Search for: "Root User" Results 61 - 80 of 1,857
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
7 Dec 2020, 6:16 am by Michael Froomkin
Kazakhstan users have told ZDNet today that they are not able to access sites like Google, Twitter, YouTube, Facebook, Instagram, and Netflix without installing the government’s root certificate. [read post]
2 Jan 2018, 9:10 am
The Interplay Between User Innovation, the Patent System and Product Liability Laws: Policy ImplicationsStijepko Tokic, J.D., LL.M.Innovation is a heavily used buzzword in the United States of America, and the fixation with innovation has deep roots in American society. [read post]
17 Nov 2011, 3:41 am by meritxell_fernandez
In IdeaScale, users are asked to check whether their idea has already been covered by other users, and alternatively to add a new idea. [read post]
12 Mar 2022, 4:14 pm by INFORRM
These include: Impartial or neutral strategies mean the companies do not take a particular side during incidents, but provide further information on the topic at the root of the hostility. [read post]
24 Nov 2020, 6:54 am by rainey Reitman
So, this episode has its roots in a long and ongoing discussion that we have at EFF about competition in tech, or rather, the complete lack of it these days. [read post]
24 Jul 2012, 3:01 am by tekEditor
Additionally, as used herein, a "user" may be an individual, a group, or an entity (such as a business or third party application). [read post]
30 Aug 2023, 5:01 am by Nicholas Nugent
Put differently, deplatforming expands the scope of concern beyond the particular website in which a user might express a disfavored opinion to encompass the user's words or actions on any website or even to the user's offline words and actions. [read post]
10 Dec 2015, 2:13 pm by Bill Budington and Eva Galperin
Because of this, it is difficult for ordinary attackers to pull off a Man in the Middle attack successfully on encrypted Internet connections—they have to both be situated in a privileged position within the network (between the user and the remote server), and in possession of a certificate signed by a root for the server being accessed. [read post]
17 Sep 2009, 4:50 am
As with the sophisticated user defense, the bulk supplier notion is rooted in Restatement § 388 comment n. [read post]
21 Apr 2010, 12:27 pm
Pagers were at the root of this week's Ontario v. [read post]
28 May 2014, 12:11 pm by Dan Goodin
" The advisory warned that critical weaknesses in the software expose users to attacks that compromise investigations and the security of the agency networks. [read post]
22 Feb 2019, 10:30 am by Cooper Quintin
DarkMatter’s business objectives directly depend on intercepting end-user traffic on behalf of snooping governments. [read post]
14 May 2018, 8:32 am
Who's responsible for making this video available: (a) the user-uploader(b) YouTube(c) both of them(d) Merpel(e) no oneCan YouTube be considered primarily responsible (and, therefore, potentially liable) for the making available of user-uploaded content through its platform? [read post]
26 Oct 2020, 4:41 pm by Corynne McSherry
Platforms must address one of the root causes behind disinformation’s spread online: the algorithms that decide what content users see and when. [read post]
3 Mar 2021, 12:10 pm by Gerson & Schwartz, P.A.
When they do not comply with regulations aimed at keeping people safe, drivers put other road users at risk. [read post]
14 Jan 2021, 7:31 am by Dave Wieneke
The case isn’t rooted in harm to a specific person, or a class of litigants suffering some aggregate injury. [read post]
25 Nov 2015, 10:56 am by Cooper Quintin
The same certificate appears to be installed in every affected Dell machine, which would enable an attacker to compromise every affected Dell user if only they had the private key which Dell used to create the certificate. [read post]
On a Mac, open Finder and navigate to the root directory of your Mac's hard drive. [read post]
20 Feb 2015, 1:20 pm by Dan Goodin
Instead, it attacks an argument that no one has made—that Superfish somehow shares personal information without users' permission. [read post]
19 Dec 2013, 6:06 pm by Parker Higgins
There ways to get the privacy control back if you have a rooted device or install Cyanogenmod. [read post]