If I were his lawyer I would submit a laptop that will not start due to corrupt windows files as exhibit A.
Exhibit B would be the packing list of laptop when purchased.
Then call an expert witness to show the court how to fix this issue. It would include sitting there and watching the file DL then burn it to a DVD or flash drive. Then ask how the home user could have done it if the laptop was the only computer they had.
"While technically true, this is not really a factor any longer. With the speed of processors (and GPUs), extensive wordlists and rainbow tables, brute-force cracking of a password hash is relatively easy and not time consuming for average 7 or 8 character passwords, mixed case or additonal numbers/symbols not withstanding."
That is assuming that the online authentication will allow the computer to try every combination at the max speed without locking the account for a fixed time. If you can try 5 passwords then be locked out for 5 minutes assuming no caps an 8 alphanumeric password will take 36^8 minutes to complete all combos. That is 1min(if first answer is correct) to 5,367,408.499 years last one is correct.
If you would have spent 3 seconds clicking on the link you would have got your answer.
"China Unicom, the country's second largest telecom operator, has replaced Cisco Systems routers in one of the country's most important backbone networks, citing security reasons [due to bugs and vulnerability.) The move came after a congressional report branded Huawei Technologies Co. Ltd. and ZTE Corp. security threats in the United States, citing bugs and vulnerability (rather than actual evidence of spying.) Surprising to us, up to now, Cisco occupies a large market share in China. It accounts for over a 70 percent share of China Telecom's 163 backbone network and over an 80 percent share of China Unicom's 169 backbone network. Let's wait to see who's the winner in this trade war disguised as national security"
Normally they have you pay a fee for each test to not take a class. It sounds like this university you pay per semester and then go to any and as many classes as you want.
I would have liked doing that at my university I could have graduated a year earlier while still working full time.
They are thinking. We need to require the students to do more word searches, that way the busy work will require at lease four semesters to complete the classes
Only the 1 specific use would be blocked. So each page that hosts the same file would have to be listed since it cant be determined that the use on sight Z is infringing but on sight Y is authorized.
The the actual address is not listed it is not blocked.
(I guess that everyone missed that I was poking fun at those who think a magic button or program can decide what is infringing or not with out it having at assume everything is allowed unless told other wise. You know the same way it is now.)
That's the point. The only way to know if it is not a fair use or other allowed use you would have to have a list containing that specific use as infringing.
That is the magic script it blocks everything that it knows if infringing and allows everything else.
"Separately, you can't create an algorithm that detects fair use. Or the public domain. Point being: it's not that easy and it's silly to claim otherwise."
I will have to disagree with the above statement. It is easy the algorithm just needs to use the following logic.
Check X
If X is listed in Public Domain DB approve.
If X is NOT listed in Public Domain DB continue.
If X is listed in piracy list DB for the specific instance block.
If X is NOT listed in piracy list DB for the specific instance approve.
Linux distros are not hard to get setup and are getting easier. We set us Unbuntu on the PC of a retired poly-sci teacher who is not good with computers in general the next week when we came over he had remote printing set up.
Re: Re: This plays in with the article about saving old software
I Still have a few games like that that I saved from win 95 like Castle In The Wind and several others. That reminds me i should dig that flash drive out and give some of them a play again. The only problem is getting it to work on Vista, its a good thing I still have the DLLs needed from the win95.
"See, Will.I.Am may not be able to consent to being in the video, and all of his work (including what was used in the video) would be by contract copyright to his label. Since the label didn't issue rights to megaupload for his work, it's a copyright issue."
It still is not a copyright issue it is a contract issue in that Will.I.Am was in breach of the contract with UMG. Assuming that you are correct stating every thing stated by Will.I.Am belongs to UMG according to his contract with them.
On the post: Microsoft Helps Get A Computer Recycler Sentenced To 15 Months In Prison For Offering Unapproved Recovery Disks
Exhibit A,B..
Exhibit B would be the packing list of laptop when purchased.
Then call an expert witness to show the court how to fix this issue. It would include sitting there and watching the file DL then burn it to a DVD or flash drive. Then ask how the home user could have done it if the laptop was the only computer they had.
