still there
It's just that YouTube allows the person who uploaded the video to disable them.
459 publicly visible posts • joined 4 Apr 2007
I can't tell if you are trolling or just fail at reading comprehension but just in case:
"The figures just released show that of all Android devices activated to date, only 3.3% of them run Android 3.x, aka Honeycomb. Honeycomb only runs on tablets, so the numbers paint an accurate picture of just how few Android tablets have been activated. If we use Andy Rubin’s latest tweet claiming 200 million devices have been activated to date, that 3.3% running Honeycomb only represents 6.6 million Android tablets."
He adding up the numbers for ICS and Honeycomb and assuming those are the total amount of tablets when, in fact, the hottest selling tablet still runs on Gingerbread and his interpretation of the numbers will count those as cellphones rather than tablets.
It's a Blasted Samsung issue and I have the same problem with my P1000 Tab.
They did something strange to their wireless manager and email client. With wireless I am constantly turning it off and then on again to get it to connect to my office and home WiFi networks but my HTC (runs Cyanogenmod) doesn't have that problem. The same goes for email, I can't speak for pop3 but Samsung's clever Email client can't delete IMAP emails from the server so if I delete the message it's gone until the next time it checks the server.
Someone at Samsung thought they needed to modify Android to make it better and they failed badly.
Note the large "citation needed" next to that line in the Wikipedia entry. It's there because the line actually very wrong.
Stratfor is not a security company it's a private intelligence service that keeps it's subscribers up to date on world events and their likely outcomes. While there is the odd video about physical security those videos aren't the majority and aren't the primary reason for the site. I have also never seen Stratfor claim to know anything about IT security.
The really strange thing about all of this is that I looked up my password from the website showing off the leak and they had the wrong password for my Stratfor account..
All of this makes me suspect that someone is exaggerating what all got out.
Not that I'm taking my chances mind you, I have double checked that I haven't used a variation of that password anywhere else and my Credit Card is canceled.
After working in the online CC industry I can tell you the banks never pass up the opportunity to add a fee and it doesn't help that they view it as the merchant's fault if they get used for a fraudulent transaction and yes, people have been put out of business this way.
So far the outcry has only resulted in the credit card companies issuing a statement that there is nothing that forces the banks to add chargeback fees to their contracts but in practice I don't know of any banks that don't have a clause for chargeback fees.
If incompetence was a firing offense, a lot of the retail industry and most of the credit card processing industry would be forced to shut down.
Dealing with a processor now that has a system that was designed to use the end user's browser to contact the bank and return the reply to the merchant. Shockingly hard to work around their design and turn it into something secure.
As an Android phone owner I can tell you that you most certainty do not have to "dick with" anything on an Andoid phone. Downstairs from me is a woman who wanted my advice on a tablet. I helped her pick out a Samsung Galaxy tab and then offered to show her how to use it. Turns out she never took me up on the offer because she mastered it on her own. She is not a techie and all she wanted was GPS and the ability to browse websites and check her email and she likes her Android device because it is easy.
I, on the other hand, have rooted my company assigned Galaxy tab and replaced the OS on my HTC but I love doing that sort of thing. My point is that just because you can doesn't mean that you have to.
It's clear that anonymous and friends have no idea (or don't care) how the banking system works. If they donate money from a stolen card to a charity then not only will the charity not get to keep the money, they will be charged a chargeback fee by the bank as insult to injury. The banks are _NEVER_ on the hook for the money, only the merchant and this stunt will only hurt the people they are pretending to want to help.
The only thing Google is replacing are sites that provide localized searches for information and very interesting to note that most of the companies backing this complaint are people I already had entered into my "block from search" before all of this started. When I'm doing a search I want to find the product I'm looking for and not find myself in some product search site that offers no more information than the search page I just left.
@trevor 3 you are close but Android doesn't do it the CPU does. On any modern CPU architecture the CPU can map memory however you want so a given resource can be relocated anywhere regardless of it's physical location in RAM. This is the same virtual memory function that gives us Swapping but someone has discovered a way to re-purpose it as a security tool.
Can't speak for the radios but at least boomboxes had real speakers. Most of the complaint I have with the cellphone music crowd is that even good music sounds terrible on a tiny speaker too small to have any decent frequency response. To make it even more annoying it seems that a lot of what the kids are listening to tends toward Base heavy and the speakers just can't handle it.
Mostly true but you give far too much credit to OpenBSD, a lot f things got replaced (sendmail, WUFTPD etc) but even then in the early days OpenBSD's daemons had their fair share of exploits as well.
Thankfully these days the system software people pretty much have their act together and most Linux root kits are either password guessing or exploiting a web app.
Some Nigerian cloned her Facebook profile and started trying to get money out of her friends and family. The solution is to use the report button on the bottom left side of the coned page and report it as someone pretending to be someone else. I got my aunt's friends to all do that and they had the cloned page down a few hours later.
There are plenty of good reasons for not having your papers on you such as doing work where they are likely to get wet in your pocket (ie sweat from outdoor work, or kitchen) or stolen if left out.
After having lived in Spain for a bit I've noticed some interesting things:
1. Identity documents wear out rather quickly in your pocket.
2. Police only check the ID of people they don't like. I've been let through multiple blockades just based on my skin colour and the only time in three years I've been actually checked it was because they stopped the black guy I was walking down the street with and I stayed rather than leave.
It's hard to find a compelling feature for anything as low level as a network protocol so the only actual reason to change over would be to avoid running out of addresses. That means that managers will do exactly what they did for Y2K and that is push the fix to the last possible moment when it's complexity and costs go through the roof.
Now that the central registry has run dry I'm seeing management finally clue in to the need for a change and both home and server hosting ISPs are promising IPv6 by the end of the year.
Of they will just do what Telefonica Spain is about to do and that is a mass flash of all of their DSL modems. If you locked Telefonica out of your modem, have a non Telefonica modem that doesn't support IPv6 or have an OS/device that doesn't support ipv6 you get IPv4 behind an ISP level NAT.
Thing is I knew the guy 10 years ago and this seems like a classic idiot Leo move. I quit after he started into the Spam game and met some other former employees who told me that before I worked there he liked to argue that child porn was harmless and a good way for otherwise poor children to make money.
It also sheds a whole new light on the time I walked into his office and found whois info for a child porn domain on his screen but at the time I assumed he had come across it and was reporting it to their ISP but now ...
You are assuming that the same organization owns all of the SSL certs but in many multi domain cert cases (any shared hosting) that's a really bad assumption.
There is a way to properly virtual host on SSL called SNI but Microsoft has not back ported that change to XP so for any browser that uses the OS system SSL libs (IE, Chrome) they won't get SNI support. As far as I know the only browser on XP that supports SNI on XP is Firefox. The upshot: as long as there are a significant number of Chrome/IE users on XP I can't implement this technology on my servers.
The people I rent from use 802.11 N to connect to their ADSL (7MB down /750k up) but don't get anywhere near the speed I do with my more direct connection.
Remember that unlike WIFI, Ethernet and ADSL are full duplex(can send and receive at the same time) and that will make a large difference in both throughput and latency.
These are the people who go out of their way to find ways to make you stumble on it by accident. Remember this is the industry that brought us whitehouse.com and nasa.org(found both at different times by accident while in class a decade ago when I was at school).
I don't mind that porn is out there since what consenting adults want to spend their time and money on is their own business but I really do mind accidentally bringing up porn sites at inopportune moments when someone seeing me bring the site up can have unfortunate consequences (work, school etc).