"Surfers visiting the Myspace.com home page..."
All five of them must have been pissed!
90 posts • joined 22 Jul 2010
All five of them must have been pissed!
So, by your definition, an "accountable" company would ensure that the rioters were never brought to justice. God, I'd hate to live in the world you live in.
Different commands mapped to different keyboard combinations is confusing?
There, fixed that for you.
Seriously, stop living in the past. If you have an ax to grind with Sony, take it elsewhere. We aren't interested in your pity-party.
None of these things are analogous to what Google have created.
No problem. Agree to disagree?
I'd love to see your first crack at any of them.
Yeah, just like MySpace.
So you wouldn't count any of the products here as sustainable?: http://www.google.com/intl/en/about/products/
Twits Swiping Anything
Curse you, Excel!
Visa and Mastercard also have the right to deny their services to whoever, whenever. Free speech is nice and all, but I can't break into your house, use your laptop to update my blog, and call it "free speech".
That's strange. Are you using a computer shared with multiple people? At least at institutions, when someone logs in, their profile is loaded and configured when they log on. Maybe that's what's happening; Office sees a clean slate when you log on so it thinks that it has to configure itself.
With all the news outlets referring to them as "the group", you can imagine why I am skeptical that that is true. Also, that was not posted for your benefit. More for the benefit of those who might not have come to that conclusion on their own.
I'm sure they researched what the command actually does before blindly trusting it, as opposed to:
Fed 1: How do we disable the botnet on the infected PCs?
Fed 2: Well, we could use this STOP command, but first we'd have to research what the comman..
Fed 1: NO! Do it, do it now!
I've been wanting to experiment with it, but was too lazy to compile it for Windows myself. Keep it up Microsoft!
If you accidentally purchase a book, you can undo the transaction, right from the Kindle. Extending the period of time for which this is possible would be a good idea. Of course, currently, the offer expires as soon as you navigate away from the Thank You page. So, they would have to at least let you read a few chapters before you decide that you don't like it enough to return it.
And now that it's summer we can expect the kiddies to have more fun more often.
Microsoft isn't the only company that makes servers.
Yes, they seem to have managed to click the right sequence of shinny buttons; you seem to hold that in high regard.
"...about ten times the price of the cheapest .com domain rates."
I completely agree with you, but think that you underestimate Apple's abilities; they were the original creators of the Wi-Fi Sync concept. However, a little known fact about Apple is that they've also created every other thing that exists now and that ever will exist.
You can't say for sure that they haven't done anything. A few partner sites have been hacked... this doesn't mean that every one of them is vulnerable. For all we know, Sony is busting their ass trying to inspect all public facing sites they have. Obviously, they have A LOT to check, so it's no surprise that a dedicated group keeps poking holes in the ones they haven't gotten to yet.
Like DrXym said, they (LulzSec @ friends) are scraping the bottom of the barrel. They'll hunt for any minor leak they can for publicity. If you want something to lose sleep over, see the recent breach of RSA.
Seriously, people need to get some perspective.
While we know that new malware has the potential to get past AV software, there is no point in punting it completely; it can block most malware that already exists. It will not stop a dedicated attempt to break into your computer, but it can protect against moments when you let your guard down, accidentally click a link, etc.
You were only asked, not offering. I don't see anything about that.
"While there is no evidence at this time that credit card data was taken, the company is committed to helping its customers protect their personal data and will provide a complimentary offering to assist users in enrolling in identity theft protection services and/or similar programs."
That sounds like compensation to me.
Additionally, for the handful of people who've complained about their credit card being swiped: You are few compared to the other MILLIONS who haven't complained. Seriously, it is expected that out of a few dozen million people (assuming that 70 mil. don't all have cards registered, of course), some of them will have had their credit card numbers swiped in another unrelated and coincidental exposure. That you just so happened to realize it now is the result of being more alert after hearing the news of the PSN network breach.
The credit card data was hashed. Unless Sony failed to properly salt their hashes, then the criminals behind this will have a hell of a time generating millions of rainbow tables for each card hash.
Whispersync can be accessed through WiFi too.
Your argument applied to a different problem:
Did you know that new mutations of bacteria and viruses are discovered constantly? Eventually medicine as we know it will be useless. Therefore, we should stop using medicine and find other ways of protecting ourselves. I propose living in a bubble.
just because AV doesn't catch everything doesn't mean you should shun it. Yes, I realise that Linux malware is rare, which is, I suppose, how you justify your not using AV. But for the 87% of all computer users whose computers run Windows, it is important. Eight years of experience programming (I assume that counts as using a computer properly, but you appear to be the expert on that), and AV has saved my ass several times.
The best example of this I can give you: Firefox allows prefetching of search results, which is on by default. I once googled for something inconspicuous, and my firewall/AV combo caught an intrusion attempt. As it turned out, Firefox prefetched the first result which just so happened to be malicious. The website attempted to attack my computer. No regular monitoring of executables or open connections could have caught that, my friend.
And, FYI: I've seen AV catch rootkits before. Just because it doesn't always doesn't mean you shouldn't try.
because AV doesn't catch *everything*, you are going to turn it off so it might as well not catch *anything*? That is exactly the kind of attitude that will get your computer pwned. New exploits come out for modern, "hardened" browsers every week. Some are disclosed, and some aren't.
when you consider that you could get *two* conventionally powered cars (sedan, of course) for the cost of this one. Plus, power isn't free (nor is most of it "clean", anyway). Also, lithium doesn't grow on trees.
I always thought that lithium was a renewable resource...
It looks like a fun job, without question.
that these guys are awesome. Can't wait for the next season.
how dare they make sure your console is up to date!
while software has been upgraded over the years, humans haven't been. We still make mistakes, regardless of how many safeguards are put in place.
At least according to this Google search:
"...I want to focus less on products and more on science..."
You mean the science of getting the largest Apple icon possible on a product isn't what you hoped for?
just know that mothers around the world are being sued for cutting the crust off of sandwiches for their children!
"I think it's best to leave it up to the experts like yourself. I'll check back for a response, I need to get back to developing the boot loader and real time task scheduler for a new linux device I'm working on."
Although I agree with you, calm down and stop showing off.
"Er, he did not allegedly 'steal' classified documents, the US Government still has them, he copied them."
Duh. -1 for the technicality. If that's the game you want to play, then should we also not go after people who steal credit card numbers with skimmers? After all, the consumer still has their card. The thieves just got a copy of the number.
...it's not made by Apple.
"There is no such thing as 'intellectual property'."
Maybe not to you, but there are businesses and corporations that rely on trade secrets ("secret recipes", if you will) to differentiate them from the other ho-hum competitors. You can apply this to anything, not just code. If everyone had access to every secret, there would be no competition. Everyone would churn out identical products, and no one company could actually succeed.
"What's insane is Microsoft continuing to sell an OS where it's easy and normal to circumvent privilege separation..."
What that hell is "privilege separation"?
"...users putting up with all this..."
Putting up with what, exactly? I noticed that you've already complained about Microsoft. Let me say this about Windows, and any other OS: most problems come from the interactions between third-party (not always high quality) software and the OS itself, plus any other drivers, etc. Not every mistake that developers make can be pinned on Microsoft, but, it's too easy for the consumer to do.
"Your Source Code is not special. If you can write a program to do something, so can I -- and I don't even need to see your Source Code, just what it does."
And why isn't it special? Maybe you can write the same program I can. But, how does that justify me giving you my source code when I did the work? That's like saying, "I could make $100 today, but you already did so you should give me yours."
"If you're too cowardly to show me your code..."
It's not cowardice. If developers want to run around and brag about their code, they will. They can make it open source. It's not cowardice to run a business. Microsoft wouldn't have made the money they did if they released their code into public domain. And, in you case you haven't figured this out, businesses are supposed to make money.
"I, on the other hand, am proud to nail my colours to the mast. I wrote this program; it is the best of its kind, and I will even show you exactly why nothing anyone else does is ever going to come close."
That's a poetic note. Well, I, and hundreds of others, will take *your* code and make it our own. Then, we will sell it and put you out of business. 100 vs. 1.
"Keeping secrets from me about products I am expected to use is neither tenable nor justifiable..."
Ok, then tell your car company that they should give you wiring diagrams, and blueprints, and all their research that went into making *their* product the next time you buy a car. Same goes with everything else you own.
"It is also unsustainable..."
This doesn't imply unjustifiable! Again, you are basing your argument on the fact that since programs can be reversed-engineered, you might as well just give up all your secrets anyway.
In conclusion, you sir are a nutter. I hope you do develop an ultra-efficient, state-of-the-art, "killer app". That way, the whole world can hold you to giving them the source code.
How is keeping intellectual property safe from competitors "...untenable, unjustifiable and unsustainable..."?
All businesses that develop software (with the exception of open-source, of course) don't want their code getting out. They spent tons of money and time developing it, and they have the nerve to not want other people (competitors, perhaps?) from getting it? Imagine that! Source code leaks are not a good thing.
If you are so hell-bent on open-source, then try Sourceforge.
Biting the hand that feeds IT © 1998–2017