it's a download https://noransom.kaspersky.com...
it's a download https://noransom.kaspersky.com...
There is a difference between "noticed" and "went looking for", my assumption is that the friend actually went looking for it, knows which sites are "sketchy" etc. My point merely was that if you trust the friend enough to know how to do this, know what they are looking for etc. then they also would be the ones to give you further advice. This person has far more information than everyone guessing here.
"That, and a friend who noticed a lot of strange activity coming from my phone's IP"
Sound's like your friend is a load more steps ahead than the rest of us, who have none of the information he was working to. He noticed somehow (no detail here), and he know which sites and which he believes are sketchy. Sounds like the best source of help is this friend.
The Columbia picture is acknowledge as being based on that film (and based on French director Patrick Jean's 2010 short film of the same name)
Sure Pune is near Bangalore, just about 850km near. Mumbai at around 150km and twice (if not more) the population of Bangalore isn't worth mentioning.
Nah, it's just my crap skills at including links should have been http://www.nq.com/vault
I have no problem understanding that the idea something is "encrypted" without further definition doesn't amount to much, though I'd argue that even with weak encryption it's still not being applied, since it's only actually encrypting a header not the file, so at best that's "partially encrypted"
What's more important though is what would a reasonable man understand the product to be - it's calling itself a vault and it's claiming to encrypt stuff, I don't think it's an unreasonable conclusion that means something more than the trivial scheme apparently employed.
http://www.nq.com/vault- scroll down a bit under "NQ Mobile Vault Features." subsection "Photos & Videos" - "They’ll be encrypted..."
I'd say that was a claim that it'll encrypt them.
The normal problem is that the majority working with spreadsheets as the summary suggests never do enough of it to get good or understand what's bad.
I remember Y2K and being handed a ruck load of foxbase code a team had written to make work for Y2K, since it was now ITs problem to sort it all out. The easiest thing to do with much of it was scrap it and rewrite it to do what they actually thought it did rather than what was coded.
I don't think they were obliging operators to sign roaming agreements with other operators, so you'd only enter into agreements with carriers on a fair basis.
Wasn't one of the complaints that when it came to removing things like child porn, they removed it entirely, whereas for copyright infringement they just removed the specific link and left other links to the same content in place.
By doing the two differently, they certainly left themselves open to the charge that in fact there "relatively good job" was in fact knowingly superficial.
It seems we have both, but mainly welded apparently they are stretched to some how reduce the effect.Notes on summer delays from Network rail
Many DDOS rely on using "infected" computers of the masses, it appears to me that the targets as big corporates are only one aspect of this case. Misuse of many individuals equipment (and who knows what else these infections do), use of excessive bandwidth which could be costing someone somewhere (for the potential zombies being used , individuals on non-unlimited plans could be paying for excess bandwidth personally).
So to paint this as helping Sony/MS rather than the general social ill it is, is disingenuous.
Not to mention, computer misuse laws have existed for years, and the government haven't made any sort of spectacle of this, I don't believe they've commented on this in any significant way.
And I'd think most of those ideas suffer various problems too. Most ideas trying to solve social problems end up over-engineered and even more so when trying to iron out the problems.
There are plenty of people with mobile handsets which number other than 1.
Those with 0 for example, either through battery being dead, stolen, lost, quick run to the shops without picking up a phone or simply choose not to have a phone. We seem to now be blocking them from using the car. Well I guess we'll need to engineer some sort of override to allow for that? Now the system without the override is a worse experience for most people, but being the same law abiding, socially caring people who wouldn't text whist driving anyway, they won't use the override except in a genuine situation right?
More than 1, well I guess that only one is blocked so no problem texting etc. as we go. I guess we could implement the cell site thing to ensure all the phones in the car connect to that right? Well what about passengers in the car etc. Guess we need some vision systems so the car can also see who is operating the car and the phones?
And whatever you do you can bet those who are willing to break the law still will, they'll find a way of getting around it. So you still need to find ways of actually enforcing the law anyway...
That still seems to support the basic underlying proposition though. Something which had appeal to the little guy ended up leading to use of that which ultimately led onto a a successful business initially at least based around that product. If MOS has kept it's key staff involved and developed the line further who knows where that could had led.
Administration: An ingenious abstraction in politics, designed to receive the kicks and cuffs due to the premier or president. -- Ambrose Bierce