SparkleFun has been selling the yellow ones in the US for over 3 years. This is not the first shipment, but might be the first one to get intercepted. So Fluke may have intervened with a complaint, as these $15 meters do look similar enough to confuse some buyers.
Slashdot videos: Now with more Slashdot!
It is very common for a company to install a proxy server that decrypts traffic to the outside and inspects with a data loss prevention type tool. Proxy servers act as MITM attacks to be effective at decrypting SSL traffic so it can be inspected.
It is not as common that you would be allowed to connect to this employers network. Network access control should be in place to prevent vendors or employees from connecting potentially malware laden computers to the internal network. At the least, if you gained access to their network, the same proxy that performs the MITM attack should also be prompting for authentication to access the Internet.
There are a lot of conversations about chip and pin and how it would apply to Target.Chip and pin was developed to help with card present fraud and reduce the potential of duplicating an entire credit card by capturing the data at the point of sale (Target), on the wire (RaceTrac skimmers, Ethernet taps) , or at the processor (Heartland). Chip and pin does require or support encryption of the card number (PAN); it is still sent in clear text to the processor and banks. In truth, chip and pin would do nothing for Target as they have host their own processor. Bad actors had control of registers and potentially their payment processing systems, obtaining enough information to make counterfeit cards. In this scenario, the only solution that would help Target would be end-to-end encryption. Encrypt at the pin pad, decrypt at the bank. Nowhere is the card number or any track data in the clear on the retailer or processor network.
Instead of spending money on chip and pin which does not address the card not present problem, banks (and retailers) should be lobbying for end-to-end encryption. Many current readers are capable of encrypting at the swipe (or chip read). If you are upgrading to support chip and pin, your new pin pad will support encryption too.
Don't have fast enough Internet connection to stream reliably.
Have 13 year old TV so no Blue-Ray player (would also need to buy new entertainment center to replace my hand built wood one).
Have basic satellite service so not much on TV (I just watch sports).
Theater is expensive and people are often inconsiderate of others so I buy the DVD movie online and watch at home.
What do you want, you moon faced assassin of joy? - Londo Molari
You brought is the Apple and Macintosh line of computers. You gave us digital downloads and iPods. Then you showed us iPhones and iPods to stay connected. We owe much of your day to day lives to visionaries such as yourself. I started programming on a C-64 and Apple IIe. My first professional computer was a Mac IIfx. I am raising my glass to you.
PCI (Payment Card Industry) will deal with this eventually, as traffic should be encrypted from the reader to the backoffice server or whatever brokers the transaction to the payment processor. What needs to be done is encrypt the card information at the reader at the pump, even if the information is transmitted via serial connection (out of PCI scope today). Prudent companies keep the keys to the gas pumps secure as well as do at least daily checks on the pumps (crack the box, look for skimmer).
I suspect this type of skimming is more prevalent that is getting press for.
The answer to your question: The Berne Convention [wikipedia.org], which affixes copyright on anything written down anywhere. Really. This comment is copywritten by yours truly thanks to that rule and that fun text at the bottom of the page, and as such if I were wealthy and a complete jerk I could sue someone for infringement if someone decided to plagiarize me.
Come and get me!