Comment Egg Freckles (Score 1) 279
Remember the Newton? Yeah, even Apple's own tablets sucked.
IfYDGI: http://cache.gizmodo.com/assets/resources/2008/04/eggfreckles.jpg
Remember the Newton? Yeah, even Apple's own tablets sucked.
IfYDGI: http://cache.gizmodo.com/assets/resources/2008/04/eggfreckles.jpg
Sorry, your ID must be 1,2,or 6 digits for me to give a fsck what you say. There are approximately 99,899 kooks on
IF you have a 7+ digit ID, get off my lawn.
apparently it is supposed to detect iLife/iWork when you sign into the App Store, and add them to your purchase history.
Other sources say you only get credit if you enter the same Apple ID during the out-of-box setup.
Those premium options are for the people who put stuff on download.com. In other words, pay CNet more so they don't stick their crap on your product.
But most "content providers" will probably be happy to let CNet wrap their installer, because it gives them reports on who actually installed the download, what else they have installed from download.com, and who knows what else. I'm surprised CNet isn't charging FOR the wrapper, given the amount of 'demographics' it could weasel out of end users' systems.
Don't be so sure that isn't coming. Apple is planning to do that for music with iTunes Match. Why not apps too? FWIW, if you bought a boxed copy of iLife '11, or it was included on a new Mac, the App Store will let you download it for free.
Not reliable ones. The only DRM/anti-tamper that can't be short-circuited in code is an encryption key. Put the key in a secure chip and make it really, really hard to get to the key from outside the secure hardware. And if you are willing to accept the karma of bricking devices, zeroize the key when tampering is detected.
Using physical characteristics of flash to generate a key is a bad idea. First, you can't quickly destroy the key to prevent tampering. If the key can be extracted from the hardware, it can be emulated. Second, flash cells wear out and their characteristics are going to change, meaning your key is going to change. Third, you might find supposedly random characteristics are rather deterministic by manufacturer, chip type, and production run, reducing your key space significantly.
All the legacy crap in BIOS has nothing to do with it. Most servers have the BIOS tuned to that particular motherboard anyway, so it doesn't spend time looking for crap that isn't there. That's where option ROMs and embedded stuff on controllers come into play.
EFI isn't much better. Have you ever seen how long it takes multi-brick SGI stuff to boot? Especially when you need it back up _now_?
But I do want that going off in a phone thief's trousers!
Can we get the "iED" option added to Find My iPhone?
(FYI: airbag cartridges are an "are you fscking kidding me" item for carry-on or checked baggage.)
CAPTCHA: blister. Yeah, I bet it would.
Which is why (if you RTFA) you'll see the law does not ban student-teacher relationships on social networks, but ensures they can be supervised.
A teacher can't personally friend students, but a teacher can create a Facebook group for the class and invite the students, just as long as the school administration and parents are also allowed to join.
they DO want to do something like a trusted citizen program but you have to opt in.
If you're in it, you're pre-screened and get on the plane quicker. If you're not in it, nothing changes, you go through the same thing you do now.
but forget about the TSA... Presumed guilty is the attitude of the credit agencies.
Try getting a good rate on a car loan when your last one has been paid off for 5 years, you rent your home, and you pay for everything with cash or debit card.
It doesn't matter if your income shows you can easily afford it... (and the lending bank KNOWS this because you have your checking, savings, and credit card with them!)
"My GF got pissed at Comcast because when she decided she didn't need both a landline and a cell (she's on SS and rather poor), the cable price didn't go down so she just dropped Comcast"
Umm...what?
Sounds like she had the triple-play where you get TV, net, and phone for a package price... Something like $50 or $99 a month for the first year.
There are no discounts from a package price. It's a good deal even if you don't use all of it, because it is still cheaper than any two of the three services at the regular price.
If you're paying the regular monthly price for Comcast, the price does indeed go down when you drop services.
Here we go again... if a forensic image can be taken of a supposedly 'secure' drive, you're doing it wrong.
*GOOD* disk encryption will do one or more of:
1) Store the keys in an tamper-resistant system (like a TPM, the drive electronics, or both)
2) zeroize if a brute-force attempt is made or a duress code is entered.
3) provide plausible deniability, such as with Truecrypt.
Depending on how you look at it, either/or is the better option.
Option 1 makes imaging the drive useless, especially if the key is in the drive. Simply trying to read the encrypted drive might cause it to zeroize, depending on how the drive responds to forensics. A drive that self-destructed if it detected an imaging attempt while in the secure state would mean any destruction of evidence was the fault of LE and not the accused.
Duress codes are tricky business. On one hand the owner of the drive KNOWS the data is gone. On the other hand, if LE can prove you erased it, you may be charged with obstruction. Depending on what you are up against, that might be better. IMHO it is better if the drive records it was erased. If the cops were to try and plant anything, you could easily prove it was put there after you erased the drive.
plausible deniability, is also a slippery slope. If LE starts to believe every drive that appears clean is hiding something, people who decrypt their drives for the police (because they really do have nothing to hide) will still be treated like criminals. People might stop using encryption if cops and judges start to believe encryption=wrongdoing.
obligatory, overused misquote. Die in a fire.
Well, IMHO, the integral reflector and mount is a pretty cool, inexpensive idea.
If we need some kind of darknet, we don't need to build a mesh network to get it. We can just run some sort of VPN tunnel over existing broadband. Hell, we've already got TOR.
This kind of thing is for where there is no infrastructure.
What would you rather do: tunnel your stuff over fast, reliable broadband, where no one notices (and can't read it if they can, it's encrypted) or stick a BFD on your roof that everyone can see and eavesdrop on. (You'd probably run it in the clear... WPA doesn't support Ad-Hoc, and point-to-point IPSec links kill performance)
YHT. YHL. HAND.
Machines have less problems. I'd like to be a machine. -- Andy Warhol