Comment So the moral of this article is... (Score 1) 466
It's too hard, so don't even try?
It's too hard, so don't even try?
$500 a month if I want to be able to search my feeds? Are they fucking insane?
For some reason it won't let me mod up this answer, but it's correct.
Schrodinger wasn't making a point about quantum theory, just the copenhagen interpretation. For some reason, even today this interpretation is so widespread that it's equated (even among many unaware grad students) with quantum theory itself, even though there are dozens of other equally-absurd interpretations out there.
Oh yeah, and images can be/are used for tracking as well.
Plus, if we allowed images, I'm pretty sure 90% of it would end up being porn and cat pictures.
Not sure why this is moderated as "funny," since it's true - <img> tags can be/are used in XSS and CSRF attacks. In fact, SVG images can contain executable javascript. And let's not even mention the possibility of polyglots: http://www.thinkfu.com/blog/gifjavascript-polyglots
So your advice is, always be subservient?
It sounds to me like you're just rationalizing to convince yourself that this could never happen to you. Because bad things only happen to people who deserve it, right?
"the risk for oral and pharyngeal cancer held steady for the participants who consumed tea on a regular basis."
Tea has more antioxidants than coffee, so it seems your theory is incorrect.
spoken like someone who has clearly never lived anywhere else...
I was about to post this same thing. I can break a 14-character LM password using OphCrack (which fits a rainbow table of all possible 7-character halves on a CD) in 6 minutes on my grandma's PC. And MD5 has become broken so badly (primarily by Wang, et al) that I can literally generate collisions on my calculator in a few seconds.
Did they try their GPU cluster against a **non-broken** hashing scheme?
I still don't understand the benefit of Quantum Cryptography - it only prevents eavesdropping on the wire, right? It doesn't prevent a man-in-the-middle (where someone would receive the signal, read it, and retransmit it along the wire)?
Assuming your machine is clean from infection, the big eavesdropping concerns today come from man-in-the-middle attacks: rerouted lan traffic (such as compromised clients running an ARP spoof), and intermediary nodes between endpoints (eg. your ISP, and the Internet backbone routers). The only thing QC prevents (actual, physical wiretapping), as I understand it, is not much of a concern anyways.
I believe iOS has had forced full-disk encryption since iOS4
My OS class in college has us write the OS on top of a virtual MIPS PC written in Java. It ran just fine.
...thus producing an entire country whose writing-skills were conditioned to game the auto-grader.
Can you imagine if the movie or publishing industry did this, so books and movies couldn't be rented/sold/checked out from a library? So why is the video game industry able to get away with this!?
If they completely ignored takedown-requests, that's one thing. But otherwise I think they're going to have a hard time getting "deleting content that was not regularly downloaded, therefore pirates" to stick.
Recent investments will yield a slight profit.