Search for: "Root User" Results 1021 - 1040 of 1,902
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Dec 2015, 8:59 am by Dan Goodin
While the load was large enough to be detected on external systems that monitor the Internet's root servers, they ultimately had little effect on the billions of Internet end users who rely on them. [read post]
8 Dec 2015, 8:41 am by Jeff Pettit
The jailbreaking/rooting process gives a user access to the heart or “root” of a device’s operating system, bypassing whatever security measures were first put in place by the device manufacturer or third-parties. [read post]
5 Dec 2015, 4:30 pm by Annemarie Bridy
BMG sued Cox for contributory and vicarious infringement based on Cox users’ peer-to-peer file sharing activity. [read post]
25 Nov 2015, 10:56 am by Cooper Quintin
The same certificate appears to be installed in every affected Dell machine, which would enable an attacker to compromise every affected Dell user if only they had the private key which Dell used to create the certificate. [read post]
25 Nov 2015, 7:06 am
In other words, these requests related to videos that were protected as fair use under §107.Google’s announcement that it will defend content uploaded onto YouTube by users/creators is rooted within the idea that “creators can be intimidated by the DMCA’s counter notification process, and the potential for litigation that comes with it ... [read post]
18 Nov 2015, 11:53 am by Andres
From the preposterous idea that you can hack into an alien computer, to increasingly unbelievable graphic user interfaces, film has been poisoning our perception of computing for years (and don’t get me started on CSI:Cyber). [read post]
9 Nov 2015, 3:45 am
He further claims that this record is `sent each time that a user views a video clip,’ and is accompanied by the `hashed serial number associated with the user's Roku device. [read post]
8 Nov 2015, 4:08 pm by INFORRM
Confronting Totalitarianism at Home: The Roots of European Privacy Protections, Brooklyn Journal of International Law, Vol. 40, No. 3, 2015, Hannah Bloch-Wehba, Reporters Committee for Freedom of the Press Regulating the Internet. [read post]
7 Nov 2015, 4:45 am by Florian Mueller
This commentary on the Microsoft-Red Hat partnership is a back-to-the-roots post for me. [read post]
2 Nov 2015, 10:05 am by Patrick A. Malone
One huge problem is the system designers haven’t consulted closely with end-users. [read post]
1 Nov 2015, 3:21 pm by Graham Smith
That ignores the fact that TV regulation, far from being the norm, is itself an anomalous restriction on freedom to communicate – one rooted in antiquated notions of spectrum scarcity that the internet has blown to smithereens. [read post]
1 Nov 2015, 3:21 pm by Graham Smith
That ignores the fact that TV regulation, far from being the norm, is itself an anomalous restriction on freedom to communicate – one rooted in antiquated notions of spectrum scarcity that the internet has blown to smithereens. [read post]
29 Oct 2015, 6:06 am by Bill Otis
A big part of the energy behind sentencing "reform" takes root in the belief that we have not only too many people in prison, but the wrong people. [read post]
17 Oct 2015, 6:32 pm by Chuck Cosson
 As with other aspects of privacy, this requires managing around a paradox and, in turn, recognizing that the paradox is unavoidable so as to root discussions in more productive possibilities [read post]
14 Oct 2015, 12:40 pm by David Strifling
  For thousands of years, transboundary waters have been the root of conflict and even war. [read post]
7 Oct 2015, 10:43 am by Eva Galperin and Jillian York
Twitter could do a lot to protect the rights of their users by giving them the option to encrypt these communications.Adopt anti-harassment measures that empower users. [read post]
2 Oct 2015, 2:57 am by INFORRM
In Chapter 2, ‘A Framework for Identifying Internet Information Gatekeepers’ (IIG), the gatekeepers studied in this book will be identified and rooted in their impact on human rights. [read post]