Re: Go MOM...
I'm sure the people employed by the ISRO, that wouldn't have the job they have now will concur wholeheartedly.
311 posts • joined 20 Oct 2007
I'm sure the people employed by the ISRO, that wouldn't have the job they have now will concur wholeheartedly.
You leave my sweet Nan out of it!
From the picture it looks as if there's veins running over the surface. I don't think we have to look for aliens hiding there. I think it is one big giant alien.
This should be the new standard for every website. Encrypting everything makes it difficult for peeping toms (also known as "security agencies") to know which data is "interesting" and focus their efforts on decrypting it.
Wonder how long it'll take for companies to create their devices with two serial numbers. An internal serial number, hidden away, and a visible serial number, identical for each device, always being "666".
Exactly. It makes no sense. If you want to have another application available at the same time, you just get a second computer placed next to it. This enables you to multi-task too, increasing your productivity.
I don't see why I would trust a closed-source app for security. It's like installing a safe and declaring it to be completely secure without being able to see the back (and all the holes that might be there).
There is no need to go and import actually. All of the models I know about (and that's quite a lot as we Dutch like our (e-)bikes) are electronically limited. The thing is controlled by a small microcomputer and the restrictions can be loosened/disabled by flashing different firmware on it.
Many people here do it and I haven't heard of any cases where they got into trouble with that. The police usually go after mopeds. Of course if you get into an accident you might be in trouble.
I think they meant 'fall safe'.
You can only change the clock using this bug you say? This wouldn't be so bad in itself weren't it for the following:
- SSL depends on a correct date and time setting to verify certificates
- different tools create hidden files in the users home folder indicating previous successful root authentications
The second problem can be used to very nicely exploit. Change the system clock to *right* after one of those files was created and it will think that you very recently authenticated as root and thus don't have to enter your password again. This can be used to gain full root access.
I am quite sad I can only downvote your post once. There's not a single thing in your I agree with, except your criticism of Java (that thing needs to be taken out back and shot - with a rifle).
You mount /home with nodev, nosuid and noexec. You never worry about this crap again.
Interesting that CNNIC urges for Google to reconsider and "think of the users". If you ask me, thinking of the users is exactly what they are doing in this case.
To remove Flash from our computers?
I think not!
How does an organization like ICANN not have SPF and DKIM set up to prevent these kind of phishing mails. Any semi-decent administrator would set this up.
It's actually very easy. Customer X pays for Y for Z Mb of bandwidth. That is what customer X gets, no less. However, in that Z Mb of bandwidth, it is possible to prioritize: e.g. S.I.P. traffic has a QOS tag so that it always wins over torrents. Netflix could also get a QOS tag so that it doesn't start lagging when a download is started. The total download and upload speed for the connection stays the same.
But I didn't see a way to integrate this into an event loop, which is quite essential if you want to actually serve something useful (like the result of database queries, etc...)
So there should be a new rule to block all traffic to the aforementioned address when this application gets installed, or have they made it so obnoxious that it won't work when it cannot connect?
Otherwise I don't think you will get warranty after these simple tests.
The iPhone 6 will support Wave from the moment of unpacking, providing lightning fast charge cycles!
Sounds like they named the wrong planet after a woman!
I think we've all experienced this situation where they go from being all wet, warm and wild to becoming an ice queen. There's no mystery here.
Those two should be combined. When you get shot to hell in the game, your printer catches fire.
Makes "game over" get a whole new dimension.
That with a good business sense one can still make a good profit even in an economic decline.
On the contrary: Feels like we're going backwards.
Yes, it's a classic case of "Do as I say, not as I do".
The government can:
- Profit from criminal activity
- Illegally surveil all of it's citizens
And of course many other things that you'd be thrown in jail for. It's the age of democracy people! Everyone is equal, it's just that some people are more equal than others!
He probably wanted to buy some more stock himself. Talk it down a bit so he can get it on-the-cheap.
Just give me my ARM tablet. x86 is really yesteryears platform if you ask me.
Installed ESX on one of our servers. Then noticed I couldn't manage it, as I would have to install Windows first to run their management stuff. Went back to KVM/lxc.
Which is expected now that you slowly see the "Big Boys" accepting it too. It makes it useful as a currency, instead of only something to speculate with.
So apparantly they are asking Google not to determine placement in the results on whether the site matches the query, but on how "legal" the site is.
Do they even exist?
Since we have the silly data retention in the Netherlands, all reports about it shows that it does absolutely nothing to help catch more criminals. The only thing it does is eat up your tax money to increase government surveillance.
