|
Authored by: Nick_UK on Saturday, February 02 2013 @ 08:51 AM EST |
This reminds me of my story...
Years ago when I was 14ish (1974?), my parents bought a small circular lock
mechanism that fitted to the '1' hole on the dialling mechanism of our
telephone to STOP me using it (i.e. the locking device stopped the dialling ring
moving past the finger stop, so you couldn't dial any numbers). Phone lines and
calls were relatively rare AND expensive in those days.
Only by having the key could you remove the device to be able dial a number.
Well, there was a children's TV show on at the time, I cannot remember what it
was called, but it was of a type that was mysterious and spooky. In this
programme, in one scene, somebody dialed a number by tapping the phone cradle -
like 'tap~tap'=2 and 'tap~tap~tap~tap'=4 etc, with the ~ representing about 1
second delay, and by leaving a 5 second delay between 'tapped' numbers you could
build up a number to dial!
'tap~tap~tap' 5s 'tap~tap~tap~tap~tap' 5s 'tap~tap' == 352 e.g.
Needless to say it WORKED! I do not think my parents ever found out.
Nick[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Saturday, February 02 2013 @ 06:44 PM EST |
posted at
http://www.reddit.com/r/IAmA/comments/17pisv/im_rep_zoe_lofgren_here_is_a_modifi
ed_draft/
One way to explain and justify why changing MAC address, IP address, or clearing
cookies does not trigger a violation is to put it that doing anything that would
be the equivalent of using a different computer does not trigger a violation.
So any 'technical measures' that would fail by simply buying a new computer and
using it cannot be a violation
I would also like to see something along the lines that registering a new userid
cannot trigger a violation.
The section saying that providing false personally identifiable information
should not trigger it should be generalized to just say that providing false
information of any kind should not trigger the law. The one exception to this
would be if you are trying to impersonate some other individual
David Lang[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Sunday, February 03 2013 @ 12:05 AM EST |
Eric Schmidt Unloads on China in New
Book
In the future superpower supplier nations will look to
create their spheres of online influence around specific protocols and products,
so that their technologies form the backbone of a particular society and their
client states come to rely on certain critical infrastructure that the
superpower alone builds, services and controls.
Chinese telecom
equipment companies, rapidly gaining market share around the world, are at the
front lines of the expansion this sphere of influence, they say: "Where Huawei
gains market share, the influence and reach of China grow as well".
The rest of the world reads this and sees it as a really
good reason to not buy American telecommunications equipment either. The rest of
the world isn't any keener to be part of the American "sphere of influence"
either. They want to be independent.
The world is a very different
place today from what it was a dozen years ago. Many countries, including most
of the democratic ones are looking at the situation and deciding that in the
balance, Huawei is less of a risk than Cisco.
The pair even
speculate that the Internet could eventually fracture into pieces, some
controlled by an alliance of states that are relatively tolerant and free, and
others by groupings that want their citizens to take part in a less rowdy and
open online life.
The "relatively tolerant and free" option
doesn't seem to be on the menu. It seems to be a choice between an Internet
controlled by national governments, and and Internet controlled by a handful of
big American media companies (including Eric Schmidt's Google) and security
agencies. If you're not American, the first option doesn't look so bad.
[ Reply to This | Parent | # ]
|
|
Authored by: luvr on Sunday, February 03 2013 @ 06:04 AM EST |
Linux on Windows 8 PCs: Some progress, but still a
nuisance.
Sigh... Why are we even talking about this? Why should we
consider Linux the nuisance, when Windows 8 is the disaster in the
first place?
In my opinion, there's only one proper solution: FORGET
about Windows 8 PCs. Samsung builds its laptops in such a way that they break
when you try to run Linux on them? Fine—Goodbye, Samsung laptops. Toshiba
doesn't want you to even boot Linux on its laptops? Great—That's
the end of Toshiba laptops for me.
We should simply stop feeding the
FUD by trying and, inevitably, failing, to work around
deliberate sabotage by wannabee vendors. If they don't want
us as customers, fine—we'll walk away. Is that really so hard to
understand? [ Reply to This | Parent | # ]
|
|
Authored by: kjs on Sunday, February 03 2013 @ 01:09 PM EST |
any non-US company which stores data in the cloud (one where they don't own the
servers and have them located in their jurisdiction) should be sued for
infringing on the national laws of data privacy!
>kjs
---
not f'd, you won't find me on farcebook[ Reply to This | Parent | # ]
|
|
Authored by: JamesK on Sunday, February 03 2013 @ 01:40 PM EST |
“Works created by employees and/or students specifically for use by the Prince
George’s County Public Schools or a specific school or department within PGCPS,
are properties of the Board of Education even if created on the employee’s or
student’s time and with the use of their materials,” the policy reads. “Further,
works created during school/work hours, with the use of school system materials,
and within the scope of an employee’s position or student’s classroom work
assignment(s) are the properties of the Board of Education.”
Expropriation?
"In Montgomery County, the school system says supplies, equipment or
instructional materials that are made by a school employee using “substantial
time, facilities or materials” belonging to the system become the property of
the public schools."
Isn't that a public school system? Who actually paid for those materials?
Seems to me it's the tax payers who paid for those materials and not the school
system.
---
The following program contains immature subject matter.
Viewer discretion is advised.[ Reply to This | Parent | # ]
|
|
|
|
|