My guess is the file hash matched a known file that contained the offending material. Google does scan your email for virii, so it's not unthinkable that images, a possible threat vector, are also scanned and hashed, and can be compared to a database of offending image hashes as well as virii.
Er, wouldn't it be easier to put sugar pills in the bottles that have the appearance of pain medication? If a robber wises up and checks in the bottle before leaving and sees nothing, that pharmacist is going to be in trouble.
I agree with this. In addition, you can also backup to local folders, and have different backup sets so the really big stuff will be backed up online, but the smaller, more important things can be backed up both to a folder and online. That, and they let you control frequency of backups, and never delete anything unless you set it to remove deleted files after whatever period of time you say. Lord knows how many TB I have backed up there that is just deleted files and their daily versions.
Downside of using shared DNS servers is that some servers, like those for Sony's PSN, try to get you to download from servers based on your DNS server.
Why? I have no clue. However, it kills your connection speed until you reset it to your local ISP's DNS servers. Be wary.
If it behaves anything like Retroshare, it would have the users exchange keys, and not let them connect until each has the other's keys and allows the connection. Nintendo online players have been doing something similar for a while with friend codes, so I don't see why this needs to be so difficult.
The problem is his data may also info about legitimate foreign spying operations and info on the people involved. While there probably is still more evidence of wrongdoing in what he has, it's also likely he has his hands on something that could very well put a good deal of people's lives in danger. That data was stolen once, right out from under the NSA's noses. If the NSA couldn't stop it from being stolen, how can a single man ensure it won't be stolen from him as well? Remember, this data is very important, and he's as vulnerable as anyone to the $5 wrench decryption attack if he has it encrypted himself.
So the USA really should try to offer him this, and also offer official protection from other nations who may also be interested in some of the things he's learned. This, of course, all hinges on how many copies of the data he has, and if he's given copies to more than he's told us.
In any case, I see this deal falling through, and him possibly being forced to hand over a copy of the data to one or more third parties that are not the US, which can only end very, very badly if not handled correctly. Also, the more people handling it, the more likely it will fall into the wrong hands...
Oh, my mistake then. I was under the impression that the end users filled out forms on the website, and were missing some or incorrectly filling them out, leading to an error.
Strange, TFA as well as the summary seem to imply that the users are entering faulty information into the forms or failing to enter any information into some forms, and that is what is causing the problems.
So basically, end user error is now counted as the website's problem? When did this start becoming common practice?
Ohh, I think I remember seeing those numbers in the update manager of my Linux Mint VM. Yeah, that makes sense. Although I'm wondering, what do they do about high urgency updates they normally don't do because it breaks things, haven't tested, but still have to be put out to all systems anyways due to whatever, say a major security hole. Where would that fall on the 1 to 5 scale of updates?
Am I reading that file incorrectly, or does it list Flash as a package to never update?
For a website about security, have a warrant canary on every user's page when they login. If it disappears, well, there you go. In addition, add a counter that, for every FISA request you get, increments the counter by 2, afterwards which you add 1 to, to get, say "We have not received 255 FISA requests."
There's a nice program out there called Retroshare that is essentially DC++ with friend to friend encrypted connections, along with a slew of other features. Two people share their PGP public keys with each other, connect, and choose what files they want to share, and with who they want to share them. It's very nice, but not many people I know use it.
Link to Original Source
For the first, I'd say snipers are watching, with armed people nearby in hiding, possibly in many locations surrounding you watching to see what you do.
For the second, honeypot.