Kids nowadays
"... arming tweenagers with cheeseboard and soldering irons ..."
When I were a lad, we had to make do with breadboard and tallow candles.
6077 publicly visible posts • joined 10 Jun 2009
Isn't it just a backlit fixed display with the touch surface being read for keypresses? A truly virtual keyboard would have software defined display and you'd be able to change the keyboard 'nationality' in software. With a suitable API you'd be able to develop your own 'keyboard', customised for various applications.
"Reliability-wise it retains data for >1,000 years ..."
You have to make certain assumptions about material properties and behaviour to extrapolate that theoretical result from testing that lasts a lot less that 1000 years. CNTs are a very new material so how can they be certain that those assumptions are true for CNTs?
Also, what is the theoretical working lifetime of the associated support and driver electronics? Random gamma rays do pass through everything, etc.
So, they get the login cookie for the malicious site that they control, after it's had lots of cyber chat with another site that they control. This is about the connection and login to their malicious site. I don't understand how that helps them to break the encryption of the user's VPN link, because I always assumed that the VPN was 'transparent' and its encryption was between the user and the end point operator (who must be trusted).
They are not errors. It's deliberate, probably to save money, and they know there will be no penalty if they get detected. You can't trust anybody with data. They wouldn't store it for you unless they thought they could make a profit in some way and then the profit becomes the driving and only consideration.
just educate people that what they read on social media and also in the newspapers is often just someone's attempt to influence them for that other person or organisation's benefit. Teach them critical thinking and to cross reference a variety of sources and opinions to get a better idea of how 'truthful' something is.
Oh, ..... wait a minute.
For a small outlay, you can set up a little solid-state FTP server in your own home. For about ten years, I've had an NSLU2 device that just keeps on running. You can still get them on ebay and there are other devices that will do the same thing. All you'd need then is an FTP client on your devices. You'd have to use email for 'collaboration'.
I used to use Evernote on Android when it first came out. It recognised phone numbers and you could tap them and have it dial the number for you. So, I used it mainly as a contacts directory. After a while, it stopped being able to do that.
The Colornote application (Android only) was still able to dial a number from a stored note and also has active links between notes, so I switched to using that as a contacts directory. Its disadvantage is that it doesn't have a PC client or a web client but you can e-mail its notes to yourself as backup for later copy/paste back into Colornote if needed.
The key exchange would be using a particular property of a quantangled photon link which ensures that any attempt to monitor the exchange would be detected; hence this is suitable for secure exchange of keys, if a bit slow compared to other communication methods and quite expensive.
From what I've read, the instant and 'spooky' communication at a distance can't be used for the instant transmission of data at a distance, for various practical and physical reasons.
I'm just a dog-basket physicist; a proper armchair physicist will be along in a minute.
The last time (only time) I tried Vivaldi, I couldn't get it to import my bookmarks.html file. I've installed, setup, configured and used many applications over the years but Vivaldi had me baffled. Is it now possible to easily import an external bookmarks .html file, like you can in Chromium, Firefox and Palemoon? Is it worth bothering?
/etc/sysctl.conf is quite a short config file. I notice the following in my Linux Mint installation:
# Uncomment the next two lines to enable Spoof protection (reverse-path filter)
# Turn on Source Address Verification in all interfaces to
# prevent some spoofing attacks
#net.ipv4.conf.default.rp_filter=1
#net.ipv4.conf.all.rp_filter=1
I wonder why these haven't been enabled by default for a distribution that is obviously intended as a domestic computer. (Also, it shouldn't say "the next two lines", it should say "the final two lines".)
There is this one too:
# Do not accept ICMP redirects (prevent MITM attacks)
#net.ipv4.conf.all.accept_redirects = 0
#net.ipv6.conf.all.accept_redirects = 0
However, there is a comment that "Some network environments, however, require that these settings are disabled so review and enable them as needed."
"... these projects run up against state laws that prohibit governments from competing with private businesses."
Does the law actually say "government" or does it say "any form of legislative power" or similar expression? Is the law written in such a way that a remote town council counts as 'government'?
"... complaints by BMG that Cox ... and had blacklisted some of the services BMG used to track and report music piracy ..."
Would those be the torrent sites that BMG had seeded with their own torrents/seeders (for their own detection and tracking purposes) which had been blacklisted by Cox because they were under court order to do so as a result of other legal action?
"MacGibbon said the vast bulk of DoS attacks are thwarted; ..."
"... Malcolm Turnbull has commented ... , labelling the incident a DDOS attack ..."
It wasn't an attack!
"(and Vulture South could not ask, because the press conference took place in a city where our operatives do not live)"
So, insufficient geographic redundancy, no failover agreements with other news providers, no emergency comms links. What happens if you or Simon are subject to a DDoS (Definite Display of Sickness) attack?
If the website operators (and the advertisers) are so concerned about ads being blocked, why don't they just buffer up the ads at the website server and deliver them as part of the main page? That way, nobody could block them. Some targeting software would need to be running at the webserver end but it doesn't sound too complicated in principle.