7/2 If I download a software that has GNU GPL and create a search
engine on top of it and the search engine profits (and I don't
release the source code nor do I modify or redistribute it), is
that an acceptable use of GNU GPL?
\_ Yes. Even the AGPL allows this if you don't modify the program.
\_ What if I'm a search engine that uses something that uses
...
4/19 My Firefox 3.6.28 pops up a Software Update box that reads "Your
version of Firefox will soon be vulnerable to online attacks." Are
they planning to turn off some security feature in my version of
Firefox?
\_ Not as such, no, but they're no longer developing this version,
so if a 3.6.x-targeted hack shows up, you're not going to get
...
1/4 I want to test how my servers behave during a disk failure and
a RAID reconstruction so I want to simulate a hardware failure.
How can I do this in Linux without having to physically pull
a drive? These disks are behind a RAID card and run Linux. -ausman
\_ According to the Linux RAID wiki, you might be able to use mdadm
to do this with something like the following:
...
11/8 ObM$Sucks
http://technet.microsoft.com/en-us/security/bulletin/ms11-083
\_ How is this different from the hundreds of other M$ security
vulnerabilities that people have been finding?
\_ "The vulnerability could allow remote code execution if an
attacker sends a continuous flow of specially crafted UDP
...