Re: She could always have taken the offending banana and throne it in the freezer....
I, for one, welcome our new eight legged banana munching overlords.
955 posts • joined 7 May 2012
I, for one, welcome our new eight legged banana munching overlords.
At least you will know when you have your finished.
and I never sign into my bank accounts when there is nearby pita bread. That is just asking for trouble.
I did not suggest that they would be exposed through their own form. Your privacy can be impacted by someone else's selfie uploaded to youchattwit. I don't understand why you would therefore suddenly believe that you can't be indirectly identified by a big data approach to this information.
Also, let us assume it is merely a cultural attaché. I would not be so quick to assume a big gap between business interests and government interests. Particularly in a one party state with largely nationalised industry. (Although for balance, the US has its own share of trying to sneak business protection rackets into various FTAs so to criticise that lack of separation is very much pots and kettles.)
It was. I see it as a gentle reminder to China that the US has the same info on them. Mutually assured destruction and all that, so play nice.
>useless for blackmail since Uncle Sam already knew
How does that argument even work. Say China identifies a US spy from this information.
They can now bring them in for a chat, show a picture of their daughter hopping out the school bus the previous day, then suggest the sort of information they want the said spy to report back to uncle Sam or, you know, sometimes horrible things happen.
>don't know how risky it is being logged into the register often
As long as your credentials are sent over https, it should be fine. Oh wait..
There is a relationship between code clarity and security. Case in point, Google GOTO fail bug, the one which borked SSL on osx or ios. Had the code been formatted correctly, it would have been very hard to miss that accidental GOTO fail line.
>But weird that Oz seemed to avoid worst of the GFC.
Only in the sense that we didn't have a recession and the economy actually grew during the quarter with the GFC.
The current government is right though. If only Rudd had spent less on stimulus and more on new NBN logos....
>At one time I worked out that it took $1m of stimulus to create each job.
Accepting your calculations at face value, I think there is an underlying assumption in your conclusion that you may want to consider.
How many billions was it worth to avoid a total collapse in jobs? Have you subtracted this from the cost of stimulus?
There is plenty of things you could hold up about the commodore as reasons for preferring something else. Understeer isn't one of them.
On an aside, the (allegedly) sentient beings setting fire to the joint here have passed laws to require ISPs to store all metadata for two years. Every website you visit, every email you send.
But don't worry, I'm sure that data will be perfectly safe from hackers.
The physics say that brown coal is about 3x more emissions intensive than black coal, and 25% of their power comes from a station that was ranked worst in the industrialised world (1.74 short ton/MWHr).
Transmission, charging and operating efficiencies of electric cars leave ICE efficiency for dead though.
I didn't down vote, but I will point out that coal != coal. And coal power generator != coal power generator. There are huge differences between black and brown coal and newer plants are much cleaner than older designs.
For example, your Nissan leaf plugged into a wall in Victoria (Australia) emits more than a Land Cruiser.
That is not to argue against progress as the balance can easily change once a few plants are decommissioned.
Commemorating a French military defeat? Hardly hens teeth.
I think we can agree with one voice that he is guilty. What kind of fool posts this sort of thing? My man, tell him that it had to be you and that you knew that they would send in the clowns. If not here then somewhere I guess. Sadly for him, the interwebs has memory.
/I shall now grab my coat as if we never said goodbye.
A directive by definition cannot be a runtime decision in a compiled language
>does this mean the world's population should line up to have their limbs amputated
Don't give them any ideas please.
>Stealing is permanently depriving someone of something.
Maybe they could really throw the book at him and label it copyright infringement?
>And people ask me why I won't use Windows anymore........
Because their beta testers in the bleeding edge stream of the unreleased version of their os had to download a full iso image rather than use windows update?
The price seems reasonable to me but the shipping cost is out of this world.
... And when caught the offending note would be read aloud for the convenience of the author and recipient.
>Do you understand that Facebook are in the pockets of NSA and GCHQ?
Let us take without any protest your assertion, and assume that they immediately give this public key to your favourite 3 letter acronym. Actually, let's make it worse, they put it on their homepage for world and sundry.
That does NOT help one iota in decrypting your message. That is the whole point of asynchronous encryption.
If you want your bank's website public key, double click the padlock. That key does two things.
1. Lets them create a message that you can verify wasn't forged by a man in the middle, and
2. Let's you encrypt a message that only their private key can decrypt.
"Adequate" is inadequate (excuse the pun). It is a weasel word that makes it very easy for the customer to think that they have one policy but learn a hard lesson when they try to claim.
In principle, I agree with the insurer. Failure to take "adequate" precautions makes you a higher risk, and if that is not recognised against your policy cost then everyone else's must increase to socialise the loss caused by your lack of foresight.
But adequate must have provable definitions if you are going to deny claims based on it. If my car insurer stated that my car must be adequately maintained, a current certificate of registration proves that my car passed the required certifications. If they have other additional expectations, like 6 monthly services etc then they need to stipulate that explicitly.
