as a first step towards world domination... and leave a mark on history to tell the rest of the world how someone spend another multi-million tax payer money on a project destined to fail on delivery.
eldavojohn writes "China has taken new extremes in preventing internet addiction in youths and is even offering boot camps to parents who want their child weaned from the electric teat. The article notes that 'no country has gone quite as far as China in embracing the theory that heavy Internet use should be defined as a mental disorder and mounting a public crusade against Internet addiction.' The article mentions the story of Sun Jiting who 'spends his days locked behind metal bars in this military-run installation, put there by his parents. The 17-year-old high school student is not allowed to communicate with friends back home, and his only companions are psychologists, nurses and other patients. Each morning at 6:30, he is jolted awake by a soldier in fatigues shouting, "This is for your own good!"' Sun found himself spending 15 hours or straight on the internet. Thanks to his parents' intervention and the treatment, he now has life mapped out until he's 84. "
hcmtnbiker writes with news of a logic flaw shared by IE 7 and Firefox 2.0. IE 5.01, IE 6, and Firefox 18.104.22.168 are also affected. The flaw was discovered by Michal Zalewski, and is easily demonstrated on IE7 and Firefox. The vulnerability is not platform-specific, but these demonstrations are — they work only on Windows systems. (Microsoft says that IE7 on Vista is not vulnerable.) From the vulnerability description: "In all modern browsers, form fields (used to upload user-specified files to a remote server) enjoy some added protection meant to prevent scripts from arbitrarily choosing local files to be sent, and automatically submitting the form without user knowledge. For example, '.value' parameter cannot be set or changed, and any changes to .type reset the contents of the field... [in this attack] the keyboard input in unrelated locations can be selectively geared toward input fields by the attacker."