Odd bet for Hawkings
He must be cleaning up his bets a bit. He's been known to bet for a subscription to "Playboy". Even strapped, a man needs porn.
80 posts • joined 25 Apr 2008
He must be cleaning up his bets a bit. He's been known to bet for a subscription to "Playboy". Even strapped, a man needs porn.
Go after telemarketers and junk snail mail.
I can at least filter out junk email, real non-virtual interruption is 10 times worse in my opinion. The "do not call list" for telemarketers has helped, but you still get bothered by smaller business which aren't subjected to it.
Thank you for the laugh of the day. Not sure where you get the idea Linux is virus proof. Anything which runs applications is subject to malicious code.The fact most people who do hacking learn it first on UNIX/Linux of course makes it virtually unhackable as well eh? Heck, the best tools run in *NIX. I have to hand it to you; you did get one part right. It is pretty cheap to license. Go figure.
heh.. I'm still laughing. Thanx again!
If an O/S had to compensate, update and change for each and every type of peripheral on or soon to be on the market the O/S would never get released. It is a lot easier for each company to work on it's product than it is for another company to work on everyone elses. Get real.
I feel sorry for those individuals who held onto this stock in belief it will come back. Now many people have lost so much off of it they are forced to hang onto it in hopes that somewhere/sometime in the future it will get back up above 30.
I don't see why Yang is so up about the revenue; it is way down, and far below estimates. Against competitors it is laughable. His pride has hurt a lot of investors out there who will not soon forget.
Anyone who ever took a statistics course could see this is an over inflated, poorly planned, invalid study.
First of all, the sample of locations is far too low, and there is no way they can account for the actual individuals sampled to get a clear figure at the micro level. They have also basically shunned the major business software market and target the normal home consumer; which leaves a huge share of the actual revenue generated by software companies.
I could go on and on, but like I said, this is pretty easy to invalidate, and nobody is going to ruin their reputation by attempting to validate this report.
I'm sure their main motivation is to get every legislature in the country to take another look at software piracy, but what they are actually doing is losing credibility with our lawmakers. When an average family has about 30 applications at home, you are saying each one has 5-6 applications which are pirated. Even a blind man can see your stretching the limit.
I'm not saying it isn't a problem which shouldn't be looked at. However, when it comes to ripping off tax revenue, it is pretty far down the line. I'm shocked you didn't add a figure for stolen off the shelf software.
Also failed to mention, that over 40% of software picked up from peer 2 peer sites has embedded malicious code, which should lower the figure even more, since more than likely this will obviously cause problems on the machine for a user who goes too crazy downloading pirated software.
Don't forget those who you may have sampled who did actually download pirated software a few times, but failed to continue using it because the application is a bit too complicated to use without a set of manuals, or because they downloaded it to see what it is like, but then lost interest in it or it wasn't exactly what they wanted.... needless to say, they don't use it after one week.
Also affecting numbers is the saturation point. Say someone downloads 30 pirated software applications a week. The person can't possibly use them all consistently enough to truly say you lost revenue. You also have to figure in someone may download 4 products which are virtually the same to see which one they like the best, and toss the others... again... no loss in revenue there.
Basically, before you put out a crazy study in hopes of swaying elected officials, law enforcement and the public in general... please have someone validate it first. This one doesn't pass the "Giggle Test".
1. It isn't on continuously
2. It uses frequency hopping
3. everything has a bad side; even aircraft
4. I think the Taliban has other things it would rather spend its money on, than electronics to counter this
5. There are a lot of odd-ball tones on a variety of frequencies... and we can even drop transmitters in enemy territory to confuse yet distinguish from those worn by troops
6. They will be worried about being led into a "trap"
... you get the point by now.
How was the order for the material placed? All at one time, or multiple orders? I'm betting how it was ordered had an affect on how this turned out.
...and you can't complain about the condition.
Guess my next video card will be some version from the Rambus Corp. They seem to have a pretty good record in these lawsuits; definitely plenty of practice.
Anyone taking bets on how long it will take until the first vulnerability proof of concept is published?
