Comment Re:server ban? (Score 2) 169
Some of us run servers that receive mail.
Some of us run servers that receive mail.
I heard that airlines operate in multiple time zones.
Many businesses spam customers. Banks are especially bad about this. No I would not like a balance transfer.
Is there any legitimate usage of the word surcharge or does it always mean scam?
> Can we get plate with code to delete the database?"
Yes. http://gizmodo.com/5498412/sql-injection-license-plate-hopes-to-foil-euro-traffic-cameras https://www.schneier.com/blog/archives/2008/04/sql_injection_a_1.html
actual devices to shops or gtfo.
That's what Microsoft thought too.
Torrents die if nobody seeds them. If I've got a few gigabytes of data that only ten people want, possibly years apart, torrents won't work.
Student writes inefficient code, learns how to optimize it using known techniques, it becomes faster. Film at 11.
Don't forget the special add-on modules to come up with a different spelling of your name each visit.
Great! Now all I have to do is compromise your user account, add some aliases to your
-config files and adhoc installed libraries are impossible to link to the application that actually needs it (given the fact that my time is scarce). Nightmare when upgrading, creating new instances or when pulling apart a system (for e.g. performance/HA).
chroot.
-if an application uses resources, e.g. I/O, too much you want to know about it, point fingers and restrict its usage (and maybe give it its own). Nightmare when you want to find out 'what causes it to grind to a halt during Xmas'.
iotop. A VM only makes this problem harder.
-applications has 'resources' they should not have, because another application needed that 'resources'. Example: Qmail needed compiler and afterwards a cracked PHPMyadmin used that to compile malware.
chroot with linux-vserver enforcement.
Now you're either storing all the users' past passwords. Or maybe some clever hash of those passwords that preserves efficient computation of Levenshtein distance. However, given an oracle that computes Levenshtein distance, one could easily extract the password.
I'm more interested in a Duke Nukem Forever code review. Imagine how horrible it must be.
How dare people chop of the trailing bits of an IPv6 address, thus rendering IPv6 privacy extensions ineffective.
While it is concerning that a U.S.-based lobby has this much power, the real issue is that nobody should be listening to the American Chamber of Commerce. If the EFF started writing EU legislation, we'd be jumping for joy.
He has not acquired a fortune; the fortune has acquired him. -- Bion