I don't see why you think his account has been hacked.
I wondered about that, but I took it to mean that the uncle clicked a link and entered his account details before asking what the link was about, and so was 'hacked' in that sense, not that hacking was needed to fake the From: header.
There's the question of how the email associated the recipient and sender names, but that just suggests that a mutual friend's machine was harvested for addresses.
Unfortunately it's a 16K model, and a fairly early one at that, which won't run much software
Hey! I was still supporting the 16k version with a game released in NINETY-two.
Sitting on a Cray, and seeing the Utah teapot.
I know a number of families that make kids share an iPad
You can usually get refurbished iPods (from Apple, so good condition and 1yr warranty) for under $200, especially if not the latest version. Ideal for kids, as long as they're in a thick rubber case.
(There's a joke opening in my last sentence if anyone wants it.)
The "wow" about iPhone, and later Android, was "look at all the things I can do with it! And the number of things I can do with it is growing like crazy!"
It's a bit surprising to remember that the app store didn't launch for over a year after the iPhone.
Buying a book from an ebbok bookseller doesn't have to mean DRM. While Amazon might force it, their competition does not.
That was the point - Amazon doesn't enforce it, it displays "this book is DRM-free at the request of the publisher" for some books now. But the poster was complaining that you still can't actually get that book without downloading it to a kindle.
I think of synergy as as being the emergence of new properties, not simply scaling existing productivity
If I have one VCR*, I can record and play shows. If I have two identical VRCs, a new feature emerges, I can duplicate tapes!
One person struggles to assemble furniture because the parts fall over, with two people, one holds the parts while the other joins them together.
*A type of DVR with a long, rolled-up hard drive.
People will still have to type 'amazon.com' into google first, right?
the server carries a verifier for each user, which allows it to authenticate the client but which, if compromised, would not allow the attacker to impersonate the client
Any circuit design must contain at least one part which is obsolete, two parts which are unobtainable, and three parts which are still under development.