Comment Re:Don't tell me police doesn't abuse their powers (Score 1) 368
Not necessarily. Some of that 59% (no idea how much) would naturally be the result of citizens behaving better for the camera and not escalating the situation.
Not necessarily. Some of that 59% (no idea how much) would naturally be the result of citizens behaving better for the camera and not escalating the situation.
Look on the right hand side. There's an awful lot of those 'exceptions'. Way too many. And way too many are later found blameless and put right back out there to do it again.
That needs to stop. It's not all cops, but it's enough of them that it's eroding the public trust. That, in turn will cause more violence against cops as regular citizens begin to fear for their own safety when they encounter police. With all those 'exceptions', is it REALLY unbelievable if a citizen attacks a cop and says he did it because he was in fear of his life? If the cops really want to be safer out there, they need to make certain that the idea of a cop attacking a citizen unprovoked or way out of proportion to provocation is laughable.
On the technical side, they have the ability to control what load a single customer can put on the shared bandwidth. They tell the cable modem and router behind it where the gateway is. They can share the last mile by each provider renting a slice of the (virtual) connection between CO and customer and can recognize their customers by MAC address to give them the correct GW.
The rest is a matter of business. The local government could buy them out. They could be legally split like AT&T. They could simply be informed that they are now in the wholesale last mile bandwidth business if they want to stay in town at all. Note that at that point if they decide they'd rather leave they would end up abandoning the cables amps, etc anyway since it would cost more than it's worth to save it. The town would just need to re-construct the head ends.
There's a shade of meaning there. Compaq wasn't a bad company (good companies can get into financial trouble too).
Just leave a mouse out of the package laying around in a targeted office. Eventually, someone will need or want the mouse and plug it in for you.
It's less sure and could take a while compared to plugging it in yourself, but it makes the person who gets infected want to keep quiet and even if they figure out where the mouse came from (unlikely), you have plausible deniability.
It would be hard to prove that the nice foil backed wallpaper was a blocking tactic rather than a perfectly legal aesthetic decision.
I believe OP was talking about passive shielding which would knock out all of those as well as WiFi and cellular.
oh, does bridging work finally? I spent well over an hour with nmcli docs and on Google trying to setup bridges for each vlan I was using on an el7 machine and got nowhere close to working. Spent 5 min setting up redhat ifcfg- files and was done after yum uninstalling nm. It says that nmcli got some love in 1.0, and boy that's a good thing.
Twilight on Android.
Also, points to Soulskill for posting this after midnight.
UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker