Comment Didn't Judea Pearl solve this decades ago? (Score 1) 137
This excellent blog article describes a technique developed by Judea Pearl decades ago to do exactly this. Would be interested to understand how this is different/better.
This excellent blog article describes a technique developed by Judea Pearl decades ago to do exactly this. Would be interested to understand how this is different/better.
Flamebait? Idiot mods! I am serious! The only sarcasm is the very last sentence. The rest of it is what has been happening for over a year.
and what's the issue here? Trade secrets, private matters, and gossip.
Not only..: Leaked Emails Reveal MPAA Plans To Pay Elected Officials To Attack Google
Slashdot's editor team knows that the "audience" here hate Bennet Hasleton's continued long winded drivel, yet they keep posting his stuff regularly.
This yet another clear sign that Dice and Slashdot do not care about their "audience", continuing off from the Beta debacle.
Just keep ignoring your "audience" while expecting viewership to increase. Yeah, that will happen alright
A local business prof says this is a "desperate" move.
In my area, there is $50 a month for 30Mbps download, 5Mbps upload, unlimited cap.
See this plan
I had similar issues, though on a machine hosted outside my home network.
The solution was to implement SPF, pointing to the PTR of machine (i.e. what a reverse IP lookup will resolve to), and DKIM.
In your case, doing a PTR will be hard, since dynamic DHCP may change what the PTR is, but the rest does apply.
I wrote the following detailing what I did: Setting up SPF and DKIM on Postfix.
I had lots of mails bounce after Yahoo implemented DMARC.
However, with a bit of patience, I was able to implement DKIM and SPF for my domain, and now all the mails get delivered to Yahoo addresses.
I wrote about how ot configure SPF and DKIM in this article: Setting up SPF and DKIM for Postfix.
Things were easy until the mid to late 19th century. Anything could be produced in a carpenter, blacksmith or watchmaker's workshop. Lenses were ground, metals were machined,
Then in the early 20th century things started to get far more specialized. By the mid 20th century, we had the transistor then the integrated circuit.
Now, everthing from ubiquitous phones to home appliances to street lights have complicated integrated circuits, CPUs, RAM,
I wrote about it here : Information readability and longevity in the digital age.
The Quest for an explanation must continue.
Contrary to all the speculative guesses in the comments, the researchers do have a hypothesis for this.
From the linked PLOS article:
Unique among the senses, the olfactory system depends on stem cell turnover, and thus may serve as an indicator of deterioration in age-related regenerative capacity more broadly or as a marker of physiologic repair function
/bin/sh is linked to
/bin/bash and vulnerable
Not on Debian/Ubuntu. On those,
To test this, I created a small PHP script, as follows:
$ cat > x.php
<?php
system('echo hello there');
I run the php script, and do an strace following children:
$ strace -f -o output php x.php
In the output I find this:
28302 execve("/bin/sh", ["sh", "-c", "echo hello there"], [/* 24 vars */]) = 0
And here is what
$ ls -l
/bin/sh
lrwxrwxrwx 1 root root 4 Mar 29 2012/bin/sh -> dash
In August 2009, a boy was hit by lightning and later died in hospital. Witnesses said the sky was blue above them, and there was no thunder or rain.
Look, there is a bug, obviously, but to say that it is "remotely exploitable" is a half-truth, and that it is "on level with or worse than heartbleed" is nonsense.
There are a lot of things that need to "line up" in order for this to be remotely exploitable.
"The only way I can lose this election is if I'm caught in bed with a dead girl or a live boy." -- Louisiana governor Edwin Edwards