If I were his lawyer I would submit a laptop that will not start due to corrupt windows files as exhibit A.
Exhibit B would be the packing list of laptop when purchased.
Then call an expert witness to show the court how to fix this issue. It would include sitting there and watching the file DL then burn it to a DVD or flash drive. Then ask how the home user could have done it if the laptop was the only computer they had./div>
"While technically true, this is not really a factor any longer. With the speed of processors (and GPUs), extensive wordlists and rainbow tables, brute-force cracking of a password hash is relatively easy and not time consuming for average 7 or 8 character passwords, mixed case or additonal numbers/symbols not withstanding."
That is assuming that the online authentication will allow the computer to try every combination at the max speed without locking the account for a fixed time. If you can try 5 passwords then be locked out for 5 minutes assuming no caps an 8 alphanumeric password will take 36^8 minutes to complete all combos. That is 1min(if first answer is correct) to 5,367,408.499 years last one is correct./div>
If you would have spent 3 seconds clicking on the link you would have got your answer.
"China Unicom, the country's second largest telecom operator, has replaced Cisco Systems routers in one of the country's most important backbone networks, citing security reasons [due to bugs and vulnerability.) The move came after a congressional report branded Huawei Technologies Co. Ltd. and ZTE Corp. security threats in the United States, citing bugs and vulnerability (rather than actual evidence of spying.) Surprising to us, up to now, Cisco occupies a large market share in China. It accounts for over a 70 percent share of China Telecom's 163 backbone network and over an 80 percent share of China Unicom's 169 backbone network. Let's wait to see who's the winner in this trade war disguised as national security"/div>
Normally they have you pay a fee for each test to not take a class. It sounds like this university you pay per semester and then go to any and as many classes as you want.
I would have liked doing that at my university I could have graduated a year earlier while still working full time./div>
They are thinking. We need to require the students to do more word searches, that way the busy work will require at lease four semesters to complete the classes/div>
Only the 1 specific use would be blocked. So each page that hosts the same file would have to be listed since it cant be determined that the use on sight Z is infringing but on sight Y is authorized.
The the actual address is not listed it is not blocked.
(I guess that everyone missed that I was poking fun at those who think a magic button or program can decide what is infringing or not with out it having at assume everything is allowed unless told other wise. You know the same way it is now.)/div>
That's the point. The only way to know if it is not a fair use or other allowed use you would have to have a list containing that specific use as infringing.
That is the magic script it blocks everything that it knows if infringing and allows everything else./div>
"Separately, you can't create an algorithm that detects fair use. Or the public domain. Point being: it's not that easy and it's silly to claim otherwise."
I will have to disagree with the above statement. It is easy the algorithm just needs to use the following logic.
Check X
If X is listed in Public Domain DB approve.
If X is NOT listed in Public Domain DB continue.
If X is listed in piracy list DB for the specific instance block.
If X is NOT listed in piracy list DB for the specific instance approve./div>
Linux distros are not hard to get setup and are getting easier. We set us Unbuntu on the PC of a retired poly-sci teacher who is not good with computers in general the next week when we came over he had remote printing set up./div>
I Still have a few games like that that I saved from win 95 like Castle In The Wind and several others. That reminds me i should dig that flash drive out and give some of them a play again. The only problem is getting it to work on Vista, its a good thing I still have the DLLs needed from the win95./div>
"See, Will.I.Am may not be able to consent to being in the video, and all of his work (including what was used in the video) would be by contract copyright to his label. Since the label didn't issue rights to megaupload for his work, it's a copyright issue."
It still is not a copyright issue it is a contract issue in that Will.I.Am was in breach of the contract with UMG. Assuming that you are correct stating every thing stated by Will.I.Am belongs to UMG according to his contract with them./div>
Exhibit A,B..
Exhibit B would be the packing list of laptop when purchased.
Then call an expert witness to show the court how to fix this issue. It would include sitting there and watching the file DL then burn it to a DVD or flash drive. Then ask how the home user could have done it if the laptop was the only computer they had./div>
Re: Re: Re: Re: Re:
Re: Re: Re: Re:
That is assuming that the online authentication will allow the computer to try every combination at the max speed without locking the account for a fixed time. If you can try 5 passwords then be locked out for 5 minutes assuming no caps an 8 alphanumeric password will take 36^8 minutes to complete all combos. That is 1min(if first answer is correct) to 5,367,408.499 years last one is correct./div>
Re: Re: Re: Re:
Re: Re:
"China Unicom, the country's second largest telecom operator, has replaced Cisco Systems routers in one of the country's most important backbone networks, citing security reasons [due to bugs and vulnerability.) The move came after a congressional report branded Huawei Technologies Co. Ltd. and ZTE Corp. security threats in the United States, citing bugs and vulnerability (rather than actual evidence of spying.) Surprising to us, up to now, Cisco occupies a large market share in China. It accounts for over a 70 percent share of China Telecom's 163 backbone network and over an 80 percent share of China Unicom's 169 backbone network. Let's wait to see who's the winner in this trade war disguised as national security"/div>
Re:
hehe/div>
Re: The old saying
I believe the updated version goes like this "Sticks and stones can break my bones, but words can let me sue you."/div>
Re:
I would have liked doing that at my university I could have graduated a year earlier while still working full time./div>
Re:
Re: Re: Disagree
The the actual address is not listed it is not blocked.
(I guess that everyone missed that I was poking fun at those who think a magic button or program can decide what is infringing or not with out it having at assume everything is allowed unless told other wise. You know the same way it is now.)/div>
Re: Re: Disagree
That is the magic script it blocks everything that it knows if infringing and allows everything else./div>
Disagree
I will have to disagree with the above statement. It is easy the algorithm just needs to use the following logic.
Check X
If X is listed in Public Domain DB approve.
If X is NOT listed in Public Domain DB continue.
If X is listed in piracy list DB for the specific instance block.
If X is NOT listed in piracy list DB for the specific instance approve./div>
Re: Analogies
See you do not need to change just market it different./div>
Re: Re:
"He compared patent infringement to signing one's name on a painting that someone else put energy into finishing."
As long as you do SOMETHING to "finish" it you can sign your name to the work, even if the finishing is placing it in a frame./div>
Re: Re: Re: Almost there
Re: Re: Re:
Re: Re: Shoes at the Airport
Re: 11" - no hassles
Re: Re: This plays in with the article about saving old software
Re:
It still is not a copyright issue it is a contract issue in that Will.I.Am was in breach of the contract with UMG. Assuming that you are correct stating every thing stated by Will.I.Am belongs to UMG according to his contract with them./div>
More comments from Sean T Henry >>
Techdirt has not posted any stories submitted by Sean T Henry.
Submit a story now.
Tools & Services
TwitterFacebook
RSS
Podcast
Research & Reports
Company
About UsAdvertising Policies
Privacy
Contact
Help & FeedbackMedia Kit
Sponsor/Advertise
Submit a Story
More
Copia InstituteInsider Shop
Support Techdirt