If I were his lawyer I would submit a laptop that will not start due to corrupt windows files as exhibit A.
Exhibit B would be the packing list of laptop when purchased.
Then call an expert witness to show the court how to fix this issue. It would include sitting there and watching the file DL then burn it to a DVD or flash drive. Then ask how the home user could have done it if the laptop was the only computer they had.
"While technically true, this is not really a factor any longer. With the speed of processors (and GPUs), extensive wordlists and rainbow tables, brute-force cracking of a password hash is relatively easy and not time consuming for average 7 or 8 character passwords, mixed case or additonal numbers/symbols not withstanding."
That is assuming that the online authentication will allow the computer to try every combination at the max speed without locking the account for a fixed time. If you can try 5 passwords then be locked out for 5 minutes assuming no caps an 8 alphanumeric password will take 36^8 minutes to complete all combos. That is 1min(if first answer is correct) to 5,367,408.499 years last one is correct.
If you would have spent 3 seconds clicking on the link you would have got your answer.
"China Unicom, the country's second largest telecom operator, has replaced Cisco Systems routers in one of the country's most important backbone networks, citing security reasons [due to bugs and vulnerability.) The move came after a congressional report branded Huawei Technologies Co. Ltd. and ZTE Corp. security threats in the United States, citing bugs and vulnerability (rather than actual evidence of spying.) Surprising to us, up to now, Cisco occupies a large market share in China. It accounts for over a 70 percent share of China Telecom's 163 backbone network and over an 80 percent share of China Unicom's 169 backbone network. Let's wait to see who's the winner in this trade war disguised as national security"
Only the 1 specific use would be blocked. So each page that hosts the same file would have to be listed since it cant be determined that the use on sight Z is infringing but on sight Y is authorized.
The the actual address is not listed it is not blocked.
(I guess that everyone missed that I was poking fun at those who think a magic button or program can decide what is infringing or not with out it having at assume everything is allowed unless told other wise. You know the same way it is now.)
"Separately, you can't create an algorithm that detects fair use. Or the public domain. Point being: it's not that easy and it's silly to claim otherwise."
I will have to disagree with the above statement. It is easy the algorithm just needs to use the following logic.
If X is listed in Public Domain DB approve.
If X is NOT listed in Public Domain DB continue.
If X is listed in piracy list DB for the specific instance block.
If X is NOT listed in piracy list DB for the specific instance approve.
Linux distros are not hard to get setup and are getting easier. We set us Unbuntu on the PC of a retired poly-sci teacher who is not good with computers in general the next week when we came over he had remote printing set up.
I Still have a few games like that that I saved from win 95 like Castle In The Wind and several others. That reminds me i should dig that flash drive out and give some of them a play again. The only problem is getting it to work on Vista, its a good thing I still have the DLLs needed from the win95.
"See, Will.I.Am may not be able to consent to being in the video, and all of his work (including what was used in the video) would be by contract copyright to his label. Since the label didn't issue rights to megaupload for his work, it's a copyright issue."
It still is not a copyright issue it is a contract issue in that Will.I.Am was in breach of the contract with UMG. Assuming that you are correct stating every thing stated by Will.I.Am belongs to UMG according to his contract with them.