Bad news for God
308 posts • joined 9 Jan 2012
Instagram would prefer that everyone use their Social Security Number (or their country's equivalent) as their user ID.
Cornstarch & water is a well know example of a non-Newtonian fluid. The Duke experiment is not dissimilar. Next, they will confirm that pointy penatrators do much better than blunt penatrators.
I'm sure very quickly someone will discover a register hack similar to the Windows XP POS update hack that will allow one to trick Windows updates.
In my experience playing with Windows 10, it works best with Classic Shell installed.
You mean the world would be worse off without:
5443036 Method of exercising a cat
6505576 Pet Toy
6557495 Laser Pet Toy
6651591 Automatic laser pet toy and exerciser
6701872 Method and apparatus for automatically exercising a curious animal
all US patents on the idea of using a laser pointer spot as a toy for a cat to chase?
If God altered the Universe to make everything everywhere appear to be billions of years old, then Scientifically, the Universe IS billions of years old because the only clocks there are use physical processes as their timers. (i.e. There's no extra-Universe clock for all of us inside the Universe.) Pretending there is some "real" extra-Universe time is just empty headed intellectual masturbation.
Ham & his ilk should sleep very well at night. Ham & his ilk dismiss radionuclide dating. Yet the same equation for spontaneous nuclear decay that allows us to date all sorts of things going back billions of years, is the same equation that governs the initiation of a nuclear weapon detonation. You can't have one without the other. So if you don't believe in radionuclide dating, then you have to believe that all this stuff about nuclear weapons is a big hoax & conspiracy theory.
But of course, Ham & his ilk know nothing of logic.
All the more reason to use that MAC Address filter built into your WiFi router or access point.
That Nash & Alicia had a son, who also developed schizophrenia.
I want them to create a .ass domain.
Yes, Rutkowska also developed "Blue Pill", that uses hardware virtualization to move a running OS into a virtual machine. (i.e. Could be used by malware to run underneath the OS.)
Being able to detect that one is operating in a VM is not new to malware.
Red Pill, developed by Joanna Rutkowska, is an example of a technique to detect that one is inside a VMWare and MS VirtualPC virtual machines. More generic tests, such as counting the time taken to execute two instructions, can also be used to tell software it's inside a VM.
A fair amount of malware checks to see if it is in a VM, and stops if it is. It's a technique to make it more difficult for security researchers to study the malware.
That probably depends on the details of how the power in, charging circuit & battery are functionally integrated. If the battery & charge circuit of switched to the side when the power is on, and the battery is switched to (as is done with UPS) then this side channel may still work.
But your comment does point to the fact that this side channel attack only works on modern PC's and equipment because of the use of under filtered switching power supplies.
If you used an "old fashion" power supply that used a transformer, full or half wave bridge, and (optional) analog voltage regulator, you have to follow that bridge with a large (several hundred microfarad to several thousand microfarad) capacitor to put the 3db point for line ripple suppression well below the mains frequency (50 or 60 Hz).
That 3db point "works both ways". Most of the signatures these guys show have most of their info out to 300Hz, and above the mains frequency. And old fashion power supply, with it's 3db point at say, a few Hz, would leave them with basically no noise to analyze. The down side is that old fashion power supplies are bulkier, more costly & less efficient than switching power supplies, which is why they have been replaced in the last couple of decades.
But if you wanted your equipment to block this side channel, just design using a properly designed old fashion transformer based power supply with whopping capacitors.
Both hand you data over to the NSA. So why use either of them, unless you use a wrapper like nCryptedCloud or Cloud Fogger?
Or did they use StingRay tech to spoof cell towers to track those people who don't walk around with their phones WiFi turned on?
About 3 years.
Only a bunch of morons (or Chinese agents) would hijack a thread to hold as inane debate as you guys when the thread should be about something as important as the Chinese government weaponizing expats web browsers.
Note that for Amazon to put the restrictions on that they want, even on the $60 plan, you can't pre-encrypt your files. Might as well just burn them all on a blu-ray and mail it to the NSA.
What does that mean & who decides what a "legitimate medical practitioner" is?
You can bet that quacks pushing things like homeopathy and all sorts of alternative medicine snake oil will get a .doctor domain.
The R (& H if I recall correctly) suffix in i7 4th-gen desktop CPUs designate the processor with having Iris Pro integrated graphics.
Why not? After all, they are assembled by my good friend the Easter Bunny.
The European Court of Justice is considered a joke in legal circles, and this ruling on search engines just underscores it.
""With Windows 10, we think of the operating system as 'Windows as a service'," said Terry Myerson, Microsoft's VP of operating systems."
So is he saying you can't buy Windows 10, you have to pay protection money forever and ever? (Subscription only?) If so, then in my organization, Windows 10 is DOA.