I own an apple, and I use it to pwn yours!
Their fantastic, especially with todays drive management applications and options. Now... start increasing production on 10K-15K+ RPMs to bring the prices down on them.
Less than 10K rpm on anything over 500MB just sux.
Now-days... it is the hard drive slowing things down. Not processors or lack of memory.
The fines are for PRIVATE SECTOR companies.
Do you actually read the entire article, or only those words containing less than 5 letters? ...and then jump on the bandwagon of another who bashes gov't?
For government organizations: Responsible individuals at least are fired. Many countries are passing laws which will land offenders in jail as well as compensation. So you may not get the governement entity, you can at least get the person who didn't meet compliance.
With the many options for encrypting data at rest at affordable prices, there really isn't any excuse. However, no matter how idiot proof you make something... someone will find a way to build a better idiot.
Why anyone purchases Oracle products is beyond me. As a contracted pen tester, it is a product which causes nightmares for me. Working ways to mitigate the holes without taking a bite out of a budget is a big challenge. Hurry up Oracle.... I'd like to take a vacation!
Absolutely fantastic servers, but there are cheaper alternatives. Anymore, the only time we use SUN is for our 'private' networks where we need extra security.
How about slamming them with a huge fine and implement an independent audit to see if they have other legal or compliance problems.
Not everyone uses P2P applications to illegally distribute copyrighted material.
The more features an application has, along with ease of use, and flexibility in dynamic user programming.... the more likely someone will find a way to exploit the application.
It isn't feasible for most companies to test their software to death before realeasing it. Majority of software put out today has some sort of vulnerability waiting to be found.
If everything was so easy to fix... Oracle would have been able to fill up all their leaks years ago.
The original law is more than 30 years old. It has been used on both sides of the fence. Bush just pushed the envelope of it a bit more than others due to the WOT. You think Clinton didn't do any wire tapping and dancing before getting a court order... think again!
Fact is, you still need a court order to "spy" on the public in America. In an "emergency" (yeah, this can be debated), you get a week to petition for the warrant. Which is really what the friction point is.
Still... it is better than most countries which have no laws against the government spying on their citizens. Not only do most countries allow it, but there isn't any judical oversight. So don't be so quick to bash the American system. You are probably being spied on this moment if you aren't in the US... and cannot do anything about it.
Don't require a 3rd party for file system and data at rest encryption; where you can move the medium to another computer and it still can be read
Don't require a 3rd party to share desktop and file system accross the internet securely; add seemless transition through VPN or RAS
Don't require a 3rd party for voice recognition applications, and nothing out there right now comes close to Vista right now in this feature
Granularity with group policy; which could fill a few pages for those familiar with the cat2 support savings
Many internal collaboration features with Office and SPS not available with XP
Improved versioning in shadow copy
Moved to Vista at the end of December. No problems what-so-ever.
Might want to learn to use the system before you bash it. Don't just jump on a bandwagon or give up because something is different. If everything was kept the same, everyone would still be using MS DOS and 70% of you probably would find computers too difficult to work with.
Yes, Vista had compatibility issues early; which is why we waited.. However, like I said before... no problems, and a huge increase in capability and security. In fact, many applications created for Vista have many more features than those which run on XP
Stop selling any products or provide support to the European community. Give them a whole new light on how much the applications are worth.
Perhaps they pulled it because they didn't get the code in this rootkit just right, and were afraid Mark Russinovich would make fools of them again... this time with their game console.
It's okay to have a PS3, just ensure you unplug it from your entertainment system after use and pull the power cord!
A national ID card scheme seems a lot like ID papers used by the old Soviet Union to get from your house to anywhere else. What is next, you'll need to have a passport to live in your own country?
If there is already a blanket of checks run on individuals, what good would come out of this system? Work smarter not harder.
I haven't purchased a Sony product since thier digital rights root kit fiasco, which left individuals computers vulnerable. The way they handled it left a bad taste in my mouth which isn't going to go away any time soon.
