Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Data Piracy, or Legitimatized Hacking ?

Data Piracy, or Legitimatized Hacking ?

Scheduled Pinned Locked Moved The Lounge
databasesql-serverdesignsysadmintools
39 Posts 22 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G Offline
    G Offline
    GAMerritt
    wrote on last edited by
    #1

    It seems to me that they should be required to use SQL queries to collect the data they want from your computer system rather than being allowed to install tasks which run autonomously and without your express consent. If they were required to use SQL, connecting only to specialized provider modules which you install and configure in your system and which only provide data after you have inspected as much of the report they are asking for as you like, much of the privacy problem could be avoided because the individual could assess each data item in accordance with their own standards for personal privacy. To my knowledge, no one has offered to design such a provider, nor have I ever heard of anyone proposing an adequate interface which could support this. If a suitable solution in this respect could be found, it could defer the really tough privacy issues without taking the risk of doing anyone personal damage in the meantime; and there is no sense in hurrying the law when it comes to adapting generalized rulings which would affect constitutional rights and privileges without providing precedents which could be applied fairly in all special cases. Not everyone has an SQL server installed on their local computer, of course; and the operating system administrative management tools are not designed to filter, collate, and publish the underlying details of your operating system's functioning as well as your habitual usage of it, even though system logs and counters are available to the individual possessing administrative privileges (for instance, in the Windows Management Instrumentation objects, if you are running a modern Windows operating system) and can be used to collect a great deal of extremely detailed information even from remote systems using the Remote Procedure Call mechanisms. But the average person is not going to be paid or adequately compensated for their time spent in collecting the information these agents want; and it is beyond the knowledge and expertise of the average computer user to install, configure, maintain, and operate the kind of software instrumentation which this sort of data collection requires. So you're not going to be paid to go to school to learn how to do it, you're not going to be reimbursed for the cost of the software you would need to do it if you did have the time and expertise to deliver what these agents want, and in any event they aren't going to pay you even a nickel here or a dime there for whatever data you collect for them in a situation where yo

    N S L C D 10 Replies Last reply
    0
    • G GAMerritt

      It seems to me that they should be required to use SQL queries to collect the data they want from your computer system rather than being allowed to install tasks which run autonomously and without your express consent. If they were required to use SQL, connecting only to specialized provider modules which you install and configure in your system and which only provide data after you have inspected as much of the report they are asking for as you like, much of the privacy problem could be avoided because the individual could assess each data item in accordance with their own standards for personal privacy. To my knowledge, no one has offered to design such a provider, nor have I ever heard of anyone proposing an adequate interface which could support this. If a suitable solution in this respect could be found, it could defer the really tough privacy issues without taking the risk of doing anyone personal damage in the meantime; and there is no sense in hurrying the law when it comes to adapting generalized rulings which would affect constitutional rights and privileges without providing precedents which could be applied fairly in all special cases. Not everyone has an SQL server installed on their local computer, of course; and the operating system administrative management tools are not designed to filter, collate, and publish the underlying details of your operating system's functioning as well as your habitual usage of it, even though system logs and counters are available to the individual possessing administrative privileges (for instance, in the Windows Management Instrumentation objects, if you are running a modern Windows operating system) and can be used to collect a great deal of extremely detailed information even from remote systems using the Remote Procedure Call mechanisms. But the average person is not going to be paid or adequately compensated for their time spent in collecting the information these agents want; and it is beyond the knowledge and expertise of the average computer user to install, configure, maintain, and operate the kind of software instrumentation which this sort of data collection requires. So you're not going to be paid to go to school to learn how to do it, you're not going to be reimbursed for the cost of the software you would need to do it if you did have the time and expertise to deliver what these agents want, and in any event they aren't going to pay you even a nickel here or a dime there for whatever data you collect for them in a situation where yo

      N Offline
      N Offline
      Nish Nishant
      wrote on last edited by
      #2

      GAMerritt wrote:

      Comments, anyone?

      You should include a TLDR too.

      Regards, Nish


      Are you addicted to CP? If so, check this out: The Code Project Forum Analyzer : Find out how much of a life you don't have! My technology blog: voidnish.wordpress.com

      OriginalGriffO P 2 Replies Last reply
      0
      • N Nish Nishant

        GAMerritt wrote:

        Comments, anyone?

        You should include a TLDR too.

        Regards, Nish


        Are you addicted to CP? If so, check this out: The Code Project Forum Analyzer : Find out how much of a life you don't have! My technology blog: voidnish.wordpress.com

        OriginalGriffO Offline
        OriginalGriffO Offline
        OriginalGriff
        wrote on last edited by
        #3

        I read the first sentence! Then it was TLDR... :laugh:

        Real men don't use instructions. They are only the manufacturers opinion on how to put the thing together. Manfred R. Bihy: "Looks as if OP is learning resistant."

        "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
        "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

        1 Reply Last reply
        0
        • G GAMerritt

          It seems to me that they should be required to use SQL queries to collect the data they want from your computer system rather than being allowed to install tasks which run autonomously and without your express consent. If they were required to use SQL, connecting only to specialized provider modules which you install and configure in your system and which only provide data after you have inspected as much of the report they are asking for as you like, much of the privacy problem could be avoided because the individual could assess each data item in accordance with their own standards for personal privacy. To my knowledge, no one has offered to design such a provider, nor have I ever heard of anyone proposing an adequate interface which could support this. If a suitable solution in this respect could be found, it could defer the really tough privacy issues without taking the risk of doing anyone personal damage in the meantime; and there is no sense in hurrying the law when it comes to adapting generalized rulings which would affect constitutional rights and privileges without providing precedents which could be applied fairly in all special cases. Not everyone has an SQL server installed on their local computer, of course; and the operating system administrative management tools are not designed to filter, collate, and publish the underlying details of your operating system's functioning as well as your habitual usage of it, even though system logs and counters are available to the individual possessing administrative privileges (for instance, in the Windows Management Instrumentation objects, if you are running a modern Windows operating system) and can be used to collect a great deal of extremely detailed information even from remote systems using the Remote Procedure Call mechanisms. But the average person is not going to be paid or adequately compensated for their time spent in collecting the information these agents want; and it is beyond the knowledge and expertise of the average computer user to install, configure, maintain, and operate the kind of software instrumentation which this sort of data collection requires. So you're not going to be paid to go to school to learn how to do it, you're not going to be reimbursed for the cost of the software you would need to do it if you did have the time and expertise to deliver what these agents want, and in any event they aren't going to pay you even a nickel here or a dime there for whatever data you collect for them in a situation where yo

          S Offline
          S Offline
          SimulationofSai
          wrote on