All of those were used by governments. One was used for industrial sabotage; the other two to spy on people who were then assassinated. Are these not "cyber-weapons"? What makes them different from Stuxnet but the degree of press they received?
Slashdot videos: Now with more Slashdot!
For people who don't get the joke, "kuwabatake" means "mulberry farm" in Japanese (where you would raise silk worms).
"Sanjuro" is a standard alias for a 30 year old guy (it literally means "30 year old guy", more or less).
5. The only phenomenon in all of physics that violates CPT symmetry.
Actually, many worlds violates CPT symmetry - worldlines divide only forward in time, not backwards. CPT symmetry requires that there be no physical bias to the direction of time. CPT symmetry is plainly untrue anyway, as we have entropy. Trying to use it as an argument against Copenhagen is disingenuous at best.
MW shows every sign of being equally wrong with every other interpretation of QM at the moment. The truth is that for many people, it represents a convenient belief. Most of its advocates lack understanding of the effective distinctions between interpretations in any case, which leads to sites and arguments like this. This is particularly bad in followers of Dawkins who argue that MW solves the fine-tuning problem, where half of the problem arises from balance in mathematical entities that QM has no plausible "ratchet" for.
Google employees weren't reading the email
Actually, they were. http://www.cnn.com/2010/TECH/web/09/15/google.privacy.firing/
And it's happened more than once. http://gawker.com/5638874/david-barksdale-wasnt-googles-first-spying-engineer
I submitted this same story about a half hour ago, but in a form not nearly as well written. The author of this post seems to have taken that and run with it.
This is cool, and also explains why people occasionally complain about their stories having been "stolen".
Wow, someone on Slashdot quoting Proudhon. That's...uncommon.
Have you read Locke? Everything belongs to God, or everyone, if you like, but when someone puts their work into something, the portion of what is produced that can be ascribed to their work is theirs. If I cut down a tree, it's only slightly mine, because I did the work to cut it down, which isn't much. If I make a chair out of it, it's more mine, hence I can sell a chair for more than I can sell firewood.
Here's a reference: http://en.wikipedia.org/wiki/John_Locke#Theory_of_value_and_property
I think people think you can run a game like this without a monthly fee because Guild Wars did it, and Guild Wars 2 is going to do it.
Guild Wars made plenty of money with that model too. The idea that you need montly fees in order to maintain servers is a useful one to the people who want to make more money on their MMO by charging you rent to play it. Please don't promote it. The reality is that maintaining servers doesn't cost that much in light of the margins on software.
Oh, and "tough". Sorry, it was bothering me.
XSS attacks require you to push the parameters in the URL itself.
That's not actually true. Reflected XSS attacks are sometimes exploited through a URL string element (post data can also work). Persisted XSS attacks occur when user provided data is stored on the server and then later rendered in HTML without being properly encoded first.
It's entirely possible (and not all that uncommon) for an attack to rely on both an XSS issue and a SQL injection issue. Say there's some popular CMS that has a SQL injection attack that can be exploited through a form post if the user making it is logged in with a session cookie. If this attack allows the malicious SQL to then inject script into some part of the page on that CMS so that it's rendered unencoded, it could then execute the script for other users who visit the site and attempt to make the same post to other sites that come up as the result of a Google search (Google is a great enabler of these sorts of things).