I know certain commercial products, for example Fortanet firewalls, have this functionality built into them.
Mac Mail, iMail, something like that...
Their service is pretty inconsistant. I think most of their customers get frustrated when they're initially filling the server - they don't do a lot of administrative oversight into what goes onto their servers, and it really shows in the first 3-4 months you are a customer of theirs. The reason they come up however, is they offer all of the stated services except VOIP. And I wouldn't use their VPN, though they offer VPN services. You can always use SSH Tunnels. I think there's a real logistics problem in offering that wide a variety of services, which is why most hosting companies won't do so. The original poster may have 5 providers, but each of those providers only has to stock admins to deal with 2-3 of the requested services.
This isn't the first infinate recursion iMail bug. Around five years ago I worked for a webhost at which we had customers complaining about there being nothing in their INBOX. When we checked, we'd find a giant tree of INBOX folders - for some reason iMail would create a new subirectory called INBOX every time it logged in, and then make the *new* INBOX folder the default INBOX. All the mail would still be delivered to the original inbox...
I think the most important aspect of this article is that people who went to burning man are still talking about burning man.
It's a start, at least the passwords are safe... there's a tendency for security communities to scoff at nearly any half improvement
I'm fairly sure the author of the paper was laughing maniacally during most of it's writing.
Is the internet a bigger experement in anarchy than Mexico?
... but sometimes there are commercial solutions that fit a specific problem quite well - I'd use deep-freeze, a piece of windows software. I briefly attended a school that had it on their computer lab computers - effectively the computer is reset every time you restart it. It keeps a second partition sitting around with your save point or something like that. Guests are generally non-malicious so probably won't disable the software.
Dear Slashdot, Please bring back gnome2. Gnome3 isn't as good. Yrs, David Maas
I wouldn't consider BTC a good currency because there isn't a whole lot that can be bought with it. Drugs, gems, metals, alpaca socks, and an extremely limited variety of items for sale on "underground" sites.
u r such an amazon luver u amazon luver 3 3 3 that was totally an amazon answer
I find it really funny that Amazon is patenting their suggestion system since it's responsable for nearly every mis-purchased item I buy from Amazon. I wind up with GSM phones intead of CDMA (but in a better color), asus keyboards for a laptop I don't own, and a wireless access point instead of a wireless range extender! They should try to think of/patent a system for suggesting items that have the same important attributes and basic utility. It wouldn't kill Amazon to patent something that's not blaitantly obvious.
Wander around with netstumbler, and monitor the strength of the evil network. Once you've actually located the person you can: a) complain to their mom b) move your access point to where it's out of their range c) setup a malicious network of the same name with and perform MITM attacks on them (sslstrip, sslsplit, dsniff, malicious nameserver, redirect them to a copy of someone elses drive-by-0day page) If they run the deauth attack more than once (it only has to be run once), they're fairly unlikely to succeed unless given serious help (like changing the network encryption to wep).
After a moments retrospect, see if your son can take a humanities course over the summer that will transfer to the new school