Search for: "Root User"
Results 281 - 300
of 1,772
Sorted by Relevance
|
Sort by Date
13 Aug 2008, 7:44 pm
"You have to follow the chain of signatures down from the root to the top-level domain to the user's domain. [read post]
9 Oct 2013, 4:24 am
Setting the user ID to zero is a problem because user ID number zero is the “root” user, which is allowed to do absolutely anything it wants—to access all data, change the behavior of all code, and to compromise entirely the security of all parts of the system. [read post]
25 Oct 2018, 10:00 am
But, at root, the Internet still represents and embodies an extraordinary idea: that anyone with a computing device can connect with the world, anonymously or not, to tell their story, organize, educate and learn. [read post]
28 Feb 2019, 11:53 am
In reality, nearly two-thirds of California cities expressly bar marijuana businesses from establishing roots. [read post]
17 Oct 2012, 9:45 pm
However, it is complicated by the fact that the application of privacy principles tend to discourage the most obvious tool to identify children – asking the user for his or her age. [read post]
7 Jun 2021, 12:02 pm
Title 1 D0920,483 Faucet spout 2 D0920,443 Playhouse 3 D0920,363 Display screen with a graphical user interface 4 D0920,362 Display screen with a graphical user interface 5 D0920,350 Display screen with animated graphical user interface 6 D0920,349 Display screen with a graphical user interface 7 D0920,248 Vehicle alternator drive 8 D0920,019 Display stand 9 D0919,997 Chair back 10 11018610 Motor drive system and method 11 11017899 Pairing and… [read post]
8 Jan 2015, 10:20 am
But, as we discuss below, there are ways to craft effective responses, rooted in the core ideals upon which the Internet was built, to protect the targets of harassment and their rights. [read post]
22 Feb 2010, 11:54 am
Are there viable user interface improvements? [read post]
18 Aug 2015, 11:22 pm
The massive leak attributed to the hackers who rooted to the Ashley Madison dating website for cheaters has been confirmed to be genuine. [read post]
18 May 2012, 10:58 am
ZTE has vowed to fix the security hole. “ZTE is actively working on a security patch and expects to send the update over-the-air to affected users in the very near future,” ZTE told Reuters. “We strongly urge affected users to download and install the patch as soon as it is rolled out to their devices.” [read post]
9 Jun 2008, 10:52 am
EWeek's Larry Seltzer cites several examples of recent exploits, which embed malicious software in PDF documents, and which install root kits on unsuspecting systems. [read post]
4 Feb 2011, 1:58 pm
As others have noted, the basic concept of neutrality in search is, at root, farcical. [read post]
9 Oct 2009, 4:47 pm
I'll be very interested to see if this idea actually does take root, be it in the UK or elsewhere. [read post]
15 Aug 2012, 9:47 am
That is the meaning that term might have for some of its critics, but is generally not the meaning it has for its proponents, which has its roots in law Latin:Ex tota materia emergat resolutio. [read post]
18 Nov 2015, 11:53 am
From the preposterous idea that you can hack into an alien computer, to increasingly unbelievable graphic user interfaces, film has been poisoning our perception of computing for years (and don’t get me started on CSI:Cyber). [read post]
3 Mar 2022, 1:44 pm
This would expose users to man-in-the-middle attacks, compromise daily activities like bank transactions, and undermine the privacy because users would have nowhere to hide. [read post]
28 Nov 2014, 5:01 am
I made this point in posts such as Liquid Fuels Tax Increases on the Table, You Get What You Vote For, Zap the Tax Zappers, Potholes: Poster Children for Why Tax Increases Save Money, When Tax and User Fee Increases are Cheaper, Yet Another Reason Taxes and User Fee Increases Are Cheaper, When Potholes Meet Privatization, and When Tax Cuts Matter More Than Pothole Repair. [read post]
30 Oct 2014, 6:27 pm
The quality control requirement in trademark law is rooted in the notion that a trademark represents the source of a good. [read post]
27 Dec 2007, 2:34 pm
It was a year of soul searching at THREAT LEVEL, every day a fresh challenge to our fundamental beliefs and convictions: Alberto Gonzales made us pine for John Ashcroft; Google made us love roving surveillance cams; and Jammie Thomas' internet spoofing defense was enough to make us secretly root for the RIAA. [read post]
11 Jan 2021, 5:01 am
In this case, the parameters determine the shape and size of an elliptic curve used to generate public-private key pairs, and CVE-2020-0601 was at its root the failure to correctly verify those parameters. [read post]