4chan zip




















Git stats 18, commits. Failed to load latest commit information. Update broken-stream. Jan 3, Update template. Jan 13, Fill in the blank group-title. Jan 12, Dec 12, This is Ask Hackaday so we want to know your take on this. When old source code leaks, is it a bad thing? Are there any compelling reasons for keeping the source code from projects that have seen their last sunset a secret? And now that the XP code is out there somewhere, what do you think may come for it?

Weigh in below! Also, these US intelligence agencies hire more savant hackers and crypto nerds and obfuscation experts than anyone on the planet by a huge margin. Just go to a con sometime and watch the scalpers mingle about.

Heck, that encryption machine was a physical device that anybody could just take apart and examine and nobody spotted its backdoor for decades! People act like reading the source code is a magic bullet for security. The fact that hundreds of accidental zero days can exist without even the original developers themselves knowing about them for years is plenty of proof of that. There are people who specialize in making very sneaky intentional zero days. In short, people should be far far far more skeptical than they are of Signal and Tor.

And everything else. Especially if it claims to be secure and vetted. In , all software is extremely shady. Not to mention badly made.

Hard to tell intentional breakage from natural defectiveness anymore. Yes but it only shows up in the compiled code if you use the right compiler and settings at build time and it is conditional on the runtime choice of interface language and time zone. But the BSD license allows it anyhow.

So not sure what the news is there. But what can be done with a source available OS anyway? The XP full source code has been available for over 15 years to certain universities and research groups.

Only surprising news to me was that Microsoft had packaged up XP source that actually compiles! But even back in , that source was not licensed for any distribution or derivative uses. Leaked code is NOT open-source code.

None or in negative way, wine developers cant use this code because it is not theirs, it is not under open license. Even looking at it can cause you to lose right to submit code to projects such as wine, samba, reactos etc. There were other leaks before, search internet and see how it ended, eg ReactOS even had to do a complete review of whole codebase.

Eh this is kind of an interpretation of a law that expects everybody to follow all letters of the law at all times and it naively assumes that all actions will be detected. It also assumes that the property owners will pursue all violations evenly without regard to the cost-benefit analysis. I remember back then it was like clean pirated windows images grew on trees. Nobody seemed to get caught. Genuine windows software was as unintrusive as it could possibly be.

Microsoft is going to still have a pretty embarrassing time if they start calling out people who steal their code, too. I doubt it will make it into official wine distros, but somebody out there is going to make use of it and blast code all over the net. They may have started with a new underlying framework, but once they had that, they threw in a lot of existing functions and put on a fresh coat of paint i.

When Apple 10? Ensure your children understands that if someone has asked them to keep a secret from you that it isn't because the child will get into trouble but the person who has asked them to keep the secret knows what they are doing to them is wrong. Express interest in all of your child's activities, including schoolwork, extracurriculars, hobbies, and other interests.

Let your child know that they can tell you anything, and that you're always willing to talk. Teach your child to recognize inappropriate touching. Many parents use the "good touch, bad touch, secret touch" method. It involves teaching your child that there are some appropriate touches, like pats on the back or high fives; there are some unwelcome or "bad' touches, like hits or kicks; and there are also secret touches, which are touches that the child is told to keep a secret.

Use this method or another one to teach your child that some touches aren't good, and when these happen, he or she should tell you immediately. Many parents define private areas as those that would be covered by a bathing suit.

Children also need to know an adult should not ask a child to touch anyone else's private areas or their own. Tell your child to say "no" and walk away if someone tries to touch him or her in a private area. Tell your child to come to you immediately if someone touches them the wrong way.

Recognize when something is out of sync with your child. If you notice your child is acting differently, pursue the issue to find out what is wrong. Regularly asking your child questions about their day, including asking whether any "good," "bad," or "secret" touches happened that day, will help open the lines of communication. Never dismiss it if your child tells you they were touched inappropriately or don't trust an adult. Trust your child first.

Never dismiss a child's claims because the adult in question is a valued member of society or appears incapable of such things. That's exactly what a child molester wants. Remember that the most important thing you can do to protect your child is to pay attention to them. Assess their needs and desires, talk to them, and in essence, just be the best parent you possibly can.

Bottom line to remember: If you don't pay attention to your child, someone else will. If the child is very young or younger than 14, it might not recognize that there's a difference between a grumpy teacher giving extra homework, or a strange acting teacher that wants them to kiss the cheek before leaving the room.

Both to them are 'annoying. Be realistic in the approach! Telling your kids to scream loudly when the teacher touches their shoulder, or hit his hand and yell whenever he'd touch their back, won't help.

They won't hit a teacher, especially not when they're being groomed and told he's only trying to help. Make sure they will tell him clearly that they have told their parents about what happened and they weren't happy with it. Or give the child an envelope, containing a letter that says; 'Stop touching my child' and your autograph. Make sure they give it to him when he is touching a bad part of their body and didn't stop when they said stop.

Make sure you think about this, it'll only have a positive effect if you're absolutely sure he'll be ignoring the boundaries and is actually going too far. One impulsive hand on the shoulder isn't. Include your email address to get a message when this question is answered. Clarification of terms: A pedophile is one who is primarily attracted to prepubescent children a common mistake in the media is to define a pedophile as anyone attracted to someone below the age of majority, extending the definition to those attracted to teens, which is incorrect.

Even a late adolescent like 15 or 16 years old can be a pedophile if they have sexual interest in prepubescent children usually under A hebephile is one who is primarily attracted to young to mid-teens, and an ephebophile is someone attracted to mid-to-late adolescents. A child molester is of course anyone who molests a child, regardless of their sexual attractions or preferences.

Helpful 4 Not Helpful 0. Remember, if a child looks isolated or upset, it will make them a very easy target for a predator. Latest commit. Git stats commits. Failed to load latest commit information. View code. What is it? Installing b-stats is written to work on Linux and Windows servers, with minimal setup required.



0コメント

  • 1000 / 1000