Where I am, we have to ISP options: AT&T DSL, topping out at 5mb (really 3mb) or Comcast. For anything that could be called broadband, Comcast has a monopoly.
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
The change in definition means that the percentages of households that have more than one option for broadband has plummeted. Before this, asshat providers like Comcast could claim that there was ample competition and choice for consumers but now it will be undeniable that they have effective monopolies for true broadband in many markets. Props to FCC for making the move. Undoubtedly, it will be appealed as a delaying tactic, even though the FCC is fully within their purview to make the decision.
The problem is that if there's another terrorist attack is the U.S. then the panic will create a climate of fear and a strengthened Patriot Act., including an "emergency" on the unreadable encryption is almost a certainty. Additional attacks and we're probably looking at Constitutional Amendments that we would have considered unthinkable a few years ago.
Statements like this from Obama are just preparing everyone: one more terrorist attack in the U.S., and we can kiss legal encryption goodbye.
In the system that I saw infected with CW 2.0, the encryption process seemed to have been relatively slow. The user noticed that something was weird was going on, put in a USB flash drive and copied their Documents folder to it. They saved approx half of the 200 or files before they were encrypted. I think the encryption pricess on CW 2.0 is just slow, rather than intentionally delayed but that's just my guess.
A couple of things to bear in mind: CW 2.0 basically leaves Windows in a normal bootable state. CW 2.0 launches it's ransom and warning msgs when you first boot but applications all run as expected. E.G. Word ran fine but of course you get an error message when you try to open a doc. Also, CW 2.0 doesn't need any special permissions or to run as Administrator: it's only accessing the data files available in the context of the user.
I recently got a referral from an older couple that also got hit by CryptoWall 2.0. Credit to them: as soon as they noticed that something wasn't right with their PC, they copied the Documents folder to a USB drive and shut off the computer. CryptoWall 2.0 encrypts files rather slowly and they were able to save about half of their files. Fortunately for them, they had never had gotten into the practice of storing precious photos on their PC.
BTW, CrytoWall 2.0 also encrypts all external and network attach storage. Someone cracked CrytoWall 1.0, and there was help for decrypting the files but 2.0 hasn't been cracked.
Real time surveillance and listening to phone calls, emails and text messages have been available for years via CALEA, which mandates that all ISPs provide access for this purpose for law enforcement (see the Wikipedia article). It's rather baffling that CALEA isn't mentioned more often.
The 2nd rev of the Intel Haswell SOC is due in 6-8 months and will enable tablets that weigh 1.5 lbs, get 10 hours of battery life, & cost $400. Yep, just like an iPad! Except that it will run full Windows and all the apps that you already own and have invested years in learning. Basically, they'll be Surface like devices (you'll want a detachable keyboard and touchpad when using Windows desktop apps): only lighter, longer lasting battery life and *much* cheaper. Plus the benefits of choice that come with having dozens of manufacturers producing them.
Microsoft historically has played the waiting game very well but this time they were just too impatient: they should have simply made Metro optional on non-tablet PCs for now, kept refining it and avoided this entire mess with Win 8. Metro just had to be ready when people start needing a touch interface on Windows. It hasn't happened yet, but it will definitely happen.
I don't have to speculate: I started my programming career at 41. This was back in 1986, so it was a different landscape back then. I had working doing PC tech support for a very large insurance company for 3 years, prior to which I had almost no computer experience. I did show a strong ability to grok the technology right off the bat and I was passionate about it and pretty much poured myself into all aspects of it. It was also a very exciting time - there was a lot of inspiration in the PC world.
I started programming as a natural extension to developing support systems using dBase and then Paradox on DOS, so my first steps were in 4GL. But after a couple of years,I decided that I wanted to learn Windows Programming. That meant diving into hard core C programming and wrestling with the with Win32 API. I did rather well all things considered. At that same insurance company, I was one of the lead programmers for in house desktop OS apps and I was also personally responsible for getting Windows established as the standard desktop OS and gleefully managed to piss off IBM in the process. Then I watched MS turn into total douche bags when they attacked me and my department for getting Borland products widely used in my company.
I finally got sick of the corporate scene and joined a small consulting firm where I focused on 4GL development with Pardox For Windows and then Cold Fusion when the web became dominant. After 15 years, I burned out on coding. Now I'm a full time DJ, part-time support and networking tech - poorer but happy.