You risk anything being made public as soon as you tell someone. Whether it be your best friend, spouse, family member etc. I bet you aren't as hard on them when they tell someone else one of your "secrets".
As soon as the government puts you in jail for a conversation of yours which isn't criminal, related to terrorism etc, then you have a gripe. Until then, get real and look at yourself.
No, they NOW have to check all the data since there is no telling what these two have changed. It is likely they changed a lot more than just grades. Either way, they cannot take the chance. For instance, if they went in and changed the keys to some tests, it will cause problems in the future. Backups are of little use, since the majority of them will be comprimised as well. Ensuring the data is trustworthy again, will cost quite of bit of money and take time.
Also, don't tell me what they do and don't do. It's obvious you haven't taken a few things into account, and all you are doing is stating the obvious. It is rare for any system to have users re-check entered data, which is why it is a good practice to schedule audits of data from time to time.
Keep your clue for yourself. Just because something happens where you are doesn't mean it happens everywhere else. On most systems it doesn't matter hwo often you change the password or how complex it is if you have physical access.
Did this school do everything it could have to prevent this from happening? No.
Did they underestimate malicious inside users? Yes.
Was physical security and user security training poor? Yes.
Does this provide any excuse for the students who hacked into the system? NO.
If you let someone into your house, and they steal something when you are not looking, or damage something while they are there... are they not liable because you let them in? Does this mean your security is poor?
By the way, if physical security is so lax. Then keeping grades on paper are just as vulnerable. A student could break into a room where they are kept and make changes... Here's your sign.
Do you people even research facts before you start engaging your moronic thoughts?
1-There are around 70 counts against him. This averages about 6 months each.
2-The active phrase here is "UP TO X amount of time"; which does not mean he has already been sentenced and must serve it. Even so, he would be eligible for parole in a lot less time. Probably around 8-12 years if he does get the max on all charges.
3-He didn't cause damage? To the person who stated this, you are the biggest moron of all, and obviously didn't get all the facts on what was done, or realize how much the clean up will cost.
Like they say, if you cannot do the time; don't do the crime.
He was well aware of the consequences, and old enough to know the more things he did, the harder he would get hit.
Some little things don't seem very big, but are. If he changed the emergency contact information in your child's records so they couldn't get ahold of you during an emergency, I bet you would think a lot differently about the severity of "little things".
This system has been comprimised, and every bit of data now has to be checked and validated to ensure it isn't erroneous. This alone will cost the tax payers quite a bit of money. No damage, eh? Think again.
..and their stock keeps falling. Now down to $22.73 per share.
Jerry Yang, you are such a genius in turning down the Microsoft offer of $33.00 per share. Maybe it is time you listen to Carl Icahn for a change; you might get MSFT to pay $25 per share if you hurry!
The password protection on a PC is good...well, for at least the 70 seconds it takes to boot up a CD Rom or 15 seconds on a thumb drive.
You guys are just too hard on these people!
First of all...
the death penalty can only be handed out for 2 things. 1st Degree Murder and High Treason.
Hacking into a computer system doesn't qualify for either.
He didn't access any classified information. The department of defense does not have their classified network accessible from the public internet. He only gained access to what is known as NIPRNet. This is an unclassfied DoD network which has connections to the Internet; obviously necessary for communications for non-DoD interests.
Third... There are many crimes you can do where you are in one jurisdiction, yet harm is done in another. When this is the case, the court where HARM WAS DONE (ie the US) has jurisdiction.
There are way too many things about this story which seem a bit outlandish, don't you think? If it doesn't pass the laugh test, then it probably isn't true. Don't believe everything you hear, especially if you hold a prejudice. Use your brain, be critical, and think. Those who don't are more idiotic and irresponsible than anyone they accuse.
He knew very well if he was to get caught, he would have to face the music.
The next time you feel like defending a hacker. Think how easily one can get into your system, hide a folder on your hard drive, fill it with pictures of child pornography, send out some mail containing a few pictures. Then to be really nasty, he makes a few phone calls to the authorities and gives them a tip that you collect, distribute, and solicit child porn.
