Ah, so it's like ZFS but unfinished.
Let's reinvent the wheel!
317 posts • joined 20 Oct 2007
Let's reinvent the wheel!
No it's not, it's really not. However much you may want it to be, it's a music streaming service that has some social cruft bolted onto it.
Paul Chodas, head honcho at the Near-Earth Object office of the Jet Propulsion Laboratory, said: "There is no scientific basis - not one shred of evidence - that an asteroid or any other celestial object will impact Earth on those dates."
He forgot to mention that the wanton destruction is scheduled to occur sometime in October.
It's a moot point, since you anyway don't have the luxury of deciding whether or not to install a certain update.
It's racism, pure and simple!
Well, after getting scammed by the government, by having their licenses, that they paid for, cancelled, it's no wonder that they are not willing to pay money now.
I'm sure the people employed by the ISRO, that wouldn't have the job they have now will concur wholeheartedly.
You leave my sweet Nan out of it!
From the picture it looks as if there's veins running over the surface. I don't think we have to look for aliens hiding there. I think it is one big giant alien.
This should be the new standard for every website. Encrypting everything makes it difficult for peeping toms (also known as "security agencies") to know which data is "interesting" and focus their efforts on decrypting it.
Wonder how long it'll take for companies to create their devices with two serial numbers. An internal serial number, hidden away, and a visible serial number, identical for each device, always being "666".
Exactly. It makes no sense. If you want to have another application available at the same time, you just get a second computer placed next to it. This enables you to multi-task too, increasing your productivity.
I don't see why I would trust a closed-source app for security. It's like installing a safe and declaring it to be completely secure without being able to see the back (and all the holes that might be there).
There is no need to go and import actually. All of the models I know about (and that's quite a lot as we Dutch like our (e-)bikes) are electronically limited. The thing is controlled by a small microcomputer and the restrictions can be loosened/disabled by flashing different firmware on it.
Many people here do it and I haven't heard of any cases where they got into trouble with that. The police usually go after mopeds. Of course if you get into an accident you might be in trouble.
I think they meant 'fall safe'.
You can only change the clock using this bug you say? This wouldn't be so bad in itself weren't it for the following:
- SSL depends on a correct date and time setting to verify certificates
- different tools create hidden files in the users home folder indicating previous successful root authentications
The second problem can be used to very nicely exploit. Change the system clock to *right* after one of those files was created and it will think that you very recently authenticated as root and thus don't have to enter your password again. This can be used to gain full root access.
I am quite sad I can only downvote your post once. There's not a single thing in your I agree with, except your criticism of Java (that thing needs to be taken out back and shot - with a rifle).
You mount /home with nodev, nosuid and noexec. You never worry about this crap again.
Interesting that CNNIC urges for Google to reconsider and "think of the users". If you ask me, thinking of the users is exactly what they are doing in this case.
To remove Flash from our computers?
I think not!
How does an organization like ICANN not have SPF and DKIM set up to prevent these kind of phishing mails. Any semi-decent administrator would set this up.
It's actually very easy. Customer X pays for Y for Z Mb of bandwidth. That is what customer X gets, no less. However, in that Z Mb of bandwidth, it is possible to prioritize: e.g. S.I.P. traffic has a QOS tag so that it always wins over torrents. Netflix could also get a QOS tag so that it doesn't start lagging when a download is started. The total download and upload speed for the connection stays the same.
But I didn't see a way to integrate this into an event loop, which is quite essential if you want to actually serve something useful (like the result of database queries, etc...)
So there should be a new rule to block all traffic to the aforementioned address when this application gets installed, or have they made it so obnoxious that it won't work when it cannot connect?
Otherwise I don't think you will get warranty after these simple tests.
The iPhone 6 will support Wave from the moment of unpacking, providing lightning fast charge cycles!
Sounds like they named the wrong planet after a woman!
I think we've all experienced this situation where they go from being all wet, warm and wild to becoming an ice queen. There's no mystery here.