On the post: Blizzard Sued For Trying To Make Accounts More Secure
Re: Re: Re: Re: Re:
On the post: Blizzard Sued For Trying To Make Accounts More Secure
Re: Re: Re: Re:
That is assuming that the online authentication will allow the computer to try every combination at the max speed without locking the account for a fixed time. If you can try 5 passwords then be locked out for 5 minutes assuming no caps an 8 alphanumeric password will take 36^8 minutes to complete all combos. That is 1min(if first answer is correct) to 5,367,408.499 years last one is correct.
On the post: Toshiba: You Can't Have Repair Manuals Because They're Copyrighted And You're Too Dumb To Fix A Computer
Re: Re: Re: Re:
On the post: Cisco's CEO Rips Into The Patent System & All Who Abuse It, Big Or Small
Re: Re:
"China Unicom, the country's second largest telecom operator, has replaced Cisco Systems routers in one of the country's most important backbone networks, citing security reasons [due to bugs and vulnerability.) The move came after a congressional report branded Huawei Technologies Co. Ltd. and ZTE Corp. security threats in the United States, citing bugs and vulnerability (rather than actual evidence of spying.) Surprising to us, up to now, Cisco occupies a large market share in China. It accounts for over a 70 percent share of China Telecom's 163 backbone network and over an 80 percent share of China Unicom's 169 backbone network. Let's wait to see who's the winner in this trade war disguised as national security"
On the post: UK Student Charged For 'Grossly Offensive' Facebook Post
Re:
hehe
On the post: UK Student Charged For 'Grossly Offensive' Facebook Post
Re: The old saying
I believe the updated version goes like this "Sticks and stones can break my bones, but words can let me sue you."
On the post: University Sues Student For Graduating Too Fast
Re:
I would have liked doing that at my university I could have graduated a year earlier while still working full time.
On the post: University Sues Student For Graduating Too Fast
Re:
On the post: Hollywood Super Agent Ari Emanuel Mystified That Google Doesn't Just Invent A Magic Stop Piracy Button
Re: Re: Disagree
The the actual address is not listed it is not blocked.
(I guess that everyone missed that I was poking fun at those who think a magic button or program can decide what is infringing or not with out it having at assume everything is allowed unless told other wise. You know the same way it is now.)
On the post: Hollywood Super Agent Ari Emanuel Mystified That Google Doesn't Just Invent A Magic Stop Piracy Button
Re: Re: Disagree
That is the magic script it blocks everything that it knows if infringing and allows everything else.
On the post: Hollywood Super Agent Ari Emanuel Mystified That Google Doesn't Just Invent A Magic Stop Piracy Button
Disagree
I will have to disagree with the above statement. It is easy the algorithm just needs to use the following logic.
Check X
If X is listed in Public Domain DB approve.
If X is NOT listed in Public Domain DB continue.
If X is listed in piracy list DB for the specific instance block.
If X is NOT listed in piracy list DB for the specific instance approve.
On the post: Hollywood Super Agent Ari Emanuel Mystified That Google Doesn't Just Invent A Magic Stop Piracy Button
Re: Analogies
See you do not need to change just market it different.
On the post: Apple CEO: When Others Violate Our Patents, They're Copying Our Hard Work; When We Violate Patents, The System Is Broken
Re: Re:
"He compared patent infringement to signing one's name on a painting that someone else put energy into finishing."
As long as you do SOMETHING to "finish" it you can sign your name to the work, even if the finishing is placing it in a frame.
On the post: Guy Files Lawsuit To Strip Google Of Its Trademarks
Re: Re: Re: Almost there
On the post: Guy Files Lawsuit To Strip Google Of Its Trademarks
Re: Re: Re:
On the post: Size Matters: Why The TSA Fears Thirteen-Inch Laptops, But Not Eleven-Inch Ones
Re: Re: Shoes at the Airport
On the post: Size Matters: Why The TSA Fears Thirteen-Inch Laptops, But Not Eleven-Inch Ones
Re: 11" - no hassles
On the post: Ubisoft Cuts Off Legit Players With DRM Server Migration; Pirates Play On
Re: Re: This plays in with the article about saving old software
On the post: Megaupload Sues Universal Over Questionable Video Takedown, As Will.i.am Says He Sent Takedown Too
Re:
It still is not a copyright issue it is a contract issue in that Will.I.Am was in breach of the contract with UMG. Assuming that you are correct stating every thing stated by Will.I.Am belongs to UMG according to his contract with them.
Next >>