"We're all equal, but some of us are more equal than others."
Whoops. Mis-mod. Why aren't we able to edit our mods? *grumble*
Um, you mean like some sort of Link Aggregation Control Protocol? Sounds like a good idea!
Load balancing & bonding over multiple NICs. Isn't this what LACP was made for?
No idea if there's anything available for Windows, but chuck a Linux VM on it to act as a virtual router & presto!
How well it works would depend on the LACP stack's ability to handle the issues presented by wireless modems. It works great in a server environment.
Playlists don't, and never have, copied files or required sole access to them. All of the common playlist formats are basically just text files with a list of filenames - you can open & edit them in Notepad!
Colonialism heavily relied on slavery &/or being bank-rolled by the home land.
The pittance received by the these disenfranchised communities, many of whom not lucky enough to have been able to dedicate their youth to our high quality education (much of which is funded by the government, you filthy scrounger), is hardly a comparable situation.
How has this post been modded +4 Insightful?!
Kindly go fuck yourself, you racist xenophobe.
As per that same section in the document...
RoundUp is currently being made available to the law enforcement community on a limited basis. The GPL source code is distributed with the tool.
For anyone interested, the paper detailing the software (RoundUp) used in the dragnet can be found here: http://www.dfrws.org/2010/proc...
RoundUp is a Java-based tool that allows for both local and collaborative investigations of the Gnutella network, implementing the principles and techniques described in the previous sections. RoundUp is a fork of the Phex Gnutella client, and it retains Phex’s graphical user interface. Our changes in creating RoundUp from Phex focused on three key areas: adding specific functionality to augment investigative interactions, exposing information of interest to investigators in the GUI, and automating reporting of this information in standard ways.
First off, British schools don't have "rent-a-cops", security scanners or ID cards, this is an American thing. The hardest security you'll come across in a school in the UK is the school gate.
Secondly, the biometrics are just an additional method of payment, it's entirely optional. No one's stopping you from paying in cash. If I was tasked with setting up a hassle free method of tracking kids deductions from their pre-paid balance, this would likely be the route I'd go too. It's far cheaper to buy 2-3 scanners than to kit the whole school out with RFID tags, and it doesn't come with the inevitable hang-up of things getting lost, stolen or forgotten.
There's not much risk of the data being shared outside the school, as even the police aren't allowed to store biometric records of anyone without an active criminal record.
I dunno, to me it looks like tactical language so as to not aggravate the police force & automatically put them on the defensive. If you want someone to comply, you give them a reason to *want* to do it.
If you tell people you want to restrict their freedoms so you have more control over them, they'll rebel. If you tell people that you're trying to protect them (think of the children!), they'll hand you their liberties without a second thought.
Because the summary isn't a summary, it's an introduction that just ends in questions and begs you to click through to find out the answers.
"I thought it was just a steaming pile of turd ice-cream. What I saw next blew my mind!"
On the contrary, I fear the biggest nuclear threat in the modern world is from individual "terror" groups. In the age of Mutually Assured Destruction, the only people with nothing to lose are those who can't be tied to a specific region. If a group of unaffiliated individuals attack a country, that country has no recourse for nuclear retaliation.
I highly recommend the documentary "Countdown to Zero", it recounts the stories of a couple of extremist organisations caught in the process of acquiring nuclear material, and the frightening thing is that most of these cases were caught by accident, ie. luck. And if those were found by accident, we have no idea how many transactions may have been successful.
To quote a Russian military prosecutor with regards to the tracking & security of nuclear material during the collapse of the Soviet Union:
"potatoes were guarded better"
I see many naysayers & detractors here querying why black-hats would want to break the very services they rely on, but surely that's exactly what they should be doing?
If you want to rely on a service for your own security, it's in your best interests to find all the weaknesses - especially with open source projects, which rely on the community to find & fix faults.
TOR's already broken!
This, from last week:
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Boring Carnegie-Mellon University lawyers have scuppered one of the most hotly anticipated talks at the Black Hat conference – which would have explained how $3,000 of kit could unmask Tor hidden services and user IP addresses.