Lists in theory are a good idea but the problem is lazy/incompetent/moronic/etc. idiots who are inputting the data into the system. What all these "systems" suffer from is the tendency for excessive false positives and false negatives - information that should not be entered and information that should be included. Compound this with the typical bureaucratic attitudes and you have situation that makes Franz Kafka look like a very naive optimist.
I read comments but as John Fenderson noted I would take the comments with a grain of salt. The grain may be very, very larg depending on the site and what information the commenter included. If a blog I frequent regularly commented on a product I would pay more attention to the post itself whether the it was positive or negative.
What this sounds like is "reputation management" were someone tries to remove negative comments. From what I have heard about reputation management it is often a very dodgy practice. Libel/slander have requirement that the person making the statement deliberately made a false statement that is damaging to another's reputation plus a few other requirements. But if the poster is reporting their experience or conclusions derived from facts it is not libel/slander.
Under US law, one can label your sparkling wine or cheese by the appropriate descriptive name such as champagne, feta, Gouda, etc. as long as the proper raw materials and production methods are used. So US Gouda cheese is made from the same type of milk and the same methods as the Dutch cheese. The issue is partly trademark and partly protectionism. The EU is demanding a trademark for regional products that could be made else where by others to protect the local (EU) producers. Often there is no discernible difference between the US and EU products except maybe price.
The analogy to typhus or cholera is apt. The spooks do not realize that destroying the web by spreading virus, worms, etc. will rebound on them. First, systems that are shutdown or isolated by definition are unavailable for these vectors. Secondly, like the biological diseases, these could infect your own systems. Third, an alert person might spot the infection, neutralize, and modify it to attack you much like the biological infections gain immunity, evolve.
Re: Re: Re: Re: If you use Microsoft or Adobe products
We know how long the issue was present with gnutls because the source code and change history is available. We do not know the age of any announced zero-day in closed-source code because the information is not released except indirectly. Patch xyz fixes versions cdef and version c is 8 years old. The patch fixes a bug that is at least 8 years old but what about versions a and b, was it present then? We do not know.
Any OS that publishes its source code. The reason, while there exploits in all complex code, publishing the source code allows outside white-hats to test and propose real fixes to the maintainers. Closed source only allows on to describe the effects and how to exploit but not how to fix.
Also, if the source code is published, bug reports can be rapidly disseminated with a very specific warning about which module is problematic. The recent Linux bug reported the specific module that was problematic. Thus one can check to see if it is even installed or if installed one can remove it.
The main reason for one-sided laws and local agreements is to protect profits. If there is real competition, prices often fall and at worse the price increases are less. In retail, one has price/delivery/selection/shopping experience options based on Amazon/Walmart/Specialty shops/premium shops/etc. because of competition. The successful retailers have found a market niche they can serve. Cable/Fiber is really no different, real competition forces companies to find viable market niches to survive.
What village is missing their idiot? Aereo, as noted in the article, is providing at least a better signal to potential viewers if not more viewer to CBS without CBS spending a penny. The only complaint any broadcaster would have is if Aereo only provides some of the local broadcasters. But that is not what CBS is claiming and I have not seen any reports where this is so.
"Often, when people refer to “copyrighted” content in this context, they actually mean “industrially produced creative works.” More specifically, when someone says “there’s a lot of copyrighted content online,” what they really mean to say is “there’s a lot of stuff online that seems so professional that we should assume it was made by an industrial content producer, and that we should also assume they don’t want it online.” Of course, this isn’t a particularly clear line: what metric should a hypothetical army of content reviewers apply in deciding how professional a work should be before it is purged from the Internet?"
The problem the equation copyrighted on the web equals infringement is who posted it. It is only infringement if it is posted with out the consent of the copyright owner. It is difficult for many to determine who the owner of the content is or how it is licensed. Most people do not grasp what the Creative Commons and similar licenses allow.
The analogy of computer malware to biological viruses is more apt than often realized. In biological warfare controlling a virus or bacteria once it is in the wild is very difficult. There is a high risk the it could infect your own people. The same with computer malware, once in the wild there is a significant risk it can be used against you, whether it is accidental or deliberate. The problem is the dim-bulbs authorizing these attacks do not realize they are at risk.
I can believe he forgot to renew his drivers license. It is not that hard to do. The problem is not questioning someone for background information. But the FBI blatantly overstepped and apparently were looking for a charge they could make stick.
The fundamental issue with mathematics is that it is extremely logical and precise. One has to discipline one's mind be as logical as mathematics requires. Most people are not taught how to do this as it is somewhat unnatural.
Computer programming, being in many ways a form of applied mathematics, requires the same type of discipline and precision. At some point, once one moves beyond the relatively trivial cases the required discipline and precision makes programming difficult and tedious.
Re: Re: Re: Blame the advertisers and the hackers, not users
Add the fact many times the badly written flash ads can crash a browser and lock a system until the plugin crashes and they wonder why adblock and noscript are used. The advertising firms are doing their customers a disservice because the ads not being viewed because the firms incompetency.
Model and toy aircraft are very small and would rarely pose a significant physical danger to those on the ground if the crash. While drones would likely be larger to carry a reasonable load any significant distance, the judge is saying go through the proper administrative procedures before issuing rules before claiming jurisdiction. In his opinion, drones in a legal limbo, obviously not a model airplane but not a piloted aircraft either. Also, the obvious question is whether a drone poses a significant physical danger if one crashed. The answer probably depends mostly on size (weight most likely) and drone airspeed.
Flying cars always had problems as piloted vehicles. There are FAA regulations covering the pilot such as training, licensing, and health. These rules are somewhat aircraft independent. Certain health conditions can ground a pilot until medically cleared. The drone "pilot" is likely sitting a ground based console so the pilot's medical condition is less critical.
As AC noted, there plenty of free stock images available online. Unless one needs a very, very specific image there probably is a free or at worst very, very cheap stock image available. The problem that many photographers are facing is the Internet has made access to previously inaccessible images possible. Photography is very tough business.
DHS should be called the department of homeland insecurity and security theater. Badly run "watch list" programs make me wonder if they have a clue who the real dangerous people are. Like the author my real name is unusual enough that I am not likely to be on the list.