Search for: "Root User" Results 301 - 320 of 1,874
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Jun 2008, 10:52 am
EWeek's Larry Seltzer cites several examples of recent exploits, which embed malicious software in PDF documents, and which install root kits on unsuspecting systems. [read post]
18 May 2012, 10:58 am by Kim Zetter
ZTE has vowed to fix the security hole. “ZTE is actively working on a security patch and expects to send the update over-the-air to affected users in the very near future,” ZTE told Reuters. “We strongly urge affected users to download and install the patch as soon as it is rolled out to their devices.” [read post]
22 Feb 2010, 11:54 am by Steve Schultze
Are there viable user interface improvements? [read post]
9 Oct 2009, 4:47 pm by Deborah Schander
I'll be very interested to see if this idea actually does take root, be it in the UK or elsewhere. [read post]
15 Aug 2012, 9:47 am by Jon
That is the meaning that term might have for some of its critics, but is generally not the meaning it has for its proponents, which has its roots in law Latin:Ex tota materia emergat resolutio. [read post]
18 Nov 2015, 11:53 am by Andres
From the preposterous idea that you can hack into an alien computer, to increasingly unbelievable graphic user interfaces, film has been poisoning our perception of computing for years (and don’t get me started on CSI:Cyber). [read post]
4 Feb 2011, 1:58 pm by Geoffrey Manne
As others have noted, the basic concept of neutrality in search is, at root, farcical. [read post]
3 Mar 2022, 1:44 pm by Corynne McSherry
This would expose users to man-in-the-middle attacks, compromise daily activities like bank transactions, and undermine the privacy because users would have nowhere to hide. [read post]
30 Oct 2014, 6:27 pm by Yana Welinder
  The quality control requirement in trademark law is rooted in the notion that a trademark represents the source of a good. [read post]
25 Jul 2016, 5:02 am by Eugene Volokh
So: Even assuming two premises of this lawsuit are true — that there are Internet users other than Colin O’Kroley searching “Colin O’Kroley” and that they look only at the Google previews rather than clicking on and exploring the links — it’s not likely that anyone will ever see the offending listing at the root of this lawsuit. [read post]
28 Nov 2014, 5:01 am by James Edward Maule
I made this point in posts such as Liquid Fuels Tax Increases on the Table, You Get What You Vote For, Zap the Tax Zappers, Potholes: Poster Children for Why Tax Increases Save Money, When Tax and User Fee Increases are Cheaper, Yet Another Reason Taxes and User Fee Increases Are Cheaper, When Potholes Meet Privatization, and When Tax Cuts Matter More Than Pothole Repair. [read post]
27 Dec 2007, 2:34 pm
It was a year of soul searching at THREAT LEVEL, every day a fresh challenge to our fundamental beliefs and convictions: Alberto Gonzales made us pine for John Ashcroft; Google made us love roving surveillance cams; and Jammie Thomas' internet spoofing defense was enough to make us secretly root for the RIAA. [read post]
5 Feb 2019, 8:50 am
 In other words, if a platform communicates to the public (together with users of its services), then the safe harbour would not apply tout court. [read post]
11 Jan 2021, 5:01 am by William Loomis, Stewart Scott
In this case, the parameters determine the shape and size of an elliptic curve used to generate public-private key pairs, and CVE-2020-0601 was at its root the failure to correctly verify those parameters. [read post]
29 Oct 2011, 8:11 am by rgeorges
beating a path to its door, is its return to the roots of PDA computing. [read post]
10 Nov 2022, 5:36 pm by Sabrina I. Pacifici
Google’s Chrome, Apple’s Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what’s known as a root certificate authority, a powerful spot in the internet’s infrastructure that guarantees websites are not fake, guiding users to them seamlessly. [read post]
9 Jan 2023, 5:32 pm by Sabrina I. Pacifici
Originally created as “social networks,” where individuals could stay in touch with friends and family, these platforms have rooted themselves into most aspects of day-to-day life. [read post]
15 Sep 2008, 12:35 am
Chin Warming Up to User-Generated Content Edward Lee Innocentrism Daniel S. [read post]
1 Aug 2010, 1:10 pm by rgeorges
My take on this is that original Droid users are very happy with their phones, and won't be too upset; especially, if they are hackers who enjoy rooting their phones and getting at the Linux kernel under the hood. [read post]
2 Nov 2020, 5:52 am by Corynne McSherry
 Many have only the most tangential relationship to their users; faced with a complaint, takedown will be much easier and cheaper than a nuanced analysis of a given user’s speech. [read post]