Comment Re:Extortion? (Score 2) 541
So you are saying the people that pay back the cost of their eduction did not work for it, but the ones that were given money they didn't have to repay worked for it. Both groups worked for it.
So you are saying the people that pay back the cost of their eduction did not work for it, but the ones that were given money they didn't have to repay worked for it. Both groups worked for it.
Unless things have changed very recently, the US government allowed you to file a form informing them of the taxes you paid to your resident country and deduct that amount from your US taxes. If you lived in most of the civilised world, that meant you paid more than the US rate anyhow and had a US tax liability of $0.
When you get old enough to drive, and try driving a car with essentially no steering (because the power steering pump is no longer providing pressure) and little brakes (ditto for the brake pump)... you'll understand.
Power steering is completely useless at speeds over 30 km/h and power breaks will get you a good two more firm applications of the breaks before they lack the power to assist. I recommend more driving experience before you abuse others with your faulty theoretical knowledge.
I would say no, putting sensitive data on a machine that's shared with others is a bad practice no matter how you do it.
Yes, of course, but that would be a pretty bad design. If some third-party is storing my credentials, I'd rather have to re-authenticate when they plan maintenance than have them store sensitive data unencrypted on disk.
It wouldn't be all that secure in-memory, but an SQL injection attack won't reveal it. It's marginally more secure. I was merely answering the question about what a potential key to that field in the database would be.
Under a requirement to pass this password to a third party when "linking accounts" (that is, making requests of the third party on the user's behalf). It could be stored encrypted in the database, but with what key?
If the user is passing a clear-text password, you could use that as the key for their other passwords. Use your stored hash to validate their password, use their password as the key for their third-party data.
If the user-agent is passing a hashed password, use a different hash as the key for third-party data. Send both hashes to the server, which uses one for authentication and the other for decryption of the third-party data.
The only problem with this not effecting you is that it very well might. Those stores that you go to six months after release to get a game for $20 are unlikely to survive very long when their biggest revenue producer (i.e. used-game sales) vanishes.
Evil is a social construct that's pretty fluid between time and space. Not sure that just because greed is one of the seven deadly sins, it automatically becomes evil in the here and now. Not even sure that sinners are automatically evil, or that every sin is an evil act.
I like the joke, but honestly if you don't inch forward every opportunity you get, often you can coast in first or second and shift neutral to gear a lot less often. At least in a car which has enough torque that in first it won't stall without any gas, but creep forward.
Keeping one's hand on the shifter when not shifting puts unnecessary stress on the fork which leads to premature mechanical failure.
If you keep your hand on the shifter, you're doing it wrong.
You should try https://duckduckgo.com/ if you are looking for a search alternative.
You of course have a right to plead guilty up front and take your sentence, what they shouldn't have the right to do is bully you into thinking the sentence you are getting from them is any worse than you would at jury trial.
No, I didn't ignore it. Read what I wrote again. I do not believe it's an actual benefit and I explained why.
It is easier to write an incorrect program than understand a correct one.