Those two should be combined. When you get shot to hell in the game, your printer catches fire.
Makes "game over" get a whole new dimension.
That with a good business sense one can still make a good profit even in an economic decline.
On the contrary: Feels like we're going backwards.
Yes, it's a classic case of "Do as I say, not as I do".
The government can:
- Profit from criminal activity
- Illegally surveil all of it's citizens
And of course many other things that you'd be thrown in jail for. It's the age of democracy people! Everyone is equal, it's just that some people are more equal than others!
He probably wanted to buy some more stock himself. Talk it down a bit so he can get it on-the-cheap.
Just give me my ARM tablet. x86 is really yesteryears platform if you ask me.
Installed ESX on one of our servers. Then noticed I couldn't manage it, as I would have to install Windows first to run their management stuff. Went back to KVM/lxc.
Which is expected now that you slowly see the "Big Boys" accepting it too. It makes it useful as a currency, instead of only something to speculate with.
So apparantly they are asking Google not to determine placement in the results on whether the site matches the query, but on how "legal" the site is.
Do they even exist?
Since we have the silly data retention in the Netherlands, all reports about it shows that it does absolutely nothing to help catch more criminals. The only thing it does is eat up your tax money to increase government surveillance.
But anybody using 'dell' and 'shiny' in the same sentence has lost his marbles.
Yes, DELL could do that when suppliers start accepting bitcoin too. That is why accepting bitcoin is such a big deal for a company like DELL. One of the reasons people are afraid to get bitcoins is the high volatility of the exchange rate. DELL does not necessarily improve that: they immediately sell the bitcoins they receive, but as the network of accepting providers becomes bigger the need for that will diminish.
People still would not need to sign up with coinbase though, which was my original point.
This article has misunderstood what DELL is doing. DELL uses coinbase as their payment provider when you choose to pay with bitcoin. This means that DELL tells coinbase it wants a payment worth X USD. Coinbase will then create a bitcoin address, determine how many bitcoins will need to be paid for that amount.
Customer proceeds to transfer bitcoins from his wallet (which *could* be coinbase, but need not be). Coinbase sees an incoming payment and tells DELL the payment was complete. DELL will then get the given X USD on their bank account.
They could always change their emergency number too:
1. You can't regulate it. You cannot block a bitcoin transaction. The only thing you can regulate are things like exchanges and the businesses accepting bitcoin. If more and more people start to use only bitcoin for their entire transaction and not exchanging their coins for fiat currency there will be less and less to regulate.
2. Financial institutions don't like it. The bitcoin network does not need them so in an all-virtual-currency world they would soon perish. Obviously, they are using their financial influence to lobby governments to do whatever they can to discourage the usage of these cryptocurrencies.
3. You can't seize bitcoin. You can't freeze their wallet. If they have bitcoins, they can continue to buy things. Freezing a bank account to dry up resources for people not behaving exactly like the puppets the government would like them to be gain greater freedom, which is of course unwanted.
Can your database system then execute the binary data being referred to without having an external file somewhere on the filesystem?
is how this stuff gets executed. You have some non-ascii encoded cruft in your registry. You have a key in your registry creating an autostart entry to be ran at boot-time.
How does this autostart entry get to this non-ascii encoded cruft? Can an autostart entry refer to another registry key? Somehow it seems Microsoft left a door ajar somewhere waiting for it to be exploited.
Seeing how easily Apple fanboys part with their money.
And that's why you install a third-party rom like Cyanogenmod on your device. Did that to my original HTC Desire. The result was a phone that was much snappier and takes two to three times longer to drain the battery.
Received an invitation mail for it this morning. Too bad it's Windows-only at this point so can't run it. I'm waiting for the Linux version to be released though.
You do your best to avoid products with closed-source firmware as much as possible.
is when you are vendor-locked to their proprietary crap.
Why anybody would want to use "Oracle Linux" and pay for their support is beyond me.