Given the quotes used in the article such as "catastrophic loss of cooling","Level 4 emergency" and the ever mysterious "events" seem cherry picked to portray impending doom, it perhaps comes as no surprise that a verifiable source is neither referenced nor can be found.
Other articles referring to this 'cover-up' which do have references, refer to articles saying that there is no emergency at the plant.
Soon the baseless articles will just start referencing one and other and because mainstream news hasn't reported on the baseless allegation it proves to conspiracy nutjobs that the article is correct because there is a media news blackout.
I'm extremely happy with my Linode VPS. Never had any problems and the performance seems great.
Getting a VPS was my first real foray into Linux and I've learnt so much since I started by just messing around. The Linode library has also been a great source of help.
I recommend anyone who likes to spend hours perfectly configuring services they will likely never use, because it's fun, should get one to hone their terminal chops.
I would recommend the same thing for the same kind of people, but only after you do it on a virtual machine (VirtualBox) on your local machine. It's a much cheaper alternative (free), and you'll have a better idea what you want and what to do when you move to Linode.
I think most of what you say is generally assumed to be the case although they haven't disclosed this. I think you may have oversimplified cloning a token though.
In order to clone a given token you require the token seed, token serial and its current token code[1]. The attacker my have the token seeds and serial numbers from the RSA security hack but not a token code without physical access to the token or a keylogger.
If the attacker could install a keylogger on some employee computer they could perhaps capture a token code and then use that to start emulating say 20,000 tokens with the seed and serial pairs stolen from the database. Next time they capture a code compare it with all the tokens being emulated to see if there is a match, if yes, possible success, you have cloned their token and a keylogger will also capture their pin. If there is no match, move onto next set of seed serial pairs with the code you just captured.
I still dont understand why it's taken so long to get to the point where they're going to renew the tokens. Perhaps I'm misunderstanding SecureID implementation, but If an attacker had accessed the database with the token seeds and serials, wouldn't the security then essentially become little better than single factor authentication?
It almost seems like they didn't actually know for definite if the database had been stolen and where unwilling to burden the cost of replacing all the tokens as a precaution. Now with the Lockheed Martin incident they know it was compromised and are forced to.
I think Facebook apps must request the permissions necessary for all of its implemented features upfront regardless of wether you choose to use a specific feature. In this case the default is to not post to your wall. You must opt to do so by clicking a link, so to me it is nonintrusive, though I suppose it requires a certain degree of trust.
No, you can ask for more permissions at any time, but this way the app only has to ask once, and most people probably just click "allow" anyway since they want to see the app.
Game sounds all come from more or less the same big professional libraries, so frequently you do end up using the same sound as another game (or movie, tv show etc).
Liam Howlett used Reason (among other things) to make Always Outnumbered, Never Outgunned. I'm not sure what was used for their latest work, Invaders Must Die, but it's likely similar software given their live setups for the last few years have been powered by several Macbook Pro's (along with other equipment).
Truly a master at his craft though. Here's a hacker who started making professional electronic music mostly the old way in the early 1990's, and has successfully transitioned into the digital age. If you've listened to Prodigy long enough, you end up coming across music they sampled in the most unlikely of places. It's like an endless easter egg hunt. I can't even begin to imagine how dynamic Liam's record library is.
BTW, if you've never seen them live before, you don't know what you're missing. Seen them three times already and they easily outshine NIN, Manson, and Rob Zombie in terms of live energy. The type of crowd they attract is energetic and intense. But bring a pair of earplugs if you don't want to go deaf. ;)
Edit: Check out Nekosite if you want to know more about the band: http://nekosite.co.uk/
My personal experience is that "earworms" are caused by not hearing the ending of a song. For me its usually the song that is playing when I walk out of a store, or the song thats playing on the radio when I turn it off.
If I know the song well enough and I am able, playing it out to the end in my head gets rid of it.
Other articles referring to this 'cover-up' which do have references, refer to articles saying that there is no emergency at the plant.
Soon the baseless articles will just start referencing one and other and because mainstream news hasn't reported on the baseless allegation it proves to conspiracy nutjobs that the article is correct because there is a media news blackout.