Can we follow this up by murdering most of the generic Top Level Domains (gTLD)? I have yet to see anything except spam and malware coming out of the .top domain.
there wouldn’t be any reason to tweak and replace it all constantly.
There really wasn't.
There is the legal concept of Mens Rea which has to do with the mental state of the person committing the act. And I think that applies in this case. Archeology has generally been about learning and providing knowledge of previous cultures. While the methods, mindset and actions of 18th and early 19th century treasure hunters left a lot to be desired, some of them did make some reasonable attempt at documenting their finds and preserving the context to provide that knowledge. Modern archeologists go to painstaking lengths to properly document finds and preserve as much knowledge as possible from finds. Grave robbers do none of this. Their motivations generally revolve around personal gain and they will destroy any context and knowledge in their attempt to make money.
Consider your own reading on the Valley of the Kings. Where did all of the information we have on the Pharaohs in those tombs come from? It's from the work of the archeologists documenting everything found in those tombs. While there is certainly an argument for leaving things in the same state they were found in, that also means that the artifacts will continue to deteriorate and any further knowledge which might be gleaned from them will be lost. Sending artifacts to a museum isn't all about putting them in cases for people to gawk at. It also means that actions are taken to preserve those artifacts and maintain them for observation and study in the future. Sometimes this does cause damage. Again, 18th and early 19th century preservation was often just as, if not more damaging than leaving those artifacts in-sutu. But again, the intention was to preserve, not enrich.
So, that's how I would draw the line, based on the reason and methods used for the removal of grave goods. Is it done with the intention for the furtherance of knoweldge of previous cultures? Or, is it just done to enrich someone? And is the work being done using the current understanding and methods to best capture and preserve that knowledge for future generations?
While I would never support it, the main way to improve online discussion is by removing anonymity. Allow me to go back a couple decades and point to John Gabriel's Greater Internet Fuckwad Theory. People with a reasonable expectation of anonymity turn into complete assholes. The common solution to this is by linking accounts to a real identity in some way, such that online actions have negative consequences to the person taking them. Google famously tried this by forcing people to use their real name on accounts. And it was a privacy nightmare. Ultimately though, it's the only functional solution. If anti-social actions do not have negative social consequences, then there is no disincentive for people to not take those actions and people can just keep spinning up new accounts and taking those same anti-social actions. This can also be automated, resulting in the bot farms which troll and brigade online forums. On the privacy nightmare side of the coin, it means it's much easier to target people for legitimate, though unpopular, opinions. There are some "in the middle" options, which can make the cost to creating accounts somewhat higher and slower; but, which don't expose peoples' real identities in quite the same way. But, every system has it's pros and cons. And the linking of identities to accounts
Voting systems and the like will always be a kludge, which is easy to work around. Any attempt to predicate the voting on trusting users to "do the right thing" is doomed to fail. People suck, they will do what they want and ignore the rules when they feel they are justified in doing so. Or, some people will do it just to be dicks. At the same time, it also promotes herding and bubbles. If everyone in a community chooses to downvote puppies and upvote cats, eventually the puppy people will be drown out and forced to go off and found their own community which does the opposite. And those communities, both now stuck in a bias reinforcing echo chamber, will continue to drift further apart and possibly radicalize against each other. This isn't even limited to online discussions. People often choose their meat-space friends based on similar beliefs, which leads to people living in bubbles which may not be representative to a wider world.
Despite the limitations of the kludge, I do think voting systems are the best we're going to get. I'd agree with @grue that the Slashdot system had a lot of merit. Allowing the community to both vote on articles/comments and then later have those votes voted on by a random selection of users, seems like a reasonable way to try to enforce some of the "good faith" voting you're looking for. Though, even that will likely get gamed and lead to herding. It's also a lot more cumbersome and relies on the user community taking on a greater role in maintaining the community. But, as I have implied, I don't think there is a "good" solution, only a lot of "less bad" ones.
Like many of the differences, I suspect that one came out of the attempts as English Spelling Reform, which took greater hold in the US. Ultimately, the process hasn't succeeded, but it has excised some of inconsistencies from the English. Though, it has also led to some confusion, as in the tire/tyre case.
Ya, absolutely. My point was that, we shouldn't assume that vendors are doing things right all the time. So, it's important to have those layered defense, because vendors do stupid stuff like this.
This is a good example of why a zero trust network architecture is important. This attack would require the attacker to be able to SSH to the management interface of the device. Done right, that interface will be on a VLAN which has very limited access (e.g. specific IPs or a jumphost). While that isn't an impossible hurdle for an attacker to overcome, it's significantly harder than just popping any box on the network. People make mistakes all the time, and someone on your network is going to fall for a phishing attack or malicious redirect or any number of things. Having that extra layer, before they pop the firewall, gives defenders that much more time to notice, find and evict the attacker.
Also, Whiskey, Tango, Foxtrot Cisco?
Even worse that acquisition links back to the Embracer Group. Hopefully KC:D 2 makes it out the door before Embracer full fucks up Warhorse.
The new seasons have been lackluster. I think one of the main issues is that the show did a lot to wrap up the majority of the main character arcs prior to the cancellations. Fry and Leela are the central characters, often trading off the position as the audience stand-in. And there is basically zero room left for character growth. We know how the Fry/Leela love story arc ends, we've seen it. Kif and Amy have also hit the end of their main character arcs. They are married, have kids, and mostly are settled into domestic life. Bender is Bender. A core part of his character is his resistance to growth. So, even when they drop a backstory on him and try to give him growth, it just feels out of place. That only leaves background characters to work with. But, since it takes the focus off the main characters, it makes things feel like a money-grab spin-off.
All that's left is the sort of 90's sit-com style, "story of the week" where nothing really changes and we all learn whatever moral lesson the writers wanted to foist on us this week in 22-minutes, plus commercial breaks. We all want "more Futurama"; but, I think the problem may be that there isn't "more Futurama". The stories are done, we just keep hanging on because of nostalgia, and the producers keep making it because of money. There are going to be good bits here and there. But, what we are seeing is what we are going to keep getting.
You have to get out away from cities. We get them in our yard every summer and our kids run about catching them.
Seen this one in my work environment. Confusing as heck the first time. It looks like explorer.exe in the context of the local user starts PowerShell.exe with a command line involving an Invoke-WebRequest
piping the download into an Invoke-Expression
(usually the shorter iex
alias). No .lnk or .js file involved. Just explorer, PowerShell, infected.
War rarely decides who's right, just who's left.