root") in the service that handles port 445
[17:49] <diddledan> there is also the bug that MS patched on Tuesday in Windows Defender
[17:49] <ali1234> ah yes thats the one i was thinking about
[17:50] <ali1234> isn't that email related?
[17:50] <ali1234> and you know how bigs orgs like to CC all...
[17:51] <diddledan> the one that Tavis Ormandy alerted them to - basically anything that can get a file into the realtime scanner (so an email arriving in your mail client counts, even if you don't read it) can exploit it
[17:51] <diddledan> you may find even email that gets into your spam box will get scanned
[17:52] <diddledan> just downloading a file in your browser will probably be a vector, again even if you never open it
[17:52] <ali1234> people downloading wouldn't hit a nationwide org in a matter of hours though
[17:53] <diddledan> true
[17:53] <ali1234> an email sent to everyone could though
[17:53] <MartijnVdS> ali1234: it would if it was an image embedded on some website they all use
[17:53] <diddledan> it does seem somewhat fishy that so many systems went down together
[17:53] <diddledan> point, MartijnVdS !
[17:54] <MartijnVdS> (some ad even maybe)
[17:54] <diddledan> iiiiiits FRIDAY PIZZA time
[18:06] <popey> I've worked at placed where pretty much the entire company was nuked in one day
[18:06] <diddledan> popey: you did a good hack there
[18:06] <popey> i was the only one who could carry on working because i had a debian laptop
[18:07] <popey> everyone else was on windows
[18:07] <popey> they went and played golf, i was sat there still working :S
[18:07] <popey> not sure who won there :)
[18:07] <diddledan> was it your responsibility to clean up the mess?
[18:08] <popey> no
[18:08] <diddledan> phew
[18:08] <popey> i think it was sasser or blaster or something
[18:08] <diddledan> aah yeah they were nasty beasts
[18:09] <diddledan> I tried reading the code of melissa way back in time
[18:57] <foobarry> i'm betting its not a zero day and failure to patch systems effectively
[18:58] <foobarry> i recently watched a programme about stuxnet that was amazing
[18:58] <foobarry> did anyone see it?
[20:05] <diddledan> apparently the hospital ransomware attack used a CIA tool (released under the vault7 dump)
[20:05] <diddledan> https://twitter.com/wikileaks/status/863122677820731393
[20:05] <diddledan> oh I misread
[20:05] <diddledan> NSA tools, not the Vault7 tools
[20:05] <diddledan> https://arstechnica.com/security/2017/05/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide/
[20:06] <diddledan> also on the intercept: https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/
[20:24] <ali1234> any reliable evidence of that?
[20:26] <ali1234> this sure is a huge mess
[20:27] <foobarry> http://www.cnbc.com/2017/05/12/samsung-galaxy-s8-dex-station-review.html
[20:27] <foobarry> "I tried using the latest Samsung smartphone to replace my work computer — now I'm convinced it's the future"
[20:28] <foobarry> some sites are saying its eternalblue.
[20:29] <ali1234> yeah but are they basing it on anything more than "because wikileaks said so"
[20:30] <foobarry> https://www.theregister.co.uk/2017/05/12/spain_ransomware_outbreak/
[20:30] <ali1234> "It's understood"
[20:30] <ali1234> fake news heh
[20:31] <foobarry> doesn't all quite add up yet
[20:31] <foobarry> variant not detected by antimalware tools?
[20:32] <foobarry> patched or unpatched systems? in NHS maybe unpatchable
[20:32] <ali1234> just as likely the attackers made their own exploit for a know bug
[21:49] <Bassetts> Can someone tell me if I am being dumb here. I have rsnapshot backing up my laptop to my media server. df -h --total reports 6.3G used on the laptop and 230G free. du -h -d 1 tells me the backup folder is at 24G and the backup is still running?!
[21:56] <zmoylan-pi> i thought the nhs has speant a large sum of money to keep getting patches for the winxp systems?
[22:03] <diddledan> they did
[22:04] <diddledan> doesn't mean they're doing anything with them though
[22:04] <zmoylan-pi> well that's money well spent then...
[22:04] <diddledan> like installing them or something
[22:08] <zmoylan-pi> at least we'll see how bad their backup system is out of this...
[22:14] <diddledan> aye
[22:23] <daftykins> :D
[22:23] <daftykins> good to know