I don't see why you think his account has been hacked.
I wondered about that, but I took it to mean that the uncle clicked a link and entered his account details before asking what the link was about, and so was 'hacked' in that sense, not that hacking was needed to fake the From: header.
There's the question of how the email associated the recipient and sender names, but that just suggests that a mutual friend's machine was harvested for addresses.
Unfortunately it's a 16K model, and a fairly early one at that, which won't run much software
Hey! I was still supporting the 16k version with a game released in NINETY-two.
Sitting on a Cray, and seeing the Utah teapot.
I know a number of families that make kids share an iPad
You can usually get refurbished iPods (from Apple, so good condition and 1yr warranty) for under $200, especially if not the latest version. Ideal for kids, as long as they're in a thick rubber case.
(There's a joke opening in my last sentence if anyone wants it.)
The "wow" about iPhone, and later Android, was "look at all the things I can do with it! And the number of things I can do with it is growing like crazy!"
It's a bit surprising to remember that the app store didn't launch for over a year after the iPhone.
Buying a book from an ebbok bookseller doesn't have to mean DRM. While Amazon might force it, their competition does not.
That was the point - Amazon doesn't enforce it, it displays "this book is DRM-free at the request of the publisher" for some books now. But the poster was complaining that you still can't actually get that book without downloading it to a kindle.
I think of synergy as as being the emergence of new properties, not simply scaling existing productivity
If I have one VCR*, I can record and play shows. If I have two identical VRCs, a new feature emerges, I can duplicate tapes!
One person struggles to assemble furniture because the parts fall over, with two people, one holds the parts while the other joins them together.
*A type of DVR with a long, rolled-up hard drive.
People will still have to type 'amazon.com' into google first, right?
the server carries a verifier for each user, which allows it to authenticate the client but which, if compromised, would not allow the attacker to impersonate the client
Money isn't everything -- but it's a long way ahead of what comes next. -- Sir Edmond Stockdale