Re: How does this change ANYTHING?
> PS Why are we allowed to play with < UL > but not < OL >?
One does not simply play with < OL >.
918 posts • joined 7 May 2012
> PS Why are we allowed to play with < UL > but not < OL >?
One does not simply play with < OL >.
I have a scheme where I work out the letter number (a is 1, b is 2, etc) and add 64 to it. I then convert it to binary. Foolproof!
Already done. If the US government can't keep 20 million personnel records safe, why would I trust my ISP to?
.... because most of us smartphone users think that our batteries last too long.
I wish my company was that unsuccessful.
But it comes with a 3 month Now TV subscription. That's got to be worth at least 76K right there.
>Then drop time zones, and move to the 24-hour time format.
Seems like a lot of effort and you aren't even going to get it decimalised.
It is fine. It has sharp corners.
Even if I take them at their word, how it will or won't be used is a useless fact, because they can only promise what THEY will or won't do.
Good legislation is rather defined about what can or can't be done and whether some future activity will be ruled as legal or illegal under the act.
Why is this government doing its best to pretend they don't understand what separation of powers is for and why it is a good idea?
>I set it to just notify. If I'm tethered to my 4G phone, I don't exactly appreciate the laptop deciding it'll take my 1GB quota all to itself just for Windows update.
That is probably the most useful enhancement in Windows 8. If only they kept the Windows 7 shell.
I, for one, welcome our new eight legged banana munching overlords.
At least you will know when you have your finished.
and I never sign into my bank accounts when there is nearby pita bread. That is just asking for trouble.
I did not suggest that they would be exposed through their own form. Your privacy can be impacted by someone else's selfie uploaded to youchattwit. I don't understand why you would therefore suddenly believe that you can't be indirectly identified by a big data approach to this information.
Also, let us assume it is merely a cultural attaché. I would not be so quick to assume a big gap between business interests and government interests. Particularly in a one party state with largely nationalised industry. (Although for balance, the US has its own share of trying to sneak business protection rackets into various FTAs so to criticise that lack of separation is very much pots and kettles.)
It was. I see it as a gentle reminder to China that the US has the same info on them. Mutually assured destruction and all that, so play nice.
>useless for blackmail since Uncle Sam already knew
How does that argument even work. Say China identifies a US spy from this information.
They can now bring them in for a chat, show a picture of their daughter hopping out the school bus the previous day, then suggest the sort of information they want the said spy to report back to uncle Sam or, you know, sometimes horrible things happen.
>don't know how risky it is being logged into the register often
As long as your credentials are sent over https, it should be fine. Oh wait..
There is a relationship between code clarity and security. Case in point, Google GOTO fail bug, the one which borked SSL on osx or ios. Had the code been formatted correctly, it would have been very hard to miss that accidental GOTO fail line.
>But weird that Oz seemed to avoid worst of the GFC.
Only in the sense that we didn't have a recession and the economy actually grew during the quarter with the GFC.
The current government is right though. If only Rudd had spent less on stimulus and more on new NBN logos....
>At one time I worked out that it took $1m of stimulus to create each job.
Accepting your calculations at face value, I think there is an underlying assumption in your conclusion that you may want to consider.
How many billions was it worth to avoid a total collapse in jobs? Have you subtracted this from the cost of stimulus?
There is plenty of things you could hold up about the commodore as reasons for preferring something else. Understeer isn't one of them.
On an aside, the (allegedly) sentient beings setting fire to the joint here have passed laws to require ISPs to store all metadata for two years. Every website you visit, every email you send.
But don't worry, I'm sure that data will be perfectly safe from hackers.
The physics say that brown coal is about 3x more emissions intensive than black coal, and 25% of their power comes from a station that was ranked worst in the industrialised world (1.74 short ton/MWHr).
Transmission, charging and operating efficiencies of electric cars leave ICE efficiency for dead though.
I didn't down vote, but I will point out that coal != coal. And coal power generator != coal power generator. There are huge differences between black and brown coal and newer plants are much cleaner than older designs.
For example, your Nissan leaf plugged into a wall in Victoria (Australia) emits more than a Land Cruiser.
That is not to argue against progress as the balance can easily change once a few plants are decommissioned.
Commemorating a French military defeat? Hardly hens teeth.
