If NSA has a complete record of which tweets you read, then the NSA already knows a lot about you.
Perfect Forward Security is optional in SSL - you can run SSL without DH exchange. That is the whole point of the article.
Explanation of game 9: http://en.chessbase.com/post/chennai-09-thrilling-fight-tarnished
There is a whole class of vulnerabilities related to maliciously crafted filesystem structures. You necessarily don't need to execute or open any files, you just need to try to mount it.
There is another class of vulnerabilities related to the preview feature of some Linux file managers. So you don't even need to open any non-executable files to be vulnerable either.
And then there if of course standard buffer overflows when opening non-executable files.
In the US, they keep pointing out that their program is only about terrorism, and only spies on non-US citizens.
Not so in the UK, where the program is apparently about spying on everybody, including Britons, even if no terrorism is involved. That is a significant admission.
So you need IE>9 for Google Apps. Since IE 10 is not supported on Windows Vista or Windoes XP, that means no more Google Apps on IE on those OSes. Windows XP is EOL in April 2014, so no big deal, but Windows Vista is supported by MS until April 2017.
Because the H.264 video format is only worth money because of the network and incumbency effects, not because it is better. A video format is a natural monopoly. VP8 is just as good as H.264, and free, but that is not enough to displace H.264 because H.264 has a monopoly via the network effect.
If we were talking about a program such as Photoshop, where the barriers to entry is most determined by your ability to make a better photo editor, it would not be the same thing. There is good reason that the other examples in the summary are "TCP/IP, HTTP, and HTML", all of which are not terribly hard to replace, but which have powerful positions because of the network and incumbency effects.
I have biked in 3 feet of snow here in Copenhagen. And in -11 celsius. Perfectly possible with the right clothing, and if the bike paths are cleared (which there are here).
There has been various accusations that Snowden leaked the documents to Russia, willingly or unwillingly. This should (in a perfect world) make those accusations less valid. Also, this shows against that Snowden is damn brave and clever - it must have been very tempting to hold on to the documents, which he paid so dearly for.
On the other hand, every other smartphone seems to be working just fine with a $2 standard microUSB cable.
The problem is that the fingerprint scanner could create a false sense of security.
Sorry, wrong link, I meant this: http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115
I am pretty sure they are refering to stuff like this: http://www.heise.de/tp/artikel/5/5263/1.html
The funny thing is that today, the computer does output the right answer in response to the wrong input. Try writing "cmoputer" (sic) in Google search, for example.
> I'm hard pressed to think of anything really innovative Microsoft has done in years -- mostly they look at what others are doing and copy it (or buy it).