Yes, yes. Panic! There's a Java 0day! Dear Lord forfend! Of course, as you read this you are probably running Windows, with tons of extensions and software. You're probably using Flash. You probably have a web browser - heck, obviously you have a web browser. Well, not to worry: After disabling Java you will be completely safe.
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Yes. The article can be found here: http://www.jstor.org/stable/10.1086/669034
Didn't I just read on this very site (or possibly Gizmodo; they all run together) that Jurassic Park was impossible because DNA degrades too fast? So how is this going to work? Because I'm pretty sure DNA (if that was how Martian life worked) would be subject to conditions that were even more harsh.
Okay. I read your blog post at the link. Your definition of rape omits the concept of consent, and randomly includes premarital sex (which would fit the definition in the first line) and homosexuality. Good luck with your mimeographed newsletter; I shall file you under "troll" and carry on. I sine Deus.
Atheism leads to this.
I'm pretty sure you don't need to believe in God to consider rape and murder unethical, immoral, and just wrong. In fact, plenty of people have pointed out (repeatedly) the fallacy of assuming that one needs God and/or religion to be good, so there is no reason to say more on that topic here. Go forth and Google.
The culture of consent and contraception, leads to this.
I'm not sure what the "culture of contraception" is, but I am pretty sure it does not lead to this kind of behavior, either. In fact, I strongly suspect this behavior - in general, minus the Internet - predates the widespread availability of contraception.
So he's a slashdotter who might end up in Congress. Fine. What I want to know is does he run Linux???
Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.
In short, I think there are problems beyond DRM with GPL software being distributed through the app store.
BERLIN (Reuters) — Wannabe Latin lovers can improve their technique by playing with the erogenous zones of naked mannequins at a new interactive exhibition that has now opened in Berlin.
The "Amora sex academy" that opened in Berlin on Thursday welcomes visitors with the wry slogan, "Finally — an exhibition for those who always have to touch everything."
More than 50 interactive displays guide visitors through the intimate areas of the male and female bodies, offering helpful tips on everything from striptease to oral sex and how to achieve a perfect orgasm.
A voice shrieks "That's it!" when the visitor manages to put his finger on the elusive G-spot.
Next to it is what the museum called its "Spank-o-meter." It measures the level of pleasure a mannequin receives when spanked with a leather whip.
Founded by Frenchman Johan Rizki, the sex academy opened in London earlier this year and is also due to come to Barcelona.
Reuters : http://www.reuters.com/article/oddlyEnoughNews/idUSTRE56952420090712"
Link to Original Source
This is in the FAQ. From TFA:
Q: But what if an attacker takes over all paths to the destination?
A: There are two answers to that. Please see our academic paper for a detailed security analysis.
1) Perspectives actually keeps a record of the keys used by a service over time. Thus, even if a powerful adversary is able to take over the whole Internet (scenario L_server in the paper), clients can still detect the key as suspicious because the key has recently changed. If the attacker is able to compromise all paths for a long time, then you are in trouble, but then again such a powerful adversary could also fool the so-called "verification procedures" of many certificate authorities, which often consist of a one-time email verification.
2) Even though a powerful adversary can defeat the system, it makes man-in-the-middle attacks much harder. Today an attacker must only be on the path between you and the destination, which isn't very hard. Think about an open wireless network, or the recent DNS attacks which compromise a targeted DNS resolver. Being on all links is much harder, and in the end security is nothing but making an attack harder.