Do you develop on GitHub? You can keep using GitHub but automatically sync your GitHub releases to SourceForge quickly and easily with this tool so your projects have a backup location, and get your project in front of SourceForge's nearly 20 million monthly users. It takes less than a minute. Get new users downloading your project releases today!
I have one and it is excellent. Of course this being/. the previous statement will get me labeled a shill.
I can't understand the hate for something that most of you haven't even tried.
I have a Nokia Lumia 900 sitting right in front of me that I use as my main phone so can you please let me know how the UI is clunky, unusable and inflexible because I use it all the time and simply don't see it.
Posted
by
timothy
from the and-they-keep-stealing-the-covers dept.
davide marney writes "What do 1-800-Contacts, Adidas, Americans for Tax Reform, Comcast, the Country Music Association, Estee Lauder, Ford, Nike and Xerox all have in common? According to OpenCongress.org, they all have specifically endorsed H.R. 3261, the Stop Online Piracy Act. A total of 158 corporations have signed up in favor of the bill, and only 87 against. $21 Million has been donated to Congressmen who favor the bill, but only $5 Million to those against. Thanks to OpenCongress for these insights. This goes a long way towards explaining why this bill has so much traction, despite all its negative publicity."
Posted
by
Soulskill
from the can-we-try-this-at-airports dept.
mikejuk writes "Kerckhoffs' Principle suggests that there is no security by obscurity — but perhaps there is. A recent paper by Dusko Pavlovic suggests that security is a game of incomplete information and the more you can do to keep your opponent in the dark, the better. In addition to considering the attacker's computing power limits, he also thinks it's worth considering limits on their logic or programming capabilities (PDF). He recommends obscurity plus a little reactive security in response to an attacker probing the system. In this case, instead of having to protect against every possible attack vector, you can just defend against the attack that has been or is about to be launched."