So, I say go for it: coding is still one of those things that either you can do it or you can't and if you're good, you''ll find work.
I was initially very skeptical about the city-wide lockdown until it was reported on every news outlet that the reason for the wider city "lockdown", was to minimize the strain on law enforcement and other services that would otherwise have to respond to matters unrelated to capturing the suspects. Seems pretty sensible to me. It's still to soon to know for sure but I haven't heard of any abuses by law enforcement in areas located far away from the action.
>I can switch to an anonymous vpn and try it again.
I thought that that using a VPN would prevent Comcast from being able to detect what I'm downloading, etc. but I've been reading conflicting stories about this on various sites.
Will any VPN work to keep my traffic private?
Do I need to use a particular protocol: will a VPN over PPTP do the job?
What a minute. Shouldn't we be putting the blame on Apache? By deliberately ignore the DNT flag on IE 10, they are breaking an essential trust and screwing users.
What is really going on is hat these Fusion centers have found the ultimate workaround for those pesky little constitutional annoyances like Probable Cause and jurisdictional boundaries.and due process. Names just happen to turn up from anywhere and some tangential, half muttered possible connection to possible terrorists is given IF it's even requested and then the fishing begins. Another particularly frightening thing to consider is that the Fusion centers have become the destination spots for the super high tech surveillance technology after it returns from being deployed in Iraq, Afghanistan and other military operations. One of the inherent problems presented by some of the new advanced capabilities that are available with these toys and esp the way military has been using them, are illegal or or require very specific legal procedures in exceptional circumstances. It shouldn't be a surprise to find that when this gear is sitting around, available to the personnel, that there have been disturbing reports of it's being used by local law enforcement, with the assistance of US military in ways that are simply not legal. What disturbs me even more is the culture o shoft that might be taking place within local police ranks in terms of being comfortable with rationalizing sloppy adherence to privacy protections, probable cause and some of the legal protections that may the only things that are protecting us from sliding into a the kind of data and scanning police state. And these Fusion Centers have enough loopholes in their charters to get away with just about anything. There aren't even enough people to keep an eye on them or even occasionally review them.
We're ten years away (tops) from cheap, very portable scanning technology that will be able to instantly detect anything from 100 feet away, even a dust sized particle on your shoe. It can deployed to scan a busy street corner 24/7, and when it yields a positive detection from something stuck on your shoe, it spits out a a full ID via facial recognition. Probable cause test passes with flying colors, a visit with the judge, and a few hours later, with that search warrant in hand, they could be busting down your door. What could go wrong?
I think the only thing Linus needs to do is make it clear that he's speaking as an individual and not in any capacity related to Linux or the Linux community. The fact that he was correct in his assessments is just something that makes me smile. Their size and their business clout, plus a lot of lot PR has given the Mormon religion an aura of normalcy but taken strictly on it's own beliefs and teachings it would be considered a fringe, quite bizarre religious cult. Before anyone jumps up to defend the Mormon Church, go ahead and spend a good 4-5 hours visiting the Mormon complex in Salt Lake City, as I did a couple of years ago while I was passing through the area. Bizarre, intellectually bereft, culturally constricted, frightening political power, spookily secretive. My impression after my visit was that underneath the surface, there is something very unhealthy and more than a little scary going on. I left SLC depressed and concerned.
There was considerable customer interest in a full touch screen mobile phone well before the rumors surfaced re: Apple making one. It was discussed as a natural evolution of the Palm Pilot concept and the Treo, just using touch either with a stylus or replacing it. Apple's brilliance with the first iPhone, was obviously in their their particularly elegant implementation. There were other companies working on touch screen phones but the iPhone was much more elegant and immediately captured almost total consensus that it represented the best direction for touch phones
Because there was a very strong interest in smart phones in general and touch implementations in particular at that time, Apple should addition brilliance in the timing of the iPhone's release. It was innovative to the ideal extent: it created excitement and gear lust but it wasn't so far out that only geeks could relate to it. But I think the crucial timing decision was related to the price. I've been told by a close friend who was involved with the hardware design, that the price point was a a hard target and they simply wouldn't release it until they could hit that price. He said that they could have released it almost a year earlier but the extra cost would have slowed adoption and reduced their head start on their competitors. Jobs was determined to come out with huge sales numbers. He didn't want the perception that Apple was just doing OK in a new market (for them).