Comment Re:Be the Change You Wish to See in the World (Score 1) 438
Or by having someone else take the interview for you. Most profs in big courses don't know all their students.
Or by having someone else take the interview for you. Most profs in big courses don't know all their students.
The issue that Silent Circle points out is that SMTP is inherently unable to provide security against traffic analysis. Even if the body of the email is encrypted, the headers cannot be.
So yes, you can run your own email server, and require that only gpg traffic pass through it. But that won't keep you secure against traffic analysis (aka "metadata collection") with collection performed at your ISP.
You can't re-use nodes, but you _can_ put in crossing lines, which makes the grease smears less useful.
We have to protect our phoney baloney jobs here, gentlemen! We must do something about this immediately! Immediately! Immediately! Harrumph! Harrumph! Harrumph!
Most software (games being the obvious exception) has the possibility of creating harm to humans. Payroll, accounting, project management, word processing, etc. all have that potential.
Also *raises hand*.
On one system we stored programs by wiring them into a ROM. By hand. One wire per word, wrapped around the center pole of the E-cores clockwise for a 1, or counterclockwise for a 0. Then solder one end of the wire to the correct X address, and the other end to the correct Y address. Total, 256 16-bit words per board (Z was decoded to board-select).
Yes, I am old.
"He warned that the rush to make webpages more dynamic often meant users were badly served.
He said sites peppered with personalisation tools were in danger of resembling the "glossy but useless" sites at the height of the dotcom boom.
Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.