Did your sense of humor go down with the boat?
Er. That's the point. The accused has to prove they aren't what the accuser says they are. Proving a negative, if you must.
Whoa, easy on the vitriol there, bub. Don't let bad design cloud your judgment of the actual case. It matters not how badly the AT&T folks implemented security (or not) on their system. The fact is Weev "stole" it (copied without permission) and then stupidly publicized it. What's more, he "shared it with various interested parties."
If AT&T had left printouts of highly personal data in a dumpster and someone had found it right there, then I don't think you would've had a problem fingering the culprit. AT&T, right? Dumpster diving would certainly not get someone 41 months in the slammer (e.g California v Greenwood).
In other words, it was right there in the open. Hence, the blame lies squarely with AT&T for not properly securing their customers' private information.
As far as I'm concerned, anyone calling their group Goatse Security needs to be punished anyway. I'm not interested in trying to explain to my 6yo what the fuck that means.
Your obvious lack of parenting skills is not his responsibility.
Why are you unable to respect _his_ decision?
Simply because the outcome isn't what _you_ wanted??
I don't think it was the outcome he wanted either. But he chose to believe in medical quackery first, and now his children don't have a dad.
Um. He sold it to Sun. It wasn't until Sun got sold to Oracle -- a move which he fought against -- that the fork happened.
Maybe not at border crossings but at airports they sure as hell do; even if you're Canadian, like me. They even photograph your eyeballs.
The entire point of a HAL is that you just plug in your drivers.
The entire point of the HAL is to abstract hardware, any hardware, away from the OS. There's nothing that says it can't encompass more of the hardware than just the IO bus, CPU and MMU, like WinNT does. On an embedded device there's very little in terms of a standard IO bus that the OS can communicate through cleanly with peripherals, so might as well abstract the whole lot.
Perhaps by keeping the machine that hosts the seed secured? Like using a protocol between the publicly facing machine and the seed machine that doesn't allow for remote shell access? Really basic stuff, actually.
The unethical part, as far as I understand, is that smaller ISPs rent the "last mile" piece from Bell, which they're allowed to since the infrastructure is wholly, or partially, tax-payer funded. However, they don't buy big-pipe bandwidth from Bell, but instead peer with someone like Cogent. The cost of the bandwidth over the last mile is zero, since additional bytes don't degrade the infrastructure and therefore don't add to maintenance costs. However Bell wants to charge the ISP, for this zero-cost bandwidth, at the same scale as they charge their end-users, who, unlike the ISPs, *are* using their peering connection to talk to the rest of the internet.
I keep seeing this population density argument being thrown out as if it has some sort of a bearing on the issue.
You're not going to be rolling 100Mbs fiber to each farm house in Montana, now are you?
The fact that ISPs in North-America (Canada included) are unable to do this even in areas with high population density, simply indicates that they want to keep the status quo as long as customers keep paying. There is no technical or logistical issue preventing them from doing it. It's all about abject lack of competition and the precious dollar. Trotting out the density argument is specious at best.
Sure if you only implement the single-precision portion of IEEE-754 then you're still working with 32-bit quantities on an 8-bit computer. All that bit-jiggling really adds up quickly.
I once coded a fully IEEE-754 compliant single-precision floating point emulator for ARM which was about ~100 instructions on average per operation. And this is with an instruction set that handles 32-bit quantities natively.
Link to Original Source
From the article:
It's tough for me to believe that they could find twelve people in Connecticut that haven't been stuck in their own involuntary porn loop. Admittedly, I wasn't in the clasroom, and I don't know the exact details of this particular case, but as someone who regularly uses a computer in front of students this prospect scares the hell out of me, to the point that I am rethinking even using a computer in front of students again."Computer expert W. Herbert Horner, testifying in Amero's defense, said he found spyware on the computer and an innocent hair styling Web site "that led to this pornographic loop that was out of control."