Apparently it is your own fault that you allowed this, so you should be prosecuted.
Quit making this about one country vs. another (only impotent morons use this to compensate for their own short comings). If the situation was reversed, you would want him to hang from the ferris wheel next to the Thames.
Fact is, he broke the law and caused damage. The damage was in the US, therefore it falls in its jurisdiction. He has nobody to blame but himself.
We need a Stevie Wonder avatar; because even he could see this guy is a twit.
Just because you have a car, and you drive it around town... doesn't make you guilty of vehicular manslaughter. However, how you drive it could have adverse affects which could affect others.
The mother clearly created this account to do harm. I don't think the mother thought it would cause this much harm, however this is due to her own ignorance. A psychologist would have predicted this outcome, and if you think about it for a few moments, and all the depressive suicides you have read (or know) about, you can see this outcome was probable.
Did the mother pull the trigger? No. However, she was definitely an accomplice of sorts when she made the decision to create this account to cause harm; even if it was just emotional harm.
This mother herself should believe this is a serious act. After all, she believed the deceased girl herself caused harm to her daughter. What the deceased did, was no where near as costly or serious, and the mother believed she should be punished. It would be hipocritical to believe otherwise.
Can you say, "The beginning of the Fourth Reich"?!
Just as well... I'm not a big fan of VMWare ever since Microsoft released its latest version of Virtual Server.
We need a system which will jam all these "tracking" applications.
With cell phones, auto systems and various other wireless items having features which track where you are located.... give me a product which will jam them all so nobody knows where I am at any given moment.
Soon everything from your drivers license to your watch will have some sort of RFID or wireless feature for tracking. Beware of SWAG, the new spy-ware.
The solution is for GPcode.b; this version is GPcode.AK. There is no solution for it.
Everyone who believes you can simply reverse engineer a solution for this type of encryption please take 3 steps back from your computer and never touch it again.
Even if you manage to learn part of the algorithm, you have no idea of the actual variables and values used...hence, you need a lot of computer time to plug them all in (ie brute force).
So many arm chair judges.
There are many types of crimes which can be committed from a far. Stop and THINK for a moment, and you just might come up with a few.
Jurisidiction normally falls with the court where the damage actually occured.
The fact he hacked into the Pentagon isn't the only issue. Its the fact he was caught hacking into a computer system at all. The Pentagon finds it easier to track hackers than small mom and pop operation.
The law doesn't require you to protect your property in any manner. So the administrators lack of skill in configuration means nothing. You don't need a fence on your property to prosecute someone for trespassing.
The next time you defend a hacker. Think about one getting into your system; Secretly downloading a bunch of child pornography on your computer. THen to be really mean, he contacts the authorities and lets them know you collect child porn... while he silently uses your email account to send some out to everyone on your contact list.
Oh darn... he's in Russia... so you are screwed!
Who really cares? Let this thing go. Yahoo! doesn't have the best search engine, portal, mail service... well, anything. Since they are keeping the same staff on board, I don't see this changing in the near future.
I wouldn't purchase their stock, advertise on their services or use their e-mail service. Everyday, more and more people are learning there are better services elsewhere without bogging down your browser with 25 adds a page.
Let Yahoo! go up in flames do to ignorance and a misplace feeling of superiority.
I still don't buy it, and the math is off due to missing variables.
Wattage doesn't create heat, resistance does.
Hotplates and processors are both built differently for different purposes. Processors are using the majority of their watt energy for processing, therefore the resistance heat isn't as efficient per watt. They are also built of material which doesn't hang on to the heat for a long period of time.
Where as a hot plate is using watt energy and creating as much resistance with it as possible. Therefore it is more efficient in creating heat with each watt. It is also made of material which is designed to hang on to heat as long as possible.
A brick holds heat better than a sponge or a block of silicone.
Now, reconfigure your tests using the above information, and you'll forget about wattage vs size.
See this report from OMB to the US House of Representatives last week. Addressing information security weaknesses within the TVA.
Nothing like incompetence.
