Forgot your password?
typodupeerror

Comment: Re: How can you search data (Score 1) 90

A store offering a subscription arrangement needs to search for upcoming expiration dates so that it can 1. notify each subscriber that the card on file with the store is about to expire and 2. charge the ETF on the last valid day if the subscriber fails to update the card by the expiration date.

Why do the expiration dates need to be encrypted? A thief can't do anything with just the expiration date without also knowing the CC number

Comment: Re:Exploited sites? (Score 2) 119

by tattood (#46546453) Attached to: Some Sites That Blue Coat Blocks Under "Pornography"
This is true. Their website is https://sitereview.bluecoat.co....

Sometimes automated systems make mistakes, and when they do, they are corrected. Get over it and stop whining.

And by the way, all of the sites mentioned have been fixed.

The New Braunfels Republican Women (www.nbrw.com) > Political/Social Advocacy
Weston Community Children's Association (www.wccakids.org) > Charitable Organizations
Rotary Club of Midland, Ontario (www.clubrunner.ca) > Charitable Organizations

Comment: Re:how would it work in the real world? (Score 1) 308

by tattood (#45655007) Attached to: Google's Plan To Kill the Corporate Network

How do you run Windows programs?

The majority of the work that most employees do likely revolves around email or documents/spreadsheets/presentations, all of which have native OSX software.

For the few jobs that require software that only runs on Windows, there is always virtualization, or remote desktop into an MS terminal server.

Comment: Re:LOL wut? (Score 2, Insightful) 188

by tattood (#45231369) Attached to: Online Retailers Cruising Tor To Hunt For Fraudsters

"But it also raises the question of whether targeting anonymity services to hunt out fraudsters could have chilling effects for harmless Tor users trying to protect their privacy online"

Umm.. the user is ordering something using their name, credit card, and address. They are not going to use Tor to protect their anonymity.

That statement was not about normal people using TOR for online purchases. It was about people using TOR to hide their identity when doing things like posting to a controversial website, or whistleblowing. If this software catches on, and websites start using it to block TOR users, then it would make TOR less useful for posting anonymously.

Comment: Re:Sigh (Score 1) 324

by tattood (#44181791) Attached to: USPS Logs All Snail Mail For Law Enforcement

But I didn't give them permission to log anything for such purposes.

I fully expect my government to not violate people's privacy and conduct surveillance on them to stop the evil bogeymen.

Then don't use the USPS. There are plenty of other mail transport services out there, that may or may not do this same tracking, and may or may not provide said tracking to the government upon request.

Comment: Re:How about no (Score 4, Informative) 203

by tattood (#44035035) Attached to: Comcast To Expand Public WiFi Using Home Internet Connections
FTFA:

Security. Properly configured, a router with public-access Wi-Fi should not represent a security risk for those on the router's private and secure network. The technical reasons for this are a bit complicated; read an Open Wireless Movement explanation at openwireless.org.

Service degradation. Those using the slower public portion of a home router typically won't degrade performance on the faster private side. Future routers would speed up public access when the private side isn't being used and give the private network priority if required.

Legal liability. Those who fear being blamed for misuse of their public Wi-Fi signals are said to be protected under a "safe harbor" doctrine akin to that protecting Internet service providers. In other words, they're likely not liable for the mischief of porn purveyors or music pirates.

Freeloading. Fear of freeloaders is misplaced, the Open Wireless Movement believes. "Sharing capacity helps everyone," it says. "If you've ever been without Internet access and needed to check an email, you will remember how useful open networks can be in a pinch."

Comment: Re:Insurance Policy? (Score 4, Interesting) 293

by tattood (#43964437) Attached to: Hacker Releases 1.7TB Treasure Trove of Gaming Info
Sure, the game companies may not want this released, but does the FBI care? If they investigate, and find and arrest the hacker, it's up to the D.A. whether or not to prosecute, not the game companies. This seems like a worthless insurance policy/blackmail, because the people going after him are unaffected by the action of him releasing the encryption key.

Comment: Re:New strategy in criminal law? (Score 1) 192

by tattood (#43844627) Attached to: Jeremy Hammond of LulzSec Pleads Guilty To Stratfor Attack

Why should we encourage crime sprees? If I know I will only get charged with one instance of a crime, I'm going to rob a dozen 7-11s instead of one. You should not be rewarded for committing more crimes.

I don't think that is what is happening. You can certainly get charged with multiple charges of the same crime. It would be like if you robbed a dozen 7/11 stores in a dozen states, but they could only prove that you robbed one. You can either go to trial in 12 states, or take the plea bargain for just one robbery, and save yourself the 11 other trials.

Comment: Re:Dubious story, dubious subject... (Score 3, Insightful) 92

by tattood (#43585401) Attached to: How LinkedIn's Project Inversion Saved the Company

One is about your ego and broadcasting to an audience of other people who are all busy worrying about their ego and broadcasting to their audience

I'd say that both sites fit that description. LinkedIn has turned into the "Facebook for professionals". It seems like most people's goal on LinkedIn is to connect with as many people as they can to get their "network" as large as they can. I have gotten LinkedIn requests from people that I met at a conference several years ago, and talked to for 5 minutes.

LinkedIn used to be about creating a network of trusted colleagues, that you want to keep in touch with, so that you could get trusted introductions to people you didn't know. If I trust person A, and person A trusts person B, B trusts C; therefore if person C is looking for a job opportunity, then they have a good chance of being a reasonably good candidate. That whole concept seems to have gotten lost in the last few years, and now it is all about having as many connections as you can.

"Your mother was a hamster, and your father smelt of elderberrys!" -- Monty Python and the Holy Grail

Working...