Big Goverment
Hmm
Democrat Big Government is bad because it helps poor people live until they can get that second job the need.
Republican Big Government good because it mostly just takes away our freedoms.
138 publicly visible posts • joined 25 Nov 2009
Exploits don't necessarily need to access other processes' memory if they can over wright and execute their own memory space.
Sandboxing is part of fixing the OS. It restricts the things applications can do, so that if the application behaves badly it reduces or eliminates the possible damages.
"The laws that Arizona Republican-dominated Senare are enacting are just national laws, it's just that Arizona is enforcing them."
That is plainly false. There is no national law that makes it a crime not to be carrying identification. It is a law that clearly does not only affect illegal immigrants. If an officer believes you might be a foreigner, perhaps your accent is a little to British for his tastes, then you must be able to produce documents proving you are legal or go to jail and prepare for deportation. I should hope that includes any white teenage hoodlums running about.
Perhaps rather then sending all SMS messages to /dev/null you could also have a popup show you the message is being sent and ask for permission to send it. A similar thing for accessing the contact list wouldn't really be logical, but I'm not sure how many apps could actually have a good reason for doing that.
And the number of systems that have to be analyzed to determine the full extent of the attack. It is far from a simple task to know for sure if a system has had malware installed on it. And if data wasn't accessed through normal channels there may not be any logs of exactly what was grabbed.
"With Sony your paying 25% (rough estimate) of the price for the hardware and the rest is for the name."
I know that when the PS3 came out it was being sold as a loss leader. Maybe the hardware costs have dropped since that time, but I'm willing to bet good money that the hardware is well over 25% of the costs. It wouldn't surprise me if their music CDs fit your profile though.
"ALl this bollocks about faster and fatter net pipes ( so we can download Linux distros", absolutely horse-crap!! It's so people can torrent movies, TV shows, games and music, you know it , I know it ( I have even done it in the past, a lot! ) and the media corps know it."
You've obviously never downloaded EQ2 at over 9 GB. You've also never waited on patch downloads when all you really want to do is spend what time you have available playing instead. You probably haven't done much Netflix streaming either.
Time wise it is often faster to drive to the store, buy the game, come home and install it then it is to download it. But since these are not valid complaints in your world I guess I shouldn't be worried about it.
I don't know of any instance in history where the "victors" have been tried for war crimes no matter weather they've committed them or not. It's not as if the US has never started war's against foreign powers for little reason.
Spanish American War - journalists decided a ship was blown up rather then a boiler accident.
Mexican American War - US wanted more land.
Maybe not really a war but still a crime
Trail of tears - didn't like the natives so we kicked them out even though the supreme court granted their right to stay.
I'm sure British history has plenty of examples of questionable behavior, but in the US we don't believe in learning other countries' history.
"Also, as far as I am aware, nobody has produced a calculator that does non-integer arithmetic in anything other than base 10 (what a mind-bending concept that would be!)."
You may be right about that, which is interesting since it is easier to convert binary to both hex and octal then to decimal.
Reasons
1. You can store the vault in a more secure location then real post-its. To crack the vault you have to be able to get your hands on it first.
2. A vault can be copied to additional locations so you can have access to your passwords from multiple locations if necessary.
3. Unless you use a weak password for the vault or the vault has a weakness in key generation, you should have changed your passwords at least once sometime in the years it will take to crack.
You've never seen the leave a CD containing autorun malware labeled PORN in the parking lot and wait for someone to take it into work with them and stick it in their computer. It's a fairly successful ploy. The malware is installed long before the person realizes there is no porn on the disk.
Are you saying that the register lied when they claimed to be quoting Kessler or that they forced Kessler to say that?
I think showing that undersea methane leaks might not make it to the atmosphere may alter some climate models. Even if it doesn't significantly change them, the more accurately we can represent climate mechanisms the more accurate our predictions will be. Less error here will help make up for error elsewhere.
Cracking the encryption algorithm doesn't make the encryption any less secure unless the agorithm has some sort of weakness in it. Knowing the encryption algorithm gives you little, what you need are the encryption keys. I'm not sure how long it would take to brute force the 40-bit keyspace if you know the algorithm, but for the manufacture that uses the VIN as a key it would be pretty short.
Their actions are probably self-defense as much as anything. There are people here in the US who want Assange classified as a terrorist. We have some pretty serious laws about aiding and abetting terrorists, laws that don't require evidence, warrants, or judicial review. I can see why these US based companies might honestly be afraid. That may not make it right, but I can see why they might feel that way.
There exist extreme cases where the authorities need to get involved, but there are a several behaviors that can draw bullying and will continue to cause problems in your adult life if you don't learn to give them up.
I sometimes think we are becoming a culture that believes we have some sort of right not to have our feelings hurt, even accidentally. I know people who consider it bullying to be told how to do something correctly the first time they are doing it.
Sure if you can insure that no sensitive data will every be on the system partition then there is no need. As long as you know there will be no IP addresses in /etc/hosts and that no document will ever be saved there, and that there are never any temp files there, and that the partition isn't shared with any non-system file systems then there is no need to encrypt it.
The effect is that since Slashdot is primarily about posting comments legislation like this has the potential to reduce the number of commenters as they become fearful of offending someone. Slashdot is largely about arguing your beliefs and that sort of thing can easily become offensive to those who disagree with you.
The article implied their numbers are based on the first time a developer submits their code through the scan. It seems to me to a bit ridiculous to expect code to be 100% free of security bugs before it has been analyzed. It is easy to miss something, that's the whole point of using a tool like this.
That brings me to an interesting thought. It seems that straight people are probably responsible for somewhere close to 99% of gays, as I'm sure most gays have straight parents. Would that imply then that the warming would really be because of heterosexuals?
And religious extremists are always worried about gays negative effect on straight people.