other layouts are easy to learn
When I broke my left wrist this summer I learned to use this
http://www.maltron.com/maltron-kbd-single.html
in a few days
109 publicly visible posts • joined 5 Feb 2007
I'll call Godwin on myself but those people who proudly ticked Juden in the census of their free countries in the 1930s had absolutely nothing to hide. Indeed, many of them were proud that their WWI service had uprated their status as full citzens in various European countries.
Then IBM sold them out to the Third Reich and the Hollerith cards identifed 1/4 and even 1/8 Jews for deportation / murder.
IBM's founder Thomas J. Watson was awared the highest medal a non-German citizen could - the Eagle with Star (he returned it in 1940).
http://www.liberalslikechrist.org/about/IBMholocaust.html
Dutch Jews
1930 111,917 Census
1941 154,887 Nazi occupation
1947 14,346 Census
Even if you doubt the efficacy and knowing involvement of IBM, the book is a sobering insight into the lie of "nothing to hide, nothing to fear".
http://www.ibmandtheholocaust.com/
What if Facebook sold out tomorrow, their current promoses mean nothing.
http://www.stockmaven.com/ibmstory.htm
"This approach appears to have been used in the Netherlands when small-area tabulations of population data by religion from the 1930 Dutch census made up one of several data sources used in the development of the so-called 'dot maps' of Amsterdam," he says. "These maps, which showed areas of the city where the density of the Jewish population was the highest, were used in planning Nazi-inspired attacks on some of these neighborhoods in February 1941."
Belittling compliance cases like this denegrates the quality of all future requests for compliance, not in a legally binding sense but as a powerful negotiation tool. It's like not bothering with trying to keep advertisers compliant with the Advertising Standards Authority. If you don't bother then there's no point having any standards at all. I want to live in a world where GPL (and other licensing schemes - whatever they are) are followed through. If you don't work to keep your house in order, eventually it falls down.
@Anonymous Coward
Why on earth did you let them in to inspect your premises, they can only demand access if they are accompanied by a police officer. Personally if someone knocks on my door I only answer it if they have an appointment, which is dead amusing when they can see you through the window :)
> Other changes include the requirement that all users with elevated privileges use a one-time password for everything for sudo on certain machines.
running processes (inc a shell) as root == fail
requiring root as part of your workflow == fail
root is concentrated fail, wrapped in "how can you admin without it" ignorance
A post to HN (something like) "confessions of a child pornographer" described the shift of commercial CP vendors away from the web and into virtualisation. You buy the crypto keys to a remote vmware instance and vpn your way into it. No local files, no traffic sniffing, various levels of IP tunnelling (via compromised machines), I'm sure you can think of ways to do this yourself.
The filth has to keep going for low hanging fruit to keep the subject in the news, the great firewall won't build itself.
Nokia strategy waffling says nothing about the phone!
Is the email interface adequate? The s60 accepted self signed imap servers, my g1 doesn't, does the n900?
Does it play streaming video / audio in the real world? How about iplayer?
Real questions for real people. My g1 is sending this, did you post your review with the maemo?
Can I use shh properly or does it, like the g1, lack a way to type the full ascii range - no ctrl.key
Can I specify a http proxy ?
That's hands on.
for startera I'm a Plan9 user. We don't have a WIMP interface and we get serious nerd types moaning about it so if they can't cope without icons, what hope for the average computer dolt.
what i think you will see is the death of the general purpose computer.
UI innovation does not win the commodity marketplace, it is up to the incumbents to die.
User code gets tricked into executing user code, when hasn't this been the case?
It's a symptom of "worse is better". Operating as though this is not the case is living in denial. That's why I boot from read only file systems and my data storage is append only.
Processing enormous volumes of externally produced data some of which is garaunteed to have malicious intent in executables that are garaunteed to be defective by machines with convenient access to the LAN and WAN, what do you expect?
That such machines are ubiquitous demonstrates our enormous capacity for denial.
I've had people say to me that the security model of Lunix was better because "you'll only lose your home direcotory", you know the irreplacable files, where as the system files were totally protected, you know, the files you downloaded in 30 mins from one of 100 places
They used to arrest us hunt sabs in Leicestershire like this. They would arrest you in the morning on a spurious charge and let you go 8 hours later when the hunt was over.
So we started suing them for wrongful arrest. 30 grand of compensation later they stopped doing it. It's about 600 quid an hour. It is the *only* way you can hurt them.
Go for it !
Of course you do have to be sure you're not doing anything that will stick, snapping pictures of shops and passers by seems prime for a bit of fun, I might even try it myself once I get the bodies out of the freezer.
> A subsequent inquiry blamed a failure to follow basic information security procedures for the infection.
Blame the poor sods who have to use the shitstorm because their higher-ups chose Windows.
Imagine a world where the IT consultants blame each other instead of their hapless customers!
Just think, if you'd gone for Power over Ethernet you'd have been on Gbit speeds ages ago and trialling 10Gbit by now.
USB sucks so bad. so so so so so bad.
We all already knew how to do ethernet, USB is a tar pit; "Don't use Windows, fuck you"
Beer cos they gave me a free pint at work and I feel a bit beligerent
@mmiied
Kill You lyrics
[Eminem]
They said I can't rap about bein broke no more
They ain't say I can't rap about coke no more
Slut, you think I won't choke no whore
til the vocal cords don't work in her throat no more?!
These motherfuckers are thinkin I'm playin
Thinkin I'm sayin the shit cause I'm thinkin it just to be sayin it
Put your hands down bitch, I ain't gon' shoot you
I'ma pull +YOU+ to this bullet, and put it through you
Shut up slut, you're causin too much chaos
Just bend over and take it like a slut, okay Ma?
"Oh, now he's raping his own mother, abusing a whore,
snorting coke, and we gave him the Rolling Stone cover?"
You god damn right BITCH, and now it's too late
I'm triple platinum and tragedies happen in two states
I invented violence, you vile venomous volatile bitches
vain Vicadin, vrinnn Vrinnn, VRINNN! [*chainsaw revs up*]
Texas Chainsaw, left his brains all
danglin from his neck, while his head barely hangs on
Blood, guts, guns, cuts
Knives, lives, wives, nuns, sluts
And you other fools, how do you think the staff at Vintage Books feel when Bret Easton Ellis turns up, do they think he is going to rape and murder them?
If an Indie wants to release a Blu-Ray disc, AACS wants a slice
$3000 setup
$1500 per title
$0.04 per disc
additonally
$3000 blu ray logos
and a staggering
$40,000 for the authoring software - though you can rent it for $300 a month
http://digitalcontentproducer.com/videoencodvd/revfeat/bluray_blues/
Or we can duplicate DVDs at home for $0.20 each
So they get the parts and using the serial nos. traced them back to the UK? Did anyone seriously bother to do that?
Sure it wasn't just the usual clueless politician banter :
DM : "So commander, where do people get these parts from?"
Comm : "They have them sent here or someone brings them".
I mean, what other answer is there?
It's not like China or Mumbai or Iran are closer.
Any idea how many mobiles there are in India? They actually *fix* the there too instead of throwing them away. Electronics are not hard to come by.