Search for: "Root User" Results 1001 - 1020 of 1,902
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
19 Feb 2016, 4:55 pm by Joseph Bonneau
Of course, EFF supports Apple's efforts to protect its users. [read post]
19 Feb 2016, 3:58 pm by Arthur F. Coon
The underlying “doctrine of unconstitutional conditions” has stood the test of time, firmly rooted in Justice Scalia’s deep concern for property rights and his brilliant, groundbreaking Fifth Amendment jurisprudence. [read post]
17 Feb 2016, 11:04 am by Kevin Smith, J.D.
 But the truth is that none of these fall-back positions are really needed in most cases because Congress gave us a statutory solution for this issue, although it is rooted in common law itself — fair use. [read post]
17 Feb 2016, 7:55 am by Allison Bender and Katherine Gasztonyi
The Administration is also calling on companies to enable multifactor authentication for their users. [read post]
12 Feb 2016, 6:20 am by Doron Hindin
But these frameworks—rooted in post-Cold War arms control systems—may not be suited to the modern proliferation of cyber and encryption software and technologies, which grow more seamless, intangible and borderless by the day. [read post]
8 Feb 2016, 10:57 am by Gritsforbreakfast
An article by Texas Tribune reporter Jay Root highlights a failing in Texas' Public Information Act related to law enforcement records which is long overdue for remediation. [read post]
25 Jan 2016, 4:00 am by Sharon D. Nelson and John W. Simek
You could use Pass1234 from the internet to VPN to root on all servers. [read post]
15 Jan 2016, 9:19 am by Kelly Buchanan
(Photo by Flickr user paukrus, Jan. 5, 2014.) [read post]
5 Jan 2016, 7:56 am by Ken White
Having chosen a suspect and an address, two other officers visited three times to root through the trash and look for evidence. [read post]
5 Jan 2016, 4:09 am by Alex Loomis
” Rather, ICANN acts “as a trustee of the Internet’s unique names and numbers in service to all Internet users. [read post]
4 Jan 2016, 3:55 pm by Jonathan Bailey
This is both to save time and to acknowledge the simple fact that all of my future predictions are rooted very firmly in what has already happened. [read post]
30 Dec 2015, 7:25 am by Karen Gullo
 report showed that many major technology companies are adopting best practices around transparency and protecting user data when the government comes knocking. [read post]
27 Dec 2015, 7:01 am by Parker Higgins
Through ambitious projects like Apollo 1201, EFF and others are working to fix the problems at the root of DRM policies. [read post]
24 Dec 2015, 6:00 am by Jessica Gutierrez Alm
 The usefulness requirement has roots in the Constitutional grant of power for issuing patents, providing that “Congress shall have power . . . [read post]
22 Dec 2015, 12:45 pm
 For the first time, under the agreement, these individuals will have universal access to rehabilitative counselors and educational instructors, including therapy, to get at the root of their actions. [read post]
18 Dec 2015, 1:04 pm by Eva Galperin
” OEMs should stop installing bogus root certificates and compromising user security. [read post]
16 Dec 2015, 1:05 pm by Colin O'Keefe
Spotify surged past Apple’s offerings almost overnight with a software model that gave users access to every song, all the time. [read post]
15 Dec 2015, 3:46 pm by Joseph Bonneau
When Our Computers Trust Somebody That We Don't Two PC manufacturers were busted inserting a “trusted root certificate” onto the computers they sell, undermining user security in order to inject ads into web pages. [read post]
10 Dec 2015, 2:13 pm by Bill Budington and Eva Galperin
Because of this, it is difficult for ordinary attackers to pull off a Man in the Middle attack successfully on encrypted Internet connections—they have to both be situated in a privileged position within the network (between the user and the remote server), and in possession of a certificate signed by a root for the server being accessed. [read post]