imnes writes: User is getting emails about purchases to their Amazon account. Realizes another user has created an account with his email address. User contacts Amazon to have it corrected, instead Amazon rep instructs user to log-in and delete the other persons account himself. Is this standard practice?
imnes writes: "The malicious program used to compromise Target and other companies was part of a widespread operation using a Trojan tool known as Trojan.POSRAM, according to a new report released Thursday about an operation that investigators have dubbed Kaptoxa."
"In the example of FIG. 1B, a user 16 has gestured by placing his fingertips on the display surface and moving them in an outwardly separating manner. As discussed in greater detail below, this particular gesture 17 is associated with a zoom-in command. When the computer 126 performs a zoom-in command, it directs the projector to provide 128 a closer, more detailed view of the displayed imagery. "
With documentation you usually just get an API reference, and maybe a simple example. With community sites like Stack Overflow you get vetted examples and best practices from real world users. It's almost always more helpful than just a static reference.