I think we can agree with one voice that he is guilty. What kind of fool posts this sort of thing? My man, tell him that it had to be you and that you knew that they would send in the clowns. If not here then somewhere I guess. Sadly for him, the interwebs has memory.
/I shall now grab my coat as if we never said goodbye.
A directive by definition cannot be a runtime decision in a compiled language
>does this mean the world's population should line up to have their limbs amputated
Don't give them any ideas please.
>Stealing is permanently depriving someone of something.
Maybe they could really throw the book at him and label it copyright infringement?
>And people ask me why I won't use Windows anymore........
Because their beta testers in the bleeding edge stream of the unreleased version of their os had to download a full iso image rather than use windows update?
The price seems reasonable to me but the shipping cost is out of this world.
... And when caught the offending note would be read aloud for the convenience of the author and recipient.
>Do you understand that Facebook are in the pockets of NSA and GCHQ?
Let us take without any protest your assertion, and assume that they immediately give this public key to your favourite 3 letter acronym. Actually, let's make it worse, they put it on their homepage for world and sundry.
That does NOT help one iota in decrypting your message. That is the whole point of asynchronous encryption.
If you want your bank's website public key, double click the padlock. That key does two things.
1. Lets them create a message that you can verify wasn't forged by a man in the middle, and
2. Let's you encrypt a message that only their private key can decrypt.
"Adequate" is inadequate (excuse the pun). It is a weasel word that makes it very easy for the customer to think that they have one policy but learn a hard lesson when they try to claim.
In principle, I agree with the insurer. Failure to take "adequate" precautions makes you a higher risk, and if that is not recognised against your policy cost then everyone else's must increase to socialise the loss caused by your lack of foresight.
But adequate must have provable definitions if you are going to deny claims based on it. If my car insurer stated that my car must be adequately maintained, a current certificate of registration proves that my car passed the required certifications. If they have other additional expectations, like 6 monthly services etc then they need to stipulate that explicitly.
Back to the case in point. If adequate means that patches should be applied within 30 days, what do they mean by that? Windows update? Sure. What about that old version of jre that is still needed to run that legacy system? What about that system that has been powered down for 6 months with its user on some type of extended leave? Is your policy torn up because they switched their computer back on and it was not updated for a few days? Is your router patched?
Most people don't want to accidentally leave their networks open to pwnage. For many, it is a case of being naive rather than reckless. Providing easy to digest guidelines for your customers had the double advantage of protecting them, making your offering more valuable in their eyes and by extension more profitable for you.
1. Suspected criminals; if they had been found guilty by a competent court then these logs would hardly be necessary.
2. Yes. Privacy of citizens should be the default position.
3. Microsoft Ireland is subject to EU laws. If Belgium fills out the right forms through established EU processes, they will get the data.
4. Even if held by an entity outside Europe, Interpol processes are available to them.
Why (should it be pointed out)?
How does one detect that a file is encrypted? It is just a sequence of 1's and 0's until an application decides how to process it. Detection online just moves the problem further down the stack. Take an xlsx file as an example. It is just a zip file holding a set of XML documents and other artifacts. What makes it valid? A valid to an online scanner? Is a valid zip file header enough? If so you can expect the encrypted xml document to be added to a valid zip file. It is a seriously hard problem to solve. Regular test restores to clean VMs are the best we have at the minute.
No you're not.
>What is Netflix ?
An ISP comparison website, kinda like speedtest.net
(From one of the 150 million people whose security Adobe compromised a few years back)
@Mozilla, keep their crap off my box.
Driving is more than yaw computations. Sorry, was that a packet of crisps that can be safely run over or a rock that must be avoided by an aggressive manoeuvre. No time to get a response from Watson in this crappy 4G zone.
It stands to reason that a mesh of autonomous cars can process more information and not do the stupid things is humanoids do from time to time. But! What would happen if you were overtaking this car at the moment it decided that the abovementioned crisp packet was to be aggressively avoided? This could easily create accident scenarios that are not so today.
No problems recording an HD stream for its security purposes, but as a doorbell I would much prefer a 1 second notification in poor WiFi range if it just meant a lower quality broadcast to my phone.
Once you perform the test the steam ceases to be random.
Many ps applications basically generate the appropriate cmdlet that achieves what you clicked. This lets you do it through the ui, then grab the script and do it in bulk.