NOTICE OF DATA BREACH
We are writing to inform you about a data security issue that may involve your Yahoo account information.
A copy of certain user account information was stolen from our systems in late 2014 by what we believe is a state-sponsored actor. We are closely coordinating with law enforcement on this matter and working diligently to protect you.
What Information Was Involved?
The stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers. Not all of these data elements may have been present for your account. The ongoing investigation suggests that stolen information did not include unprotected passwords, payment card data, or bank account information; payment card data and bank account information are not stored in the system that the investigation found to be affected.
What We Are Doing
We are taking action to protect our users:
We are asking potentially affected users to promptly change their passwords and adopt alternate means of account verification.
We invalidated unencrypted security questions and answers so they cannot be used to access an account.
We are recommending that all users who haven't changed their passwords since 2014 do so.
We continue to enhance our systems that detect and prevent unauthorized access to user accounts.
We are working closely with law enforcement on this matter.
Our investigation into this matter continues.
What You Can Do
We encourage you to follow these security recommendations:
Change your password and security questions for any other accounts on which you used the same or similar information used for your Yahoo account.
Review your accounts for suspicious activity.
Be cautious of any unsolicited communications that ask for your personal information or refer you to a web page asking for personal information.
Avoid clicking on links or downloading attachments from suspicious emails.
Additionally, please consider using Yahoo Account Key, a simple authentication tool that eliminates the need to use a password altogether.
For More Information
For more information about this issue and our security resources, please visit the Yahoo Security Issue FAQs page available at https://yahoo.com/security-update.
Protecting your information is important to us and we work continuously to strengthen our defenses against the threats targeting our industry.
Chief Information Security Officer
Sunday, September 25, 2016
Monday, September 5, 2016
Google defines evil as profoundly immoral and malevolent. It then turns around and defines malevolent as having or showing a wish to do evil to others.We know morality is subjective and dependent on the observer. Therefore, we can discard any mention of morality when it comes to logical thinking. Even with this concession, the definition of evil is truly lacking.
Do we say a lion is evil for hunting and eating an antelope? Do we say a man is evil for going to a forest and eating a cantaloupe? Do we say a man is evil for taking pleasure in the pain and suffering of others? It is all subjective therefore any discussion about "evil" has no place in a logical discourse. When someone says so and so is evil, we can safely disregard their argument because the whole premise doesn't matter.
Sunday, June 19, 2016
As I read http://www.nytimes.com/2016/06/19/opinion/sunday/why-i-was-wrong-about-welfare-reform.html and the comments there, I am thinking of what would be a good way to help people. One outrageous idea in my mind is to give every adult a head start -- every adult gets a paycheck at minimum wage worth n hours of work each week, exempt from any income tax (federal, state, local, or otherwise) by law. I think a sweet spot would be n = 5. At fifteen dollars per hour, this translates to under $10.72 a day. Needless to say, such a program would be extremely expensive. If we extend it to every person in the United States, which we shall assume is about 320 million. It would cost almost $1.25 TRILLION DOLLARS at the above rate. Just to show how big this number is, the US Federal Tax Revenue for 2015 was $3.25 trillion.
|By Farcaster at English Wikipedia, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=47853651|
|By Farcaster at English Wikipedia, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=22185805|
Even as a thought experiment, this is a little too expensive. Let us try to constrain ourselves a little here. According to Wikipedia, 19.4% of the population is fourteen years old or younger. Lets be conservative and estimate that 80% of the population is eighteen years old or older. If we only pay adults eighteen or over, we have limited ourselves under the one trillion dollar mark.
The key here is to make this available to everyone without any means testing at all. Of course, we can expect that there will be significant resistance from everywhere against this plan, even though it is just a thought experiment. If you have any thoughts, please feel free to write a comment.
Labels: basic income
Sunday, June 5, 2016
This is probably obvious to you but in case it isn't, I'd like to write a post about your Windows computer and your Bluetooth headphones/headset. Set the headphones as the default device and set the headset as the default communications device. This lets you listen to cleaner music but also allows you to use the microphone in your Bluetooth headphones.
|Prefer Headphones when listening to music|
Friday, May 6, 2016
Friday, April 17, 2015
VirtualBox Personal Use and Evaluation License (PUEL)
JETBRAINS LICENSE AGREEMENT FOR EDUCATION
Version 1, Effective as of September 23, 2014
IMPORTANT! READ CAREFULLY: THIS IS A LEGAL AGREEMENT. BY DOWNLOADING, INSTALLING, COPYING, SAVING ON YOUR COMPUTER, OR OTHERWISE USING THIS SOFTWARE, YOU (LICENSEE, AS DEFINED BELOW) ARE BECOMING A PARTY TO THIS AGREEMENT AND YOU ARE CONSENTING TO BE BOUND BY ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT, YOU SHOULD NOT DOWNLOAD, INSTALL AND USE THE SOFTWARE.