Reduction to principle. Disclosure of working source code for software patents. Scale fees to company size.
There's oversight involved if you have a permit. For example, you have to report any accidents or other incidents and those become part of the public record. If you aren't in the testing program then you don't need to report those.
If cops are personally liable for illegal searches and got prosecuted and jailed, then they would be thinking twice themselves. As it is, they can even jail you on bogus charges without any repercussions - "you may beat the rap but you won't beat the ride". Unfortunately, cops are not even prosecuted for straight-up murder very often, so thinking that prosecutors would bring charges for illegal searches is just fantasy right now.
My experience has been that the TCP checksums are fairly useless - they can detect single bit errors only since they are just simple checksums, not CRCs or something more sophisticated. According to the article what was actually happening was that the virtual ethernet driver (veth) did not flag bad packets correctly. There's a flag that tells TCP there's no need for it to checksum since the hardware has already verified the packet. On errors, the veth driver set that flag instead of the one that says it couldn't verify the checksum.
Alabama and a bunch of former Nazis
past tense: mooted; past participle: mooted
raise (a question or topic) for discussion; suggest (an idea or possibility). "Sylvia needed a vacation, and a trip to Ireland had been mooted"
I used to work for a woman who was a horrible bully. When she turned it on me I had a similar comment to her and she never did it to me again - but I did see her doing it to others. As you say, most bullies are really cowards.
More likely it is the nature of email/online communications. It's much easier to be nasty when you don't have to see the other person. There's also tone, etc. If I call a friend a rude name when we're together they know that I'm joking. Smiley faces don't cut it, especially with people that you don't know well.
This whole fraud detection stuff is nonsense. It's just been cheaper for the banks to build this hack instead of actually implementing a secure payments system. Come on, credit card number + name + expiration date + security code? All information that doesn't change?
We're at the point where we can make a smart card that does everything with strong crypto. It could even have a USB connection or, possibly, Bluetooth, to let you make secure transactions from your computer.
When you buy a cartridge, it's just that, a cartridge. They don't tell you how many milliliters are in it and you don't get charged by the milliliter so how much ink is left in the cartridge when it's "done" is irrelevant. There's a cost per print and that's the important metric. Obviously there's some reason why they don't drain them completely dry and it doesn't really matter since you're paying by the cartridge not by the milliliter.
Like this white supremacist who found out that he's 14% African.
The basically stupid idea is the ability to download and run Turing-complete code from unknown sources in supposed "safety". This has nothing to do with actual applications written in Java which is a reasonably secure language, certainly more secure than C or C++ (no buffer overflows, etc.).
The broken sandbox is completely orthogonal to whether or not Java is a POS. It's a feature, a broken feature, but not one that you're required to use and a well-written application, in any language, does not attempt to run Turing-complete code from unknown sources.
No, it's not a small program because these exploits are usually not against the JVM but against the sandbox. The problem is that the basic idea of a sandbox that lets you do almost anything and has fine-grained controls over what APIs you can and cannot call is fundamentally flawed. The attack surface is huge and the security code threads through all kinds of libraries.
Oh, man, you vick-rolled me!
CCI Power 6/40: one board, a megabyte of cache, and an attitude...