decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
High School senior violates patent | 111 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”
Authored by: Anonymous on Wednesday, May 29 2013 @ 03:13 AM EDT
In March, readers followed along as Nate Anderson, Ars deputy editor and a self-admitted newbie to password cracking, downloaded a list of more than 16,000 cryptographically hashed passcodes. Within a few hours, he deciphered almost half of them. The moral of the story: if a reporter with zero training in the ancient art of password cracking can achieve such results, imagine what more seasoned attackers can do.

Imagine no more. We asked three cracking experts to attack the same list Anderson targeted and recount the results in all their color and technical detail Iron Chef style. The results, to say the least, were eye opening because they show how quickly even long passwords with letters, numbers, and symbols can be discovered.

Dan Goodin, ars technica

[ Reply to This | Parent | # ]

This might be too political for Groklaw...
Authored by: Anonymous on Wednesday, May 29 2013 @ 03:41 AM EDT
The Canadian War on Science: A long, unexaggerated, devastating chronological indictment
This is a brief chronology of the current Conservative Canadian government’s long campaign to undermine evidence- based scientific, environmental and technical decision- making.

It is a government that is beholden to big business, particularly big oil, and that makes every attempt to shape public policy to that end. It is a government that fundamentally doesn’t believe in science. It is a government that is more interested in keeping its corporate masters happy than in protecting the environment.

As is occasionally my habit, I have pulled together a chronology of sorts. It is a chronology of all the various cuts, insults, muzzlings and cancellations that I’ve been able to dig up. Each of them represents a single shot in the Canadian Conservative war on science.

It should be noted that not every item in this chronology, if taken in isolation, is necessarily the end of the world. It’s the accumulated evidence that is so damning.

John Dupuis, The Georgia Straight

John Dupuisis the head of the Steacie Science & Engineering Library at York University in Toronto

[ Reply to This | Parent | # ]

theverge Laura June: Size matters: how I went from an iPhone to a really big Android phone
Authored by: SilverWave on Wednesday, May 29 2013 @ 06:52 AM EDT
Size matters: how I went from an iPhone to a really big Android phone
I thought I wanted something 'iPhone-sized,' but I was wrong

---
RMS: The 4 Freedoms
0 run the program for any purpose
1 study the source code and change it
2 make copies and distribute them
3 publish modified versions

[ Reply to This | Parent | # ]

Presumption of Privacy...
Authored by: Ed L. on Wednesday, May 29 2013 @ 03:12 PM EDT
...is a Non Sequitur.

---
Real Programmers mangle their own memory.

[ Reply to This | Parent | # ]

High School senior violates patent
Authored by: Anonymous on Wednesday, May 29 2013 @ 04:19 PM EDT
"Eesha Khare, an 18-year-old senior at Lynbrook High School in San Jose, Calif., won both the first prize at the Intel Science Fair and the Project of the Year award for the senior division of the California State Science Fair with her research on supercapacitors."

"However, her work has also attracted the attention of the company that holds a patent involving similar technology, and its CEO says he may be forced to bring legal action against her if she tries to commercialize it." link

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )