Re: Plasma 5 on KDE anyone?
> And you also do not have a choice in whether you want to use it or not
Yes you do. The menu includes a switch between tiled and classic. It's demonstrated in the Engadget video.
45 posts • joined 17 Jul 2012
> Do you really think reporting spam has any effect?
It does actually.
Last year I encountered a UI bug in the Yahoo Mail android app that jammed the spam button and accidentally marked about 100 emails in my inbox as spam.
I quickly moved it back to my inbox, but Yahoo had already updated its rules and for the next few days legitimate email was ending up in my spam folder.
When I noticed, I fixed it by doing the reverse, moved it all back into spam again then moved it out by clicking Not Spam.
I picked Ndivia card in my latest small form factor because
- higher-bank-per-buck than amd on midrange (gtx970)
- considerably lower power consumption
- my previous amd build (hd6670) has been stuck on AMD April '14 drivers, the last not to screw up DVI->HDMI connections (despite repeatedly sending in bug reports)
Article misses that Malibu have also asked court to ingore defense's expert from explaining Wi-Fi Hacking - because you know, pesky reality gets in the way of their prosecution argument.
As for piracy and theft, US Supreme have already banned their use in Hotfile's ongoing case, so there might be a precedent to argue there.
So aggrieved backers who wanted to play offline are now spending lots of time -online- trolling and camping new players who've bought it in full awareness that it's online only?
Re: whining over 40 bucks/pounds - presumably the grumpiest kickstarters donated MORE THAN 40 for high tier rewards, probably also shelled out on one of those fancy brightly lit 160-200 hotas joysticks that they'll have no other use for, perhaps upgraded their gaming rig, and failed to realise that Kickstarter is a betting website.
I'm happily playing knowing that the game I helped Kickstart is the vision of its creator.
We've got hackers that can make USB cables into keyloggers, and pwn millions of phones via binary SMS, I'm sure the hacking community will come up with a dummy local server.
More optimistically I predict that 6 months after release, after universe bugs and so on have been ironed out, Frontier themselves will offer some kind of offline server or data.
I think they admitted that it could go offline while recently placating fears of servers being turned off at some future point, apparently -then- everyone gets a snapshot of the universe.
After AC mentioned Kindle's Whispernet, the Apple soft-sim thing does sound like a potential for consumer-friendlyness.
Whispernet-style global roaming access to say iTunes, iCloud services and a handful of whitelisted email and social media, perhaps included in the cost of an iTunes/iCloud subscription, could make the iPad an ideal traveller's companion.
Probably also be easier for Apple to deactivate stolen devices anywhere in the world.
Bit late I'd say, Apple should've done this while it had more control of the market, then relinquished after strong Chinese more consumer-friendly arose, this just smacks of desperation.
Google doesn't need lock-in, as people are flocking their way, and they can use Apple's new handcuffs as an additional selling point.
Probably the screen was chipped or cracked invisibly from an earlier severe knock/drop, and the soft fall just happened to be the straw that broke it's already microfractured back.
Saying that I have seen a few reports of this happening particularly to Z2 in xda-forums, like one that just spontaneously shattered while sitting flat on a shelf.
If you exclude 4.4 it's three-quarters, but if you correctly exclude both 4.3 & 4.4, it's two-thirds.
Mind you, I'd be interested in whether Google plans to release a browser fix for 2.3 upwards (98.7%) via it's Google Play Services versions-are-irrelevant system updater launched late last year.
"If you did use VPN to do all those like you said, you've violated most of those services' T&Cs and could in theory, get yourself banned."
Nothing in the Virgin T&Cs or Acceptable Use and traffic management policies -that I can see- forbidding VPN. You agree that they may shape/throttle traffic, but nothing states you can't use VPN for all your traffic.
Especially good idea to use VPNs the entire time when Virgin openly state in their T&Cs that they read your emails and internet comms:
" h. With your permission, we may monitor email and internet communications, including without limitation, any content or material transmitted over the services.
i. We also reserve the right to monitor and control data volume and/or types of traffic transmitted via the services."
All these definitions and debates are focusing on post-hoc artistic speculation and uniqueness / recreatability tests - that's an is it art question not a who does the picture belong to.
Previously these uniqueness / artness arguments are only really debated in rip-offs, derivative works cases (as in the london buses over westminster).
If copyright is automatic upon creating the image, then the person who can prove earliest provenance, and perhaps access to higher-quality/uncropped originals/raws, or documentary evidence, has the strong case. Simple as.
How copyrighted is CCTV footage?
How copyrighted are (good?) paintings by young children with artist had a low IQ or couldn't appreciate copyright law?
How about famous dead artists who couldn't appreciate copyright law because it didn't exist then?
This is the most popular response I get from people I know. They don't want scare stories, and can't be bothered with changing passwords for something they don't care enough about.
What we need is more actual anecdotes involving normal boring people ("celebs phone hacking, well they're asking for it, doesn't affect me")
Browser settings: Advanced: Set Search Engine. Done.
Was that hard?
But saying that, after a factory reset, I do usually have to reverse EVERY SINGLE Google suggested setting though.
i.e. default homepage, remember passwords, remember form data*, form autofill*, user location, do not track
*yes that's 2 settings
Still lots of fear about this - you don't need to be on Android 4.3 to be safe:
- If you only install from the official Google Play Store, you're fine - Google can scan their store server-side.
- If you don't install any apps, you're fine.
- Stay clear from Allow Install from Unknown Sources, which by default isn't enabled anyway.
- Vulnerability that trojans are installing via is a phone-side weakness, which is only a problem if the app source you're using (pirate app store, spam email or mms containing installer) isn't vetting the apps before they reach your phone.
Re: stuck on Gingerbread are budget 512mb ram and/or 320x240 screens, they just don't have the grunt needed for the newer Android releases.
Lowest spec owned by my family members is a Galaxy Ace 2 and that's on an official Jellybean 4.1.2 now.
My almost 2 year old midrange Galaxy Nexus is running 4.3 like a pro.
Google Play, Amazon, et al can scan their stores with updated verification.
The flaw is in the phone's cert verification, but Google Play, Amazon etc can update their server-side verification to detect any dodgy packages.
From what I understand of this particular exploit, it's detectable now that it's understood.
Cyanogenmod users will be happy to know it looks like they're busily releasing new CM7 thru CM10's.
Since most Android phones are linked up directly via credit card and account to gmail accounts, might just be a punters being a magnitude more password hygenic (cash and phone pwnership) vs Y! + MSN accounts which often are used just for mail, or even simply low grade instant messenger accounts.
Ubuntu Phone stayed on my Nexus for almost an hour, I wanted to feel it running on my phone even though I was well-aware it was going to be mostly mockup, similar to what was demoed at CES last month.
On a slightly related note, there was a nice analysis and comparison of upcoming phone OS contenders last week, covering the progress, teams, approaches, and industry support and tips for success for Ubuntu Phone, Tizen, Sailfish OS, Firefox OS, BB10
"pose an unacceptable risk to the ability of the UK to safeguard national security" and "disclosure of this could be used to avoid detection".
So that's 1.8 bil on a system that once finished, relies on security through obscurity, and is expected to have known exploits and be possible to avoid.
If all the texts count as publication, there's no such thing as phone hacking (text snooping) any more, and all those who had their phones hacked should be jolly well happy with this judge.
OTOH, the press should start doing more phone hacking and exposing now - probably the only thing keeping t.h.e.m. straight, when the laws are so ripe for abuse^M^M^M^M^M^M^M^M^M.
Biting the hand that feeds IT © 1998–2019