Hmm - if that is true, I wonder why Google wants to create the impression it has a security team that is quite happy to pretend to be law enforcement.
Because, unlike Apple, they could not get actual law enforcement interested in getting involved. So they needed to do something to add some drama, intrigue, and a sense of danger to the situation.
Maybe searching for love on Google wasn't working out so well...
Microsoft's entire security model was based on the idiotic notion that one could take a single user OS with no security (Win 3.x/95/98/Me) and years later create successors (NT/2K/etc.) that didn't break applications that were already written. It wasn't users -- it was coddling the software vendors that drove the convoluted, unmanageable pseudo-security that got pasted on to the OS.
No rational OS architect would have permitted end-user applications to write to OS system directories, nor would they have allowed Dynamically Linked Libraries to be created and added to OS directories with no entity controlling the namespace (meaning you could create a blorm.dll that installed with your product and I could create a blorm.dll that overwrote it when my product was installed).
Other ideas, like allowing some kid in the Philippines to e-mail you a script that automatically ran when viewed, were just examples of the level of stupidity that had permeated the Microsoft campus.
Embedded systems may not have a full featured shell. So even relying on shell scripting won't help.
Embedded systems usually use busybox, which can support a full-featured shell (even bash specific extensions, optionally). Most of the embedded systems I've looked at include at least ash support, so if there's any need to do scripting, shell script is the obvious choice. Anything else is likely to require more system resources.
Actually, it's not legal to videotape/shoot photos inside of a McDonalds and the employees overreacted to this
I don't know about the law in France, but in the United States it is perfectly legal to photograph in any public place. That said, most citizens and law enforcement are ignorant of this fact, and people are routinely hassled for photography. Sometimes their photos are forcibly erased (which actually _is_ against the law). Places might have a "no photography" policy, and if they tell you to leave and you don't, then you are trespassing, but that is usually their only remedy under the law.
Besides, under normal circumstances this device does not save any information, and is not "videotaping" or "shooting photos". It's a bit like assaulting someone at a concert for wearing a hearing aid.
What about chain loading XP from the Canonical boot loader?
Secure Boot only looks at the first boot loader to see if it's certified. Whatever happens after that is anyone's guess.
It's not likely that the Canonical boot loader will allow chain loading XP. Any signed UEFI boot loader that boots an unsigned operating system will be doing so under threat of their own key being blacklisted.
Don't get me started if you need to get a machine in your datacenter with (*shudder* enterprise storage), you'd get more joy out of your year by crushing your balls under a hammer every day for a year.
Especially if you're the sort of person who likes that kind of thing.
Is this the last teenager still using AOL?
Yo man, are you the deadhead I'm thinking you're supposed to be?
My name is August West.
Good hello folks! It's wonderful to see we've made it onto Slashdot in-between releases again!
However, our website hardware is nearly toast, and is also co-located a long way away from where I live. It is an ancient VIA based system with a Celeron and 512MB of RAM. It also sports a Maxtor hard drive connected to a Promise Technology PCI IDE card, and LILO boots from a 3.5" floppy drive. Frankly, this wasn't really great hardware even when it was brand new, but it ran our site and mailing lists with excellent uptimes for over a decade in spite of that. It looks like the trouble could be a flaking Tulip based Ethernet card (getting DUP and dropped packets, and RX/TX errors). It was doing OK again after a reboot, but I'm having some trouble reaching it again for some reason.
We're looking for a new place to put the main site. Perhaps it could move to our other server, connie.slackware.com (in which case we need a PHP guru to port it to the latest version). There are other Slackware related servers that might be able to host us as well. To be honest, connie is also getting a little long in the tooth (that's a Pentium III with 256MB of RAM).
RIP bob.slackware.com, and long live Slackware!
To be an effective placebo, it has to be a believable placebo.
Thus, you have to dress it up with ritual or herbs or pins and needles or lots of water or whatever the method of convincing the patient that they're getting something that will help.
Actually, there was a study comparing a double-blind placebo with "here, take this sugar pill containing no active ingredients", and the placebo was just as effective even when the patient know it was a placebo.
I like work; it fascinates me; I can sit and look at it for hours.