Comment Re:I have my own promise (Score 1) 574
Hell, I might even just write in Elizabeth Warren.
Bernie Sanders is just as good, and actually running.
Hell, I might even just write in Elizabeth Warren.
Bernie Sanders is just as good, and actually running.
If I have to be subjected to ads, I want them to be irrelevant. I'd rather be bored than tempted to spend money.
Of course, in reality I just avoid ads altogether (including rejecting services that have them, such as cable TV).
Possibly, but the Japanese government were caught out in a cover up on this disaster from the beginning. Are they still covering up? Probably not, but when you can't trust the government, why would you risk it?
RAID10 for nearline storage ?
More research required, methinks.
How how about the Fukushima bottled water company products as well?
No, because bottled water is mind-bogglingly wasteful. I avoid drinking it whether it's radioactive or not!
Also, either the produce is safe, or it isn't. If it's safe, it's irrelevant that it came from Fukushima.
This. A thousands times this. Should be modded to positive infinity.
Also, a "linux geek" would have already have taken dm-crypt as an alternative, or performed the instructions in some Full Disk Encryption Howto.
Isn't it built into the installer nowadays? I installed Debian recently and it offered to encrypt my system, but maybe it skipped the partition that holds
We know that the developers were pretty sure that the last [real] version [i.e., 7.1a] of TrueCrypt was still secure.
How do you get shell access on your average Mac without physical access? SSH isn't enabled by default as has been pointed out. In fact, it's been a real PITA to get the versions of OS X I've configured to play nice on the network for the command line. I doubt one user in a thousand has done it -- slashdot mac users not being significantly representative of the average mac users, of course. My macs have SSH available, but the port isn't open to the Intertubes outside of my LAN, so it doesn't concern me very much.
So this essentially resolves to a "you have to be there" exploit.
Exactly so.
Clearly, that's not what I said.
Random data point == random data point
not
Random data point == confirmation of "there's no problem" stance
Try for comprehension next time. You'd be amazed what you can learn if you actually, you know, understand what you read.
Bees are all over the place at my home (basically at the center of a small town in rural Montana.) We have quite a few planters full of flowers on our largish deck (about 1000' sq), and it is not uncommon to go out there and see a very large number of bees going about their business. They are nearly zero threat. Well, unless you sit on one.
There are no obvious hives anywhere nearby, and they seem to come and go from all points of the compass.
Sortof-kinda related, there are local honey merchants, and the honey is just lovely.
Think of the football player from this planet! They would be about 3 feet high and enormously strong
Yeah, but if it did that to them, it'd do the same thing to the cheerleaders, then there would be no reason to watch the game -- unless you have a gnome fetish.
Seems like it is: "the attacker already has to have local access"
That's what I was working off of, anyway.
Network-imposed exploits are something else entirely.
Furthermore, local access pretty much is the end of the road anyway. Boot from the right CD with a custom filesystem that ignores HD filesystem permissions and yet allows you to set them any way you want, system is now wide open. Replace a few choice commands that you know are going to run, and bang, fully compromised. And that's just one of the many easy ways in to access as the system stands. You can also copy off the entire HD, or for that matter, erase it. Or both. You can compromise a command for a way in, copy an otherwise encrypted volume and walk off with it, break the encryption at your leisure, then use the previously installed compromise to get in and cause mayhem.
If you don't have physical security and there is any kind of local threat of compromise, you could become toast at any time. These kinds of "threats" are insignificant in the larger scheme of things. If you need local security, the only sufficient mechanism is to physically deny access to the computer.
6 Curses = 1 Hexahex