FBI Chief: Apple, Google Phone Encryption Perilous
"Comey cited child-kidnapping and terrorism cases as two examples of situations where quick access by authorities to information on cellphones can save lives. Comey did not cite specific past cases that would have been more difficult for the FBI to investigate"
of course he didn't cite specific cases because there are NONE. this is the same pathetic unsupported excuse that law enforcement has been rolling out to put fear in the lemmings of the USA. the founders of this country knew, from past experience with Britain, that the worst enemy of the public is their own government. they put in the constitution and amendments to the constitution laws that "should" prevent the government from persecuting the public. now that the public is finally getting the technology to combat an out of control law enforcement, these clowns are whining that it make their jobs harder. and then make up unsubstantiated stories about how this will "hurt" the general public.
get off your butts and get a warrant if you want to invade someone's privacy. warrant-less invasion of privacy is unconstitutional, period.
Favorite "Go!" Phrase?
Dark Helmet "Ludicrous Speed GO"
FCC Rules That Verizon Cannot Charge For 4G Tethering
exactly my point in the post. the ruling was very specific to the C block spectrum. 3g and 1x are different spectrum under different rules. i can see tethering when i'm in a 4g area, move to the 3g area and get completely screwed in fees!
Microsoft's Ad Team Trumps IE Developers' Privacy Aims
not that i needed another reason to use firefox, but thanks MS, for putting another nail in the coffin of IE.
How Easy Is It To Cheat In CS?
i encouraged collaboration in my programming assignments, but i was very clear in that the final work was an individual effort. in programming, it was rather easy to find people that were cheating, even if they tried to mask it by changing variable names. when the blocks of code line up, the formatting is identical, it's not hard to find the cheater. in the real world (of which i am now a part of) programmers do collaborate, but in the end, some individual needs to produce the end product, and if all they learned in school was to copy their friends work, they will be useless, IMHO.
Call To "Open Source" AIG Investigation
under the sunshine act, one would think they have no choice but must, by law, open their e-mails and any other correspondence to the public. we paid for for them, then we should have full access. and the excuse that this would make them less competitive is total BS.
What Filters Are Right For Kids?
i would expand on the note by moodyloner, living room, kitchen. basically don't let your daughter have a computer in her room. keep the computer in an open area.
also, i use only use firefox as my browser and extensively use adblock. i've also found that the popup blocker in the newest firefox is very effective.
i use thunderbird as my e-mail app. i use the junk mail setting set on highest, which seems to pick off most offensive e-mails. i suggest looking at all of your kids e-mails. and tell them that you are monitoring their e-mail for scams, viruses, trojans ... don't monitor their e-mail for "unflattering" talk about you. and if you see something that doesn't portray you in your best light, DON'T bring it up to your kids. let it go. but, keep abreast of what your kids are looking at. talk to them about it. and above all, be open and honest.
Feds To Offer Cash For Your Clunker
so now people can go and buy a 2009 gas-guzzling POS big 3 FUV and immediately get money to trade in the POS and get a fuel efficient foreign car!!
can't wait until the big 3 are finally buried.