It's an exoplanet-sized object.
It's an exoplanet-sized object.
Try OpenDNS. It's got good granularity for filtering criteria and you can either filter at your router, or on a per-computer basis.
Plus, their founder has a
... or he'd have been up on a Swedish stage singing,
"Helm holm! Stockholm! Alfred Nobel-lo!
Ring a ding! Thanks, King, for the medal-lo!"
And after the 17th verse, the audience would be trying to summon a Balrog.
why did Win 7 remove the telnet command???
Why do I find telnet.exe on 64 Bit Windows 7 Home Premium? It is not enabled by default - but it is there.
In Win 7 Home Premium try searching for "Remote Desktop Connection." Remote Desktop Services
When the government really monitors you, they can afaik still see the links you are going to. Or does https also encrypt the url? No matter what they can still see which SERVER you connect to. So they can still see you are connecting to al-jazeera or whatever.
What you are talking about is far more than just encryption of traffic between you and the server you visit: this requires something like tor where you can hide which site you are actually trying to connect to. Which in itself would be a serious red flag for investigators: why using such a system, at high cost (slow connections, maintenance, etc) when you have nothing to hide?
And if your boss is mandating such high level monitoring of your internet use, then there are probably far more serious problems than accidentally running into something sexually explicit or so while trying to read
It costs a nonzero amount to get a certificate at all, and a self-signed certificate is barely better than raw http.
Well, the question was about encryption rather than trust. Trust is a whole different topic. Nobody has yet come up with a good trust model for the public Internet. The one that exists right now is next to worthless for two reasons: 1) Criminals who exploit novice Internet users never bother with using SSL on their phishing sites 2) greater than 99% of all Internet users who encounter an SSL certificate problem simply click "Okay, proceed" without bothering to understand what the warning is trying to tell them. In terms of trust alone, SSL on the public Internet is as bad or worse as any security theatre you'll find in an airport.
A self-signed certificate, however, gets you encryption without trust. That in itself is valuable to someone like me. It's incredibly unlikely that anyone would want to target me specifically to pose as my email/web server. I'm mainly concerned about preventing eavesdroppers from picking up the contents of my traffic by sniffing the wifi or compromising a router along the way. And if they did, the chances are pretty high that I would be trying to access my server using a client that already has the certificate saved, so I would likely be warned if the certificate changed in any way.
Finally, a lot of people fail to realize that there are plenty of situations where you can have both encryption and relative trust without needing the services of a public certificate authority. Anyone can set up their own CA and distribute the root certificate to all computers and devices that need them. This works fine for a corporate intranet or VPN, for example.
First, the researchers made a nanodevice with two slots that could accommodate so-called "DNA cassettes" in a programmable way. The DNA cassettes themselves have free ends that can only bond with complementary DNA. Each of the DNA cassettes has an 'A' end (that can only bond with other A-type molecules) and a 'B' end (I'm simplifying this greatly; 'A' has nothing to do with adenine). The cassettes can be inserted into the two slots with either the 'A' end up or the 'B' end up. So this means there are a total of four states for the device: (1) first slot: A up, B down; second slot: A up, B down; (2) first slot: A down, B up; second slot: A up, B down, etc. The researchers were then able to take four target molecules (one for each of the four programmable states) and show that they bonded to their complementary state. Further, by developing an error-correcting scheme, they were able to get the fidelity of the bonding to 'apparently flawless' levels (quoting FTA, more on this in a sec).
A little more explanation is in order. All of the target molecules have an 'A' and 'B' marker on both ends of their strand. Now, say for example the nanodevice is in state 2: 1A down, 1B up, 2A up, 2B down. The complementary molecule to bind this state would have four markers with 'A' oriented downward and 'B' oriented upward on one end of the strand, and 'A' orented upward and 'B' oriented downward on the other end of the strand. The problem with this is that other target molecules which aren't complementary can still bind. For example, the target for the 1A up, 1B down, 2A down, 2B up would fit equally well into this binding pocket upside down. Also, any of the target molecules can bind with half of the binding pocket, leaving the non-complementary end either dangling or only loosely bound. The researchers get around these two problems using their error-correction scheme. It turns out that the correct target molecules bind more tightly to their complements than the incorrect ones. By heating the devices slightly, the researchers can dissociate the incorrect binding while keeping the correct binding intact. This is, I believe, what was meant by the phrase '100% accuracy.' So, in short, it's still exciting research, at least from my point of view, but no one's moving individual atoms with 100% accuracy or any of the hyper-exaggerated nonsense that I've been reading here.
Phones already control software through the accelerometer data- namely switching between portrait and landscape when you turn the phone sideways.
Besides, I like the idea, but the reason you want it is finger smudging? Wash your hands and stop picking your nose.
Linens'N'Shit is closing...
I've always called it "Sheets-N-Shit".
Where are the calculations that go with a calculated risk?