I'm not that concerned with Karma, I post when I think I have something to add
How does the equivalent of "mod parent up" add to the discussion? The parent is at +5, but I doubt people just blindly follow what some random person says it should be modded to.
Well it prevents multiple-vendor networks from combining logs from different vendors, but I bet all monitoring devices from a single vendor use the same hash.
I honestly wouldn't be surprised if it was just some standard hash (like SHA-1) with no salt or anything so that even multiple vendors' equipment would produce the same hash. People that collect personal data would go to extremes, even *gasp* using standards, to enable the data to be shared more widely.
(Not to be a pedant, but it's "pretense" by the way.)
Can you run DOS games on Windows 8 (genuinely don't know)?
You can still run DOS under a VM/hypervisor or setup a dual boot and run it directly on an x86 PC.
Note how the two aren't related. They are talking about running on Win8 directly, not through a VM and certainly not by rebooting into plain DOS and back into Win8 when they're done.
And although emulators are a hack, they're a successful one. We just have to hope that the emulator community keeps up its DRM-defeating record.
"DOSBox, an x86 emulator with DOS"
Seems like DOSBox falls under the "emulator" category...
A known exploitable scenario is when all of the following applies:
1. You're using Authlogic (a third party but popular authentication library).
2. You must know the session secret token.
http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/
Seems like you are mistaken. I believe they were saying that merely using Authlogic doesn't automatically make you vulnerable, but you need to be using it to be vulnerable.
After Goliath's defeat, giants ceased to command respect. - Freeman Dyson