I'm not that concerned with Karma, I post when I think I have something to add
How does the equivalent of "mod parent up" add to the discussion? The parent is at +5, but I doubt people just blindly follow what some random person says it should be modded to.
Well it prevents multiple-vendor networks from combining logs from different vendors, but I bet all monitoring devices from a single vendor use the same hash.
I honestly wouldn't be surprised if it was just some standard hash (like SHA-1) with no salt or anything so that even multiple vendors' equipment would produce the same hash. People that collect personal data would go to extremes, even *gasp* using standards, to enable the data to be shared more widely.
(Not to be a pedant, but it's "pretense" by the way.)
Can you run DOS games on Windows 8 (genuinely don't know)?
You can still run DOS under a VM/hypervisor or setup a dual boot and run it directly on an x86 PC.
Note how the two aren't related. They are talking about running on Win8 directly, not through a VM and certainly not by rebooting into plain DOS and back into Win8 when they're done.
And although emulators are a hack, they're a successful one. We just have to hope that the emulator community keeps up its DRM-defeating record.
"DOSBox, an x86 emulator with DOS"
Seems like DOSBox falls under the "emulator" category...
A known exploitable scenario is when all of the following applies:
1. You're using Authlogic (a third party but popular authentication library).
2. You must know the session secret token.
http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/
Seems like you are mistaken. I believe they were saying that merely using Authlogic doesn't automatically make you vulnerable, but you need to be using it to be vulnerable.
An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.