Forgot your password?
typodupeerror

Comment: Re:Sen. Wyden. (Score 1) 151

by lee13se (#42362129) Attached to: Net Neutrality Bill Aimed At ISP Data Caps Introduced In US Senate

Only in the strangest of cases (Texahoma) will an individual transaction cross state lines.

The bill defines an ISP as "an Internet service provider that imposes a data cap on consumers of the provider" I believe that would include AT&T, Verizon, and the like that have data caps on mobile internet service.

Comment: Re:A week? (Score 1) 1004

by lee13se (#40067195) Attached to: Who's Pirating Game of Thrones, and Why?
But that is how the music industry has operated (at least before the internet has lead to the expansion of self-published music) for decades. Music labels would risk lots of money to sign a band, record an album, make and distribute CDs/tapes/8-tracks/records on the hope that people would buy it. Some albums would become crazy popular and make millions for the albums, others would flop and the label would lose money. The profit from the hits more than of-set the losses of the flops and the label would make money (at least the ones that had a good ear for selecting bands and/or were lucky). Sure the radio helped, not only to promote music and encourage album sales, but the radio pays a fee to the label every time the song is played. But some songs suck, DJs don't want to play them and no one calls in and requests them. The label may is unable to recover the costs of producing the album.

Comment: Re:Three hardware changes? (Score 1) 473

by lee13se (#38737556) Attached to: Ubisoft Has Windows-Style Hardware-Based DRM For Games

I call bullshit.

No, I have seen it too. I tried to virtualize a laptop (VMware has a really nifty tool to do this), but after booting the image in in the VM Windows thew a fit and would not let me log in without activating, again. Calling MS was pointless; it is a completely automated system.

Image

Australian Visitors Must Declare Illegal Porn To Customs Officers 361

Posted by samzenpus
from the don't-blunder-down-under dept.
Australian Justice Minister Brendan O'Connor has advised visitors to take a better safe than sorry policy when it comes to their porn stashes, and declare all porn that they think might be illegal with customs officers. From the article: "The government said it changed the wording on passenger arrival cards after becoming aware of confusion among travellers about what pornography to declare. 'People have a right to privacy and while some pornography is legal and does not need to be disclosed, all travellers should be aware that certain types of pornography are illegal and must be declared to customs,' Mr O'Connor said."
Image

Woman Trademarks Name and Threatens Sites Using It 273

Posted by samzenpus
from the keep-my-name-out-of-your-mouth dept.
An anonymous reader writes "Be careful mentioning Dr. Ann De Wees Allen. She's made it clear that she's trademarked her name and using it is 'illegal... without prior written permission.' She even lists out the names of offenders and shows you the cease-and-desist letter she sends them. And, especially don't copy any of the text on her website, because she's using a bit of javascript that will warn you 'Copyright Protect!' if you right click on a link."
Iphone

+ - Ubuntu shows hole in iPhone data encryption->

Submitted by Anonymous Coward
An anonymous reader writes "A lost iPhone is a bigger problem than previously thought. Despite encryption the finder can gain easy access to data including photos and audio recordings, even if the owner has set up their iPhone to require a pass code. And, of all things, this is made possible with Linux — the very operating system which Apple regularly cold-shoulders. heise Security was able to reproduce this finding by Bernd Marienfeldt."
Link to Original Source
Supercomputing

+ - NSF Gives Supercomputer Time For 3D Model of Spill->

Submitted by CWmike
CWmike (1292728) writes "Scientists have embarked on a crash effort to use one the world's largest supercomputers to create 3D models to simulate how BP's massive Gulf of Mexico oil spill will affect coastal areas. Acting within 24 hours of receiving a request from researchers, the National Science Foundation late last week made an emergency allocation of 1 million compute hours on a supercomputer at the Texas Advanced Computing Cente to study how BP's gusher will affect coastlines. The computer model they are working on 'has the potential to advise and undergird many emergency management decisions that may be made along the way, particularly if a hurricane comes through the area,' said Rick Luettich, a professor of marine sciences and head of the Institute of Marine Sciences at the University of North Carolina in Chapel Hill, who is one of the researchers on this project. Meanwhile, geographic information systems vendor ESRI has added a social spin to GIS mapping of the BP oil spill."
Link to Original Source
Programming

+ - The top 10 HTML5 sites dissected ->

Submitted by Barence
Barence (1228440) writes "HTML5 might be a new and emerging technology, but there are plenty of websites out there that are already taking advantage of HTML5 features. PC Pro's Ian Devlin has picked 10 of his favourite HTML5 sites and explained the elements that make them work. He provides illustrated examples of how developers can use the canvas tag to embed moving animations into websites, the new embedded video tags and a terrific site that lets you drag and drop fonts onto a block of text to see what they look like."
Link to Original Source
Security

+ - SPAM: Hackers can delete Facebook friends via flaw

Submitted by alphadogg
alphadogg (971356) writes "A bug in Facebook's Web site lets hackers delete Facebook friends without permission.

The flaw was reported Wednesday by Steven Abbagnaro, a student at Marist College in Poughkeepsie, New York. But as of Friday morning, Pacific time, it had still not been patched, based on tests conducted by the IDG News Service on a reporter's Facebook friends list. A malicious hacker could combine an exploit for this bug with spam or even a self-copying worm code to wreak havoc on the social network, Abbagnaro said in an interview.

He's written proof-of-concept code that scrapes publicly available data from users' Facebook pages and then, one by one, deletes all of their friends. For the attack to work, however, the victim would first have to be tricked into clicking on a malicious link while logged into Facebook. "The next thing you know, you have no friends," Abbagnaro said."

Link to Original Source
Businesses

+ - Ninth suicide at iPhone factory.->

Submitted by shar303
shar303 (944843) writes "A ninth employee has jumped to his death at Taiwanese iPhone and iPad manufacturer Foxconn, China's state media reports. The 21 year old worker was the the eighth fatality this year. This raises questions as to whether the shiny finish of the lifestyle statements available from mega corporations are tarnished by such information, and whether the mistreatment of workers deserves to be highlighted when considering such firms."
Link to Original Source

An adequate bootstrap is a contradiction in terms.

Working...