Search for: "Root User" Results 161 - 180 of 500
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
16 Jun 2021, 3:15 pm by Cyberleagle
that ‘news publisher content’ is carved out of the safety duties that would be imposed on user [read post]
29 Jul 2010, 7:03 pm by lennyesq
(sets of Actions) based onContexts (application, time, date, location, event, gesture)in user-defined [read post]
11 Feb 2015, 9:02 am by Jonathan Brun
We all know that a tool that is user friendly will be used more. [read post]
12 May 2014, 3:27 am by Barbara van Schewick
” What this means: Over the past three weeks, many users, start-ups, Internet companies, investors [read post]
23 Sep 2013, 6:00 pm by Daniel Nazer and Daniel Nazer
We need stronger reform to stop the disturbing trend of patent trolls picking on customers and end users [read post]
22 Jul 2013, 10:35 am
The thing that troubles this Kat is not however the notion of a Protected Pomodoro, but rather the user-unfriendliness [read post]
25 Feb 2021, 2:26 pm by Ernesto Falcon
network size as a competitor wasn’t twice as attractive, it was exponentially more attractive to users [read post]
13 Jun 2016, 4:08 am by Anonymous
suggest which agencies could or should coordinate more...In the meantime the auditors do not get to the root [read post]
29 Apr 2020, 5:52 am
hash of the previous block, a timestamp, and transaction data (generally representing a merkle tree root [read post]
8 Oct 2018, 2:46 pm by Sabrina I. Pacifici
But increasingly, its success depends on users knowing that their data is secure, and on developers having [read post]
25 Jan 2010, 10:08 pm by The Complex Litigator
nbsp;Personally, I've almost given up on Facebook, purely because of its deplorable disregard for user [read post]
21 Dec 2021, 1:39 am by Hayleigh Bosher
Rendas suggests that the better view is that they should be categorised as user “privileges&rdquo [read post]
5 Jan 2021, 1:40 pm by Dan Goodin
messenger app makes it easy for hackers to find your precise location when you enable a feature that allows users [read post]
23 Dec 2019, 2:08 pm by Andrés Arrieta
impersonate legitimate cellphone towers to trick mobile phones into connecting to them, in order to track a user [read post]
1 Sep 2015, 2:27 pm by Mark Jaycox
broad legal immunity, and new spying powers allow for a tremendous amount of unnecessary damage to users [read post]
11 Sep 2018, 1:18 am
The authors publish with journals who charge subscriptions to their users, but also publish copy of their [read post]
9 Jun 2008, 10:52 am
several examples of recent exploits, which embed malicious software in PDF documents, and which install root [read post]
23 Feb 2015, 3:40 pm by Megan Geuss
when researchers discovered that pre-installed adware from a company called Superfish was making users [read post]
16 May 2025, 9:01 am by Ashley Belanger
the overall quality of Meta’s apps has declined" or that the company shows too many ads to users [read post]
10 Apr 2014, 12:00 am by Starchy Grant and David Grant
The Heartbleed SSL vulnerability presents significant concerns for users and major challenges for site [read post]