I think DirecTV got away with that in part because they still owned the cards in question and were just allowing users to make use of them. (The hack worked by modifying official DirecTV cards.)
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
It's not a standard USB interface, and some applications link directly against FTDI's proprietary library and use its functionality. Also even for applications that only use it as a serial interface there's no generic USB serial driver that works on Windows out the box
Satellites have not have any real hacks in a decade.
Probably because cardsharing is easier, more reliable and more profitable for the people selling it than full hacks.
From what I can tell, it wasn't just one of the main Bukkit devs that stepped down, it was a joint decision by everyone who was participating in Bukkit development at the time. Many of their resignatiion statements are up on bukkit.org right now.
Uber's business model relies heavily on drivers using their own, standard insurance and not bothering to ask questions about whether they're actually covered. I think Uber have started offering their own insurance and raised prices to pay for it since someone got killed by an Uber driver in the US, but it's still inadequate (apparently less than they're legally required to have in Germany, and at least in the US all their drivers are driving uninsured whenever they're seeking riders).
Don't forget that by default, Chrome now sends all your passwords back to Google encrypted only with a password that Google have easy access to. (Only if you're signed in to Chrome, but they're incredibly aggressive about signing you in, so much so I don't dare log into Google accounts from Chrome anymore.)
By that standard Google Chrome itself has been malware for years - many pieces of software have bundled it in exchange for money from Google and made it hard not to accidentally install it, including I think Java, Flash, and various more shady products, and Google hasn't given a fuck.
Barring another bug, it can - and probably does - scan for *all* ways to exploit it. The issue is that Android itself doesn't properly verify the certificate chain in packages before installing them, and Play Services can easily perform all of the missing checks itself and reject any package that fails them.
Unfortunately, some common routers contain a buggy early revision of the QCA9880 802.11ac chip that's not supported by ath10k and never will be.
It's a Red Queen's Race though - no matter how far everyone is willing to go to achieve the American Dream, only a tiny proportion of them ever will, and meanwhile all the rest are stuck running as fast as they can just to stay exactly where they are.
How much do you pay for Maps updates with Apple? Presumably, the amount it costs to buying a new iDevice every time they stop supporting the old one, plus the cost of a data connection... which is quite a bit.
The money laundering, and possibly also some of the other crimes, was committed in the US by American subsidiaries that Mark Karpeles set up specifically for that purpose.
Last time I heard, CVS sold homeopathic remedies too, along with most of the other major supermarkets and pharmacy chains in the US. Does that mean that all their medicines and "healthy" foods are just marketing to the credulous too?
For values of "debunked" equal to "people clueless about how VAC works are loudly insisting that it's not true, and being believed because Valve fanbois". (Amongst other issues, you won't find the code of any VAC modules in Steam's or the game's DLLs because they're downloaded from the server at runtime in order to make them harder to reverse-engineer and block.) Someone later in the thread has apparently tested and found that stuffing the DNS cache with bogus entries increases the amount of SSL-encrypted data VAC sends back by almost exactly twice the size of the MD5 hashes of all those entries, and clearing the cache returns the amount of data sent back to what it was. (It may not necessarily be possible for others to replicate this, as I recall one of VAC's anti-reverse-engineering measures is that different people receive a different subset of the payload modules. So far no-one's tried though, they've just said it's not proof enough.)
You've forgotten about fixed point, which isn't really any more complicated to implement than integer arithmetic and is a perfectly reasonable way of implementing integer division by a fixed divisor. (A lot of compilers actually use this trick, because even running on a CPU it's often more efficient than using hardware division.)