Back to the case in point. If adequate means that patches should be applied within 30 days, what do they mean by that? Windows update? Sure. What about that old version of jre that is still needed to run that legacy system? What about that system that has been powered down for 6 months with its user on some type of extended leave? Is your policy torn up because they switched their computer back on and it was not updated for a few days? Is your router patched?
Most people don't want to accidentally leave their networks open to pwnage. For many, it is a case of being naive rather than reckless. Providing easy to digest guidelines for your customers had the double advantage of protecting them, making your offering more valuable in their eyes and by extension more profitable for you.
1. Suspected criminals; if they had been found guilty by a competent court then these logs would hardly be necessary.
2. Yes. Privacy of citizens should be the default position.
3. Microsoft Ireland is subject to EU laws. If Belgium fills out the right forms through established EU processes, they will get the data.
4. Even if held by an entity outside Europe, Interpol processes are available to them.
Why (should it be pointed out)?
How does one detect that a file is encrypted? It is just a sequence of 1's and 0's until an application decides how to process it. Detection online just moves the problem further down the stack. Take an xlsx file as an example. It is just a zip file holding a set of XML documents and other artifacts. What makes it valid? A valid to an online scanner? Is a valid zip file header enough? If so you can expect the encrypted xml document to be added to a valid zip file. It is a seriously hard problem to solve. Regular test restores to clean VMs are the best we have at the minute.
No you're not.
>What is Netflix ?
An ISP comparison website, kinda like speedtest.net
(From one of the 150 million people whose security Adobe compromised a few years back)
@Mozilla, keep their crap off my box.
Driving is more than yaw computations. Sorry, was that a packet of crisps that can be safely run over or a rock that must be avoided by an aggressive manoeuvre. No time to get a response from Watson in this crappy 4G zone.
It stands to reason that a mesh of autonomous cars can process more information and not do the stupid things is humanoids do from time to time. But! What would happen if you were overtaking this car at the moment it decided that the abovementioned crisp packet was to be aggressively avoided? This could easily create accident scenarios that are not so today.
No problems recording an HD stream for its security purposes, but as a doorbell I would much prefer a 1 second notification in poor WiFi range if it just meant a lower quality broadcast to my phone.
Once you perform the test the steam ceases to be random.
I would argue that your GPS coordinates can be easily spoofed by anyone who can type "fake GPS" into the play store search window and as such its effectiveness as a fraud detection is rather limited.
You have to look at the perspective troy would be coming from. When you witness large multinational companies accidentally letting 150 million accounts be breached, you have to recognise that step 0 for security is to not collect the private information that isn't necessary to fulfill the transaction. Or to put it another way, how much do you think the home addresses of papal customers would be worth to identity fraudsters?
Many ps applications basically generate the appropriate cmdlet that achieves what you clicked. This lets you do it through the ui, then grab the script and do it in bulk.
>Only time that happens in a batch file is if I try to get really fancy with a FOR command.
Or any other processing involving the system date; stuff like rename that zip file with the prefix 20150428 is a right PITA with batch files.
>Am I the only person in the world
who has both WiFi and Mobile Data turned *off* unless and until I want to use it?
Yep. It's how we know it's you wandering around.
I believe the correct unit of measure would be Olympic swimming pools.
Minimal access levels is a good idea because the attack surface is reduced and the bad things the malware can achieve is more limited. But I will point out that encrypting all the xlsx files under "My Documents" doesn't require any privileges beyond what such a user would have.
>I haven't heard ten centimeters referred to as "excessive" before, but I digress
From my understanding the force required follows an inverse cubed relationship. So it is 8 times less energy to pick 5cm or 64 times more energy than an inch.
I am sure that there is a good reason to elevate it so high, just curious.
If the goal is to reduce friction, 10cm seems a tad excessive. Surely it just needs to be not in physical contact with the track? Anyone know the reason?
I suspect nothing is wrong with such a tool per se. They would've got a warrant first, right guys?
Fixed within 90 days. What's the problem?
Identification and voting should not go through the same system. Also, you ideally need to share between identification systems whether a given voter has already cast a vote to prevent someone voting multiple times.
Also, ss numbers alone are probably insufficient for authentication because they are guessable.
Some back of the envelope calculations...
148 x 100W fluorescent lights would draw 14800.
Switching to LED would realistically drop them to 85W but let's pretend that the laboratory achieved lumens per watt could get us to 70W.
This would save 4440W.
If we assume an average draw of 850W per server, that is about the same power reduction as switching off 5.5 servers. In the scheme of things, that won't be a measurable blip on the building power usage.
The only way I can see the savings becoming significant is that LEDs are dimmer friendly, so you could far more easily control the lighting to follow you as you walk around the building and be at very minimal levels elsewhere.
Also, you may want to rethink your choice of PDF viewer now they bundle open candy malware.
This kids is why we need the interwebs. How else would I learn important tidbits like that?