Clearly! Just go shoot up the Antipiratbyrån offices! That will solve the problem! I mean, that's how people in the US solve their problems all the time, right? That's why the United States are such a model of base democratic decision making: Because everyone has guns!
...most C++ programmers understand C++, yes.
For mathematical fiction, I've found nothing beats macroeconomics textbooks.
The system we used here was actually smart enough to not flag common idioms like this, and also still flag cases where only the variable names and formatting had been changed. Also, our assignments were usually complex enough that there would be enough variation, anyways. Most things about our automated hand-in system sucked, but the plagiarism detector wasn't one of them. If you're curious: https://www.ipd.uni-karlsruhe.de/jplag/
Ponca City, We love you writes "NetworkWorld reports that security consultants Andrea Barisani and Daniele Bianco are preparing to unveil their methodology at the Black Hat USA conference for stealing information typed on a computer keyboard using nothing more than the power outlet to which the computer is connected. When you type on a standard computer keyboard, electrical signals run through the cable to the PC. Those cables aren't shielded, so the signal leaks via the ground wire in the cable and into the ground wire on the computer's power supply. The attacker connects a probe to a nearby power socket, detects the ground leakage, and converts the signal back into alphanumeric characters. So far, the attack has proven successful using outlets up to about 15 meters away. The cost of the equipment to carry out the power-line attack could be as little as $500 and while the researchers admit their hacking tools are rudimentary, they believe they could be improved upon with a little time, effort and backing. 'If our small research was able to accomplish acceptable results in a brief development time (approximately a week of work) and with cheap hardware,' they say, 'Consider what a dedicated team or government agency can accomplish with more expensive equipment and effort.'"
Eh, that makes sense for an online poll with write-in. It discourages 4chan et all coming along and flooding the poll suggesting the node should be named something along the lines of "NIGGER COCKS OLOLOL".
Bootsy Collins writes "Last Wednesday, the Lori Drew 'cyberbullying' case ended in three misdemeanor convictions under the Computer Fraud and Abuse Act, a 1986 US Federal law intended to address illegally accessing computer systems. The interpretation of the act by the Court to cover violations of website terms of service, a circumstance obviously not considered in the law's formulation and passage, may have profound effects on the intersection of the Internet and US law. Referring to an amicus curiae brief filed by online rights organizations and law professors, PJ at Groklaw breaks down the implications of the decision to support her assertion that 'unless this case is overturned, it is time to get off the Internet completely, because it will have become too risky to use a computer.'"
I wasn't quite born at the time, but had I been alive, I'd have made sure to tell you!
All I ever needed.
desmondhaynes writes "Is Linux ready for the masses? Is Linux really being targeted towards the 'casual computer user'? Computerworld thinks we're getting there, talking of Linux 'going mainstream 'with Ubuntu. 'If there is a single complaint that is laid at the feet of Linux time and time again, it's that the operating system is too complicated and arcane for casual computer users to tolerate. You can't ask newbies to install device drivers or recompile the kernel, naysayers argue. Of course, many of those criticisms date back to the bad old days, but Ubuntu, the user-friendly distribution sponsored by Mark Shuttleworth's Canonical Ltd., has made a mission out of dispelling such complaints entirely.'"
gondwannabe writes "Here are Five Things You Aren't Allowed to Discuss About Linux. With considerable chutzpa, an insightful Rob Enderle takes on what he considers five dogmas in the OSS community and explains why they're wrong. Examples: Linux is secure, "communes" actually work in the long haul, and that Linux is "pro-developer."