how long before they use the tactic of releasing false information about a company they dislike simply to crash their share price or worse abuse it to make a small fortune themselves
. You know, they can make a small fortune even by telling the truth. Just sell it short (or have a straw-man sell it short) before releasing the (accurate) news. Actually, I'd be astonished if they didn't...
Being able to look at people you're talking to in real time at a distance is a common sense fantasy; it is quite another thing to figure out how to do it.
If the "how to do it" is important, then please explain why it is infringement if somebody figures out his own way of how to do it. You can't have it both ways. Typically those bogus patents don't event contain a description of the how to do part...
Someone having a general idea does not constitute prior art.
No problem with that. But then someone needs to explain those stupid judges that actually implementing something (using your own method) does not constitute infringement of somebody's general idea described in a patent.
It could very well make more sense economically to not have the resistors...
But what if they wouldn't find an electricity consumer on such short notice? Would then everything blow up?
It certainly is more productive to have someone use the power for _something_, even if it is electric resistive heating or inductive melting rather than just pump it into the atmosphere.
Nice sentiment, but I somehow doubt that the grid company cares more about the environment or humanity's overall good than about their own wallet. By the same reasoning, it is certainly more productive to give unsellable fruit or vegetables to the homeless rather than throwing it into the trash. But supermarkets doing this are still quite rare, and none are actually pay the homeless to take the fruit or vegetables off their hands...
It's a command-injection flaw, and any language that is able to call other programs through the shell would be vulnerable, and that includes both Python and Java.
Err, why is an image processing library doing network uploads anyway?
Reading comprehension, where are you?
The image processing library does just that, process images. In some cases, it processes images that have been uploaded by users to a web site (think Facebook photo albums), and if the user maliciously uploaded a booby-trapped photo, he can now make the website execute commands that were not intended by the site operator...
If they're not going to retaliate anyway, what's the point?
... to know whom they can hit up for more money...
"The extortion emails encourage targeted victims to Google for the Armada Collective," CloudFlare CEO Matthew Prince wrote. "I'm hopeful this article will start appearing near the top of search results and help organizations act more rationally when they receive such a threat."
... and it did: https://www.google.com/search?q=armada+collective has as a top hit Empty DDoS Threats: Meet the Armada Collective - CloudFlare
Given that the attackers can't tell who has paid the extortion fee and who has not,
Theoretically they could. Just set up a different wallet (or bitcoin address, or whatever the correct term is...) to receive the ransom for each potential victim.
But if they don't, and 2 victims compare notes, then it is easy to spot.
Nothing succeeds like excess. -- Oscar Wilde