Keystone Nazi squad. Oversight? What oversight? Anyone see any oversight? They're taking queues from the entertainment industry. Fudging the numbers, FUD rhetoric. Sounds like everyone on the oversight board is a TSA golfing buddy (wink, wink, say no more). };P
"..that they cannot be read with the free Kindle apps on platforms like iOS and Android." Ok.. So transfer the eBook to a usb mem-stick, plug that into a wireless usb hub, and let everyone within range download it to their iPhone, iPad, Android device, etc. And with regards to Penguin publishing, either listen to the masses, or be kicked to the side of the road. ;P
Time to make war driving famous again.
Until the DRMSEC is restored, apply your pirate eye-"patch", and play on. Or continue to use your pirate patch. I've met several gamers that after buying the game, they grew tired of dancing to the tune of DRM and applied a pirated patch anyway. To hell with Ubi$0ft if they can't grasp the implications of their own cluster-f**k. };P
Since Dave says "YUUUP!" is a trademark, then Dave will have to prove how many times the letter "U" was used when Trey verbally said "YUUP!" out loud. };P
I think it's great. It is a necessary, evolutionary step of the global internet. It may not be perfect in the beginning, but it will evolve. And no government in the world has the power to stop it. ];D>
I guess this is the USPS's marketing division's version of: "These are not the droids your looking for".
Daemon_ZOGG is about being free, open-minded, copyleft and highly vocal against copyright/patent abuse. Innovatio seems to be quite the extreme opposite. Of course, if they wish to kneel before Daemon_ZOGG, I'll be happy to visit them in the unemployment line after their delusion fades. ;)
It would be like telling everyone that uses a microwave oven, infringes. Or stupidly paying licensing fees to micro$0ft for using or distributing linux. It's another Keystone Cops episode, in the style of SCO. Funny in the beginning. Boring, predictable, and annoying in the end. I doubt inn0vatio will know when to pull its head out of its butt before the gods of Chapter-11 reign fire and brimstone down on their scrawny pencil-necks. So, continue to use wifi and linux and whatever else makes your life easier through technology. Same old song and dance... };P
One step closer to communism. OH WAIT! We're ALREADY THERE! Sorry. I was temporarily blinded by the glare from the corporate lobbyists brain-washing the US congressmen and congresswomen with bribes. And promises of high-income jobs when their term is over. You remember, the ones that were supposed to represent the constituents that sort of, well you know, voted for them. I love democracy. It's the US government, I hate. };P>
And yes! FBI and DHS are the same. Just differently funded corporate agencies under the same fu**ing umbrella. I miss the days when we only had to deal with just the FBI. Now it's DHS, NSA, CIA, and every other friggen letter in the English alphabet. Democracy, the original US Constitution with the bill of rights I love. The people currently running the so called US democracy need to be fired and prevented from ever consorting or participating in government for the rest of their bribe-taking, sorry ass lives. };P
I'm tempted to set up a wireless OpenSource honeypot server with that SSID just for fun. Fake the OS fingerprint. Spoof the IP and MAC. The data collected over a 6 month period would be interesting to say the least. And the answer to the next question is NO. I refuse to share the data with law enforcement. It will be for my own amusement. And only then, I will share the details exclusively with open-source and bit-torrent communities for security research. Screw DHS! God-Damn secret police bastards. I hate those over-funded bungholes! Only thing they're missing are the StormTrooper Nazi Helmets. ;P
.. And we needed confirmation on this?!!!!!! I'm convinced they have sex with VP biden at least 5 days out of each week, just to keep the osama obama administration in check.
Rene Summer, Director of Government and Industry Relations at Ericsson, submitted: "Unnecessary restrictions and virtual barriers take away fundamental freedoms and breed pirates,".
Until the MAFIAA groups change their status quo to a competetive business model.. I recommend, and openly encourage, the following: Use a public Wi-Fi, use various encryption techniques to tunnel through their firewall/proxy. Make sure your location is not within the establishment that offers the access. Don't use micro$oft or apple OS as a computing medium. Always mask/falsify your MAC address. Don't describe your specific exploit techniques and personal experiences to others. Get whatever you need and move on to the next available Wi-Fi. Don't use the same Wi-Fi more than twice in one month. Whatever works for you.. keep it to yorself. Most importantly, Enjoy the Revolution! Power To The People. Power To Anonymous. Power To Lulzsec. Nuff Said!
It's easier to lie to everyone with bogus numbers and have your lawyers do the rest of your work for you. Seeing as the MPAA Mafiaa Group is unable to produce anything that has any monitary worth. Dinosaurs be dinosaurs.
Yeah. I already knew the TSA was into that really twisted porn games. ;P
The woman was in her own Constitutional right. She was calmly observing from a safe distance. The suspect was already detained. The cops were just visibly upset about being on recorded video. There's a reason why cops are called pigs. This is just one of many examples. There's never a cop when you call them, and they're always late. That's IF they bother to show up at all. Many of them have a fascist god complex when it comes to attitudes. Most have no respect for, or lack understanding of a Citizens Constitutional Rights.
Whatever. I don't find any value or truth in what comes from the mafiaa media groups. ;P
Ah, yes of course. It's normal for me to include the "GNU" whenever I make a reference to Linux. ;) Cheers
Re: "If no one can track these channels then how are they claiming that P2P is increasing."
The data packet headers are not encrypted. Only the data within the packet. So, it's possible to derive what kind of network protocol it may be using. Including the source and destination IP addresses. But, not the data encapsulated within it. ;)