MIT's strategy is very interesting. Several groups (like our team) have been forming their teams for weeks, but MIT appeared on the scene just today, and it's fascinating that they got a front-page Slashdot plug. I give them lots of credit for flooding the scene with mentions in such a short time. Whereas some teams give their winnings to charity (like ours), others entice balloon spotters with cash portions of the earnings, and MIT has decided to do a little of both.
DARPA is the sole decider of how difficult this competition will be. Will they place the balloons in dense urban areas, or will the launch them in small rural communities?
Best of luck to all the teams tomorrow, MIT included. I hope that the contest winner will write a paper describing their strategy, both in network-building and in launch-day data collection.
We don't correlate or combine your information from these logs with any other log data that Google might have about your use of other services, such as data from Web Search and data from advertising on the Google content network.
It looks like the standard account for fastmail.fm limits you to only 7 aliases. I use tuffmail which is a similar service but they give everyone with a paid account unlimited aliases. Another thing that looks worrisome with fastmail.fm is that there seem to be bandwidth and polling quotas.
LiveJasmin has had 3D cameras for a few months now. (http://www.livejasmin.com/listpage.php?tags=girl+3dcam&type=40) [NSFW]
I wouldn't necessarily call it default passwords. I believe I was one of the people victim to this. I have an asterisk PBX setup for my parents at their house so they could call me for free. One of the problems I think with asterisk is that the flag "allowguest" is set to true by default which means random computers on the internet can connect to your box and try to call out. (I also made the mistake of allowing the default dialplan to have a way to dial out on this computer). I noticed this a few weeks prior when bots had been randomly connecting to me and tried to place outgoing calls. I promptly found the 'feature' and turned it off on my computer and I was planning to do the same on my parents box. Unfortunately I forgot about doing it and about a week ago I noticed that I had a lot of calls had been placed to cell phones in the Philippines. It easily ate through the $60 I had in my prepaid account until I had realized what had happened.
These are the same people that probably sugar coat the truth and then eat it.
Just make sure it's not that peppermint-flavored dog poop.
This comment appears regularly on
"If you can reflash it" is also subjective: does that mean via a normal IDE/SATA interface, or does it extend to a direct JTAG connection, or do you have to desolder the ROM to flash it? There's a broad spectrum of functionality, but it seems most useful to use the term "brick" to refer to any device that seems to have no useful function under normal circumstances. My point is that it's open to interpretation, so don't be so picky.
With your bare hands?!?