I've had to administrate sites in Typo3, Joomla, Drupal, and other CMSs. I've written some Typo3 extensions because there was nothing out that did exactly what I needed. Nonetheless, I cannot stand Typo3 and its irritating TypoScript psuedo-language. I'll take Joomla any day over that.
It may be a mistake from our perspective, but Apple shareholders don't mind too much that the iPod and iTMS are incredibly successful.
Many other companies have tried to break into the same markets (hello Microsoft?) with not much success. And they had even better DRM than Apple's! (from a lock-in perspective)
My favorite line from the MS site is: "If you would like to receive information when the Elevate America resources become available in your state, please follow us on Twitter: http://www.twitter.com/elevateamerica."
Oooh boy, I'm standing by for my Microsoft Tweet!
No, If any part of a page is not encrypted then an attacker can effectively strip all encryption from the entire page.
You're right, and thanks for the links. Though, this seems to be more a problem with scripting vulnerabilities and MITM attcks than with HTTPS specifically.
I also thnk that browsers just should not allow a form on a not-fully-HTTPS page to submit to a HTTPS URL.
Designers then started breaking this. To avoid an extra https serve, particularly on a front page or popular page. For the sake of "Design", including putting a sign in form on the front page.
Errr... you really think the DESIGNERS cared about extra HTTPS hits??? They were probably told to put the login on the home page. Then, the sysadmins balked at the idea of an increased SSL load, but still said the login could be done securely if the form action was HTTPS.
The real problem is browsers. They should have been designed so that only HTTPS forms could submit to HTTPS actions. No HTTP form should be accepted.
Really, you should already be wary when a site asks you for login information over HTTP rather than HTTPS.
Maybe. The login form might be located on an HTTP page, but as long as the form submits to an HTTPS page, your login credentials are still SSL-encrypted. Conversely, if you have an HTTPS login form, but the form action goes to an HTTP site, your credentials are NOT encrypted.
FTA: "In fact it is more like a puzzle that you get to solve. It told me to go to Windows Update and do a bunch of incantations."
Finally, someone at Microsoft admits that you have to use magic to make Windows work right... I would comment more, but I am on my way to my daily Ballmer goat and bull sacrifice.
Apple is 1% hardware and 99% Marketing. Not too much they do can't be done on a Dell or HP. They just make it appear to do it better/slicker/faster, that's all.
I'd peg it at 10% hardware, if not more. The internal hardware layout of Apple's desktop towers borders on beautiful. Beats Dell and HP hands down.
And, while its hardware failures tend to be more spectacular, I've generally found Apple hardware to be more reliable than any of the Wintel vendors. (...speaking as someone who has been supporting computers since before MS-DOS or the Mac...)
Fair enough.
So, just to take this to a logical conclusion... would it be OK if a stranger walked into your house or office; copied your music CDs, movie DVDs, and files off your computer; photographed your desk and bedroom; and then left your house... as long as the original materials remained behind? They would not be depriving you of the "good" you receive from those items.
Off the top of my head: beaches are the only thing, in the USA, I can think of that are always public and you can always cross private land to reach.
Upstate New York's Adirondack State Park is over six million acres of forest, mountains, lakes, and streams -- the largest state park in the continental U.S., almost as large as the entire state of Massachussetts. Half of the land in it, is actually privately-owned. Years ago, I hiked and camped there a lot, and frequently hiked along a state trail, only to find myself tramping across someone's backyard. And that is perfectly acceptable there. Very little land in the Adirondacks are truly off-limits to hikers, and it is very clearly marked. If you buy property there, you just know that hikers may be on your land. It's part of the deal. Your house is still private, but your land is fairly open access.
Does anyone think, "if I can see it it is mine?" Of course not.
I realize this may be off-topic, but have you heard about people downloading pirated movies and music off the Internet? Seems like an example of "if I can see it, it is mine," or at least "if I can find it, it can be mine."
The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.