No doubt "Premier" customers are covered by an NDA, so they can't forewarn the public of Microsoft's disastrous security the upcoming patches are trying to band-aid.
Switch to 4G? Don't these people ever look beyond the UK's borders? Even in 1st world countries like the US & Japan, cell systems go down in emergencies. 911, Hurricane Katrina, Hurricane Sandy, Tōhoku earthquake tsunami (also caused the Fukashima meltdown) ... Anyone relying on the cell system was SOL. Often for days, in some places weeks or even months.
Obviously, no major disasters could ever happen in the UK, so no problem.
So was there no wear leveling in the flash memory controller? That would automatically take defective cells out of operation.
Is I've switched from Truecrypt to Bestcrypt. Bestcrypt isn't free, but you can examine their source & and it is maintained & improved.
Obviously, the NSA's tracking everything that moves over the Internet, in order to prevent terrorism (cyber included), certainly did a lot to thwart that hacking & data theft at Sony, the world's largest cyber terrorism attack if the claims that as much as 100TB was stolen are true.
Who is actually fluent in the English language. It's full of grammar errors.
It's not like humans are not easy to replace with unskilled labor. After all, that is why there's over 7 billion of them infesting this planet.
Maybe SpaceX can sell them a couple of 21st Century launch vehicles.
First off, a Ring Laser Gyro only gives you rotation, not translation information. Navigation grade RLG's typically have an integration error of about 1 degree per hour. The other component of an inertial measurement unit (IMU) is the accelerometers to give you translation information, with a typical navigation grade accuracy of about 1mg (milli gee). Three gyros and three accelerometers are normally combined in an IMU. The combination of an IMU and a computer running navigation equations is called an Inertial Navigation System (INS). A typical navigation grade INS has a total integration error of about 1 nautical mile per hour. Believe me, you don't want to sail around relying on an INS to tell you where you are. You only want it to see if your GPS is being spoofed or for very short term navigation when you GPS has dropped out. A "military grade" INS has an integration error of about 1 nautical mile per 24 hours, a tactical grade (like on a JDAM) has a total integration error of about 10 nautical miles per hour, which again is why the INS is used for short term when the GPS is screwy.
People have very warped perceptions of risks. Just look at all of the antics that have taken place, especially in/by the US, over terrorism over the last dozen years due to 911. Terrorism strikes the fear that it does because one cannot see it coming and its apparent randomness in whether one will be a victim of it. Yet in the last 12 years, the US has absorbed over one hundred 911’s in terms of sudden & seemingly random deaths from automobile accidents, which amount to about 30,000 deaths per year. The threat of terrorism is real. But it's very small compared to other threats to our lives that we live with comfortably every day.
I foresee trouble simply with people messing with the robot for entertainment purposes.
Maybe there's a business opportunity for checking & cleaning these systems...
This problem should be self correcting in that no one trusts any encryption coming from a US company anymore. The US will shortly become an importer of crypto. Should people trust the AES-NI instruction set in Intel Processors? One has to wonder.
Eh? Then what does the Settings -> Security -> Encrypt Device on my Android 4.1 phone do? Or the Settings -> Security -> Encrypt external SD card ?
All I see in this is the cluelessness of the government. Android, for example, has had full phone encryption built in since at least 4.1, maybe earlier. It's under "Settings", "Security", "Encrypt Device" and "Settings", "Security", "Encrypt external SD card"
It's almost a 100% certainty it is Windows Embedded for Point of Service V1 or Windows Embedded POSReady 2009, both of which are types of Windows XP.
Maybe Google should read it. It just extends the Patriot Act & warrentless snooping. Oh yea, and shields folks like Google.
The description of the error in the release notes is ambiguous.
" Even when marked to be encrypted, an email with only Bcc recipients is sent in plain text!"
Does this mean that the bug only shows up & sends mail unencrypted to the BCC recipients when the BCC field is used but the TO & CC fields are blank, or does this mean that the bug always sends mail unencrypted to the BCC recipients independent of the status of the TO & CC fields?
These are two very different behaviors with two very different probabilities of being triggered due to the way people often use BCC. My expedience with BCC both sending and receiving email is that the TO field is always filled with some address, sometimes a dummy address (such as the sender's). If the "only Bcc recipients" requirement is in fact strictly the case, then most instances of using BCC that I've seen would not trigger the bug.
This just underscores how describing bugs needs to be done with precision.
They are just following that age old pattern endemic to all professions which can be summed up in unvarnished form as "anything I don't understand must be trivial".
Usually, when high energy physicists try to do optical measurements, it ends with erroneous results.
So doesn't this ruling mean that basically all movies & TV shows out of Hollywood are now copyright free?
The ONLY 9V batteries for use in unheated applications like parking meters are Li ion 9V batteries. Alkaline & carbon zinc don't work in winter. Same with 1.5V D, C, AA & AAA applications.