It isn't like IPv4 is just going to stop being used. It will live on for a while. Most routers now are dual honed and can work with both.
You can learn a lot, including how many large corporations and governments are handling this move by going to http://www.ipv6.org
For Vista owners, you can take advantage of IPv6 by learning how to use Windows Meeting Space. Allowing you to easily control your PC at home from work, or collaborate wtih others through all the evil security equipment.
THe Greatful Dead allowed anyone to copy their music or make their own tapes at their concerts and circulate. They still made millions. They became so popular, people still purchased their albums, but also bought a boat load of merchandise. Has to be a million dollars worth of Dead Head stickers still on old cars.
I also get a kick at how liberal Hollywood and many musicians are except for the fact of copyright. If they weren't already making millions they would probably get more sympathy. However, I think the majority of people still purchase most of their goods instead of breaking copyright laws. With the exception of perhaps the 12-24 year old demographic. Yet Miley Cirus is still making a killing; some 18 million last year.
Point is... nobody wants to hear millionaires griping, whining and beoxching unless they are watching baseball. Get over it.
First of all... don't resist arrest. You get your day in court. If you allow yourself to be tased by authorities, then you are probably a threat and deserve it.
There probably should be some more studies done on the electrical affects done on the body. I suppose if the right conditions exist,ie body conduction/lack of resistance, direction of charge (negative to positive path), the heart being polarized at the same time etc... then it may be possible. Just highly unlikely.
So you don't have anything a hacker wants on your computer, so you dont care.
Do you have people who don't like you?
Doesn't take a lot to hack into someones computer, hide child porn, documents about stalking, plans to kill someone etc. Then call the police, and say this person tried to trade child pornography with you. Even take over his mailbox and send some things out in his behalf.
Bingo, you go to jail for something you didn't do.
Once you learn packet injection techniques, you can crack a WEP password in less than 5 minutes. A noob using Aircrack can do it in 1 to 3 days; depending on how often you use it and how many IV packets are available.
Because of solar scintillation, I doubt wireless will ever be used as a primary means of flight control. However as a backup means, it does make sense for controls which are already electronically controlled using servos etc.
Wouldn't do much for systems using pneumatic or hydraulic means. Since a cut in those systems lines would mean a loss of the medium itself.
Just how many aircraft are built with electronic servos actually moving the flight surfaces? I believe right now, most are still assisted via hydraulics.
Microsoft announces it is pulling all products and support out of Europe beginning in September, because their analysts claim they cannot recoup costs of maintaining compliance without passing it on to the consumer.
Psych!! Not reallly, but what a scary thought. Courts should be careful just how far they go with things.
I welcome any product which increases a persons ability to think.
Take a couple e-feds and think about it for a bit ;)
You'll see... there are too many idiots in this world! They require all the help they can get.
Can't understand why anyone would use this O/S on a medium to large enterprise environment. It isn't listed as IA certified on the common criteria portal's Certified Product List.
Shame on any security engineers who actually let this product onto their network!
Targeting social networks for spam began on AOL in the mid 90's before the Internet as we know it now evolved... and has been going on ever since. It was very easy to get someones email address then.
Apparently, someone just learned how to hook their computer to other computers.
Perhaps the Catholics are preparing to merge with the Scientologists! Think of the money they could both rake in then!
Keep your eyes on Tom Cruise to see if he makes a sudden trip to the Vatican, where he will lobby the pope to make a sweeping damnation of psychiatry and modern pharmaceutical medicine.
I remember back when I had to type uphill, both ways, in the snow. When you had to apply 90 lbs of pressure to each stroke in order to smack the paper hard enough, and if you made an error, you had to stop, move the paper up and erase... hoping you wouldn't tear the paper.
Amazing what people complain about. It isn't like they moved all the vowels to new locations.
You have a brain... make the adjustment and move on!
Even Paris gets over one hand bag having a pocket in a different location from another hand bag.
You mean their I-mac commercials which say MAC computers aren't prone to virus' like PC isn't the first misreprensentation?
Apple must be stuck in a universe of their own.