Re: Article picture (Score: 1)
by evilviper@pipedot.org in "Bring your own device" failing to live up to its promise on 2015-08-27 06:50 (#JK5J)
Fixed. I thought it was a bit of a toss-up at the time, but I guess we're just as well-off without it.
And really most of the best browser UI ideas started with opera.Opera had some good ideas, but they usually managed to do them entirely the wrong way. Meanwhile, Firefox might have borrowed some rough concepts, but they fixed them in the process, so they were actually useful. Look back to when Firefox added tabbed browsing, and shortly after, Opera soon after added a second, entirely different method of tabs you could choose to use instead...
Could this be the end of Adobe Flash?Oh come on. Flash is slowly dying. There will be no one event which marks its end.
Australia is saying there will be no actual penalty for copyright infringement, so everyone might as well pirate everythingWe're only talking about an INVOICE sent to accused copyright infringers, and can also include "damages relating to costs of acquiring the subscriber's information". The ruling doesn't apply if the copyright holder chooses to follow through within the legal system and sue everyone. That would sufficiently deter copyright infringers, but is not nearly as profitable of a business model for the lawyers.
The peripherals I cannect to ***MY*** computer are authorized by ***ME***. Only me. Not you.Things started going wrong when they invented HDCP.
Credit goes too, to groups like Intel, who have steadily increased the 'power' and 'utility' of the BIOS to the point where it is now a fun attack vector.Actually, the only thing that changed to make rootkits in firmware practical, is the size of the EEPROM. Back when your CMOS was 64K, there wasn't a lot of room to hide very advanced malicious code in there. Now that there's multiple megabytes to work with, there's plenty of room to store that code. You'd have these problems whether firmware got more advanced, or not. Even the simplest firmware can be modified to boot other (malicious) code first.