Do you develop on GitHub? You can keep using GitHub but automatically sync your GitHub releases to SourceForge quickly and easily with this tool so your projects have a backup location, and get your project in front of SourceForge's nearly 20 million monthly users. It takes less than a minute. Get new users downloading your project releases today!
Did you buy your car at a gas station? Then why buy your phone from a wireless carrier? You will get updates late, if at all. Tethering will be restricted. The phone will come loaded with crapware. Why bother?
All web browsers and most other Internet apps these days will try IPv6 first if DNS reports an AAAA name.
That's not true. It used to be like that several years ago, but most modern OS will prefer IPv6 for DNS lookups if and only if the computer has native (that is no 6to4 or teredo) address. Otherwise IPv4 is preferred.
eladts writes: The SSL certificate for supl.google.com, Google's A-GPS server, expired a week ago. This makes A-GPS clients using SSL fail to connect to the server and fall back to unassisted GPS.
Your theory completely ignores the First Sale Doctrine. You do not need a license from Microsoft to sell a Windows CD, as you are not making a new copy. You do not need permission from Microsoft to sell your Windows PC. The same applies to GPL software and hardware with embedded GPL software.
This is already done in Israel by Bezeq International, the largest ISP in Israel which is owned by the national phone company. It works exactly like people expected here... You pay more, the use KY so it hurts less.
Almost all Nokia and Sony-Ericsson phones, even dumphones, can tether via USB or Bluetooth out of the box, there is no need for an app for that. Actually, you can get Nokia 5310 from T-Mobile, get the $10 dumphone unlimited web and tether with that.
T-Mobile USA uses 25.0.0.0/8 for their NAT endpoint addresses. This is not some IT department in a bank, this is a telecommunication company. They should know better.
This story smells like a hoax to me. All the reports seem to be same, offering no real evidence that such a botnet exists. Knowing the admin password allows local attacker to configure the router and even upload a custom firmware, but remotely zombifying routers is much more difficult.