Come on, there's an arbitrary number of formulas that could be used to encode the next bit. If you look at a sequence 1 3 5 7 and ask what's the next number most people would answer 9. Then the answer is "11, because it's the odd numbers excluding squares like 3*3 = 9" and people would go "How the f*ck should I know that?" and there's no analytic function that says how "weird" your formula is. You're just making a guess of how long it'd take before someone tries a formula like this, it could be in five minutes or fifty years.
No, people would then ask "Why is 1 in the list then since 1*1 = 1?"
A lack of sufficient auditing capability is what has kept CACert out of most browser CA bundles.
Which is laughable considering some of the other CAs that are included.
Who is Dustin Curtis, and which multibillion dollar company did he found?
Exactly. The article is nothing more than a glorified facebook post by some unknown. WTF it is doing on Slashdot is anybody's guess. This is a new low.
So, not playing isn't effective unless everyone you know also respects your not wanting to be there, and most won't, even if unintentionally.
Just to be clear, you have asked people that you know not to tag you in photos that they post and they do so anyway?
i have an artificial ceiling on game prices. i am mentally unable to convince myself a game can be worth more than 9.99 no matter what. and even that is only for an AAA title or good flight simulator. fortunately, i've grown out of impatience long ago and don't mind buying the likes of Crysis 3 a year or 2 after release.
The other nice thing about this is that you can game on modest hardware rather than needing bleeding edge, expensive components in your rig.
Everything was, at some point in time, a novelty. That doesn't mean they are all equally useful. Even if some people took a plane to just go up and down, most people knew they could take a plane to take them from A to B quickly and efficiently. In contrast, the SS2 has been designed only to go from A to A with a short thrill ride in between.
Could SS2 be the predecessor though to a transport that goes from A to B in a short period of time where A and B are very far apart globally? Perhaps it could turn around and make the return trip the next day/week. Would there be value in a trip from Texas to Australia in under 4 hours?
This was the fire marshal being ignorant and inflexible. He's an idiot.
This was the fire marshall doing his job properly and you speaking from ignorance of the matter and the situation in general.
The user interaction in the transaction flow is also hideous.If you disagree, take a look at the example transaction flow that they display on their site.
Here's how it looks like it works:
Compare that to NFC
I'm sorry but that dog won't hunt.
I don't want to give you nightmares, but it is horrifying how little security there is on ACH transactions. The whole system relies on the ability to undo transactions to discourage fraud. All anyone needs is the routing and account numbers that are helpfully printed on your checks.
I hate to break it to you, but your average individual cannot initiate an ACH transaction and transfer money out of your account.
Still, though, this vulnerability appears to be firmly in the area of social engineering because why would I want to download an encrypted image file that requires another separate, random app to decrypt and view it?
The payload is encrypted/embedded into an image that is an asset inside the application such as a splash screen or a logo. It appears innocuous until the application runs, extracts the embedded apk and executes it. Prior to that the malicious payload is not detected by application scanners that scan the carrier apk.
The moon is made of green cheese. -- John Heywood