But anybody using 'dell' and 'shiny' in the same sentence has lost his marbles.
Yes, DELL could do that when suppliers start accepting bitcoin too. That is why accepting bitcoin is such a big deal for a company like DELL. One of the reasons people are afraid to get bitcoins is the high volatility of the exchange rate. DELL does not necessarily improve that: they immediately sell the bitcoins they receive, but as the network of accepting providers becomes bigger the need for that will diminish.
People still would not need to sign up with coinbase though, which was my original point.
This article has misunderstood what DELL is doing. DELL uses coinbase as their payment provider when you choose to pay with bitcoin. This means that DELL tells coinbase it wants a payment worth X USD. Coinbase will then create a bitcoin address, determine how many bitcoins will need to be paid for that amount.
Customer proceeds to transfer bitcoins from his wallet (which *could* be coinbase, but need not be). Coinbase sees an incoming payment and tells DELL the payment was complete. DELL will then get the given X USD on their bank account.
They could always change their emergency number too:
1. You can't regulate it. You cannot block a bitcoin transaction. The only thing you can regulate are things like exchanges and the businesses accepting bitcoin. If more and more people start to use only bitcoin for their entire transaction and not exchanging their coins for fiat currency there will be less and less to regulate.
2. Financial institutions don't like it. The bitcoin network does not need them so in an all-virtual-currency world they would soon perish. Obviously, they are using their financial influence to lobby governments to do whatever they can to discourage the usage of these cryptocurrencies.
3. You can't seize bitcoin. You can't freeze their wallet. If they have bitcoins, they can continue to buy things. Freezing a bank account to dry up resources for people not behaving exactly like the puppets the government would like them to be gain greater freedom, which is of course unwanted.
Can your database system then execute the binary data being referred to without having an external file somewhere on the filesystem?
is how this stuff gets executed. You have some non-ascii encoded cruft in your registry. You have a key in your registry creating an autostart entry to be ran at boot-time.
How does this autostart entry get to this non-ascii encoded cruft? Can an autostart entry refer to another registry key? Somehow it seems Microsoft left a door ajar somewhere waiting for it to be exploited.
Seeing how easily Apple fanboys part with their money.
And that's why you install a third-party rom like Cyanogenmod on your device. Did that to my original HTC Desire. The result was a phone that was much snappier and takes two to three times longer to drain the battery.
Received an invitation mail for it this morning. Too bad it's Windows-only at this point so can't run it. I'm waiting for the Linux version to be released though.
You do your best to avoid products with closed-source firmware as much as possible.
is when you are vendor-locked to their proprietary crap.
Why anybody would want to use "Oracle Linux" and pay for their support is beyond me.
I don't have a car, I have a recumbent bike which I use for greater distances (like the 50 KM work-related travelling I do daily). Haven't actually thought about a car having a proprietary ECU since I never even considered buying a car.
A blu-ray box will still have the same proprietary crap, it's just even more closed because now the platform is closed too. A blu-ray box most likely does not support the pulseaudio protocol I use to get the audio everywhere I want it to go. So all in all it's way too limited.
The high cost for blu-ray software is most likely due to the fact that they create artificial scarceness by not giving everybody a key. Another good reason to avoid that stuff like the plague.
As a reason fewer people go to the cinema. It really doesn't add anything to the experience, besides making the tickets more expensive (because they have to earn back their "investment").
Also irritating is, at least for those people not blessed with living in a native-english-speaking-country, are subtitles. They get in the way and distract you from the movie, even if you are perfectly capable of understanding the spoken english. Why they don't use the same technique as they do for 3d to give you the option of wearing those glasses to not see the subtitles I don't know.
What is left to me is downloading. It's the only viable option. Why not buy a blu-ray you ask? Well, those are encrypted and only allowed, closed-source applications can play them. I refuse to install closed-source crap on my system so the only way to watch a blu-ray is to bypass that encryption, which is a crime (and a much more serious offense than downloading).
So, given that the MAFIA (Music And Film Industry of America) does not give me any proper, paid options, they are not receiving a single dime of my money.
Why don't they just block this dodgy CA altogether? Right now they can basically do whatever they want and still stay in business.
Is one that isn't installed. Seriously, why even bother? Nowadays it's mostly used for advertisements anyway.
Most cooling would be needed when the sun is heating strongest. Solar panels would thus simply deliver most energy when most is needed.
A fully charged laptop battery can explode with roughly the force of a hand grenade when short-circuited. Good to see the good ole US of A is doing their bit to help those pesky terrorists. It's just so embarrassing when you try to blow up an airplane and your battery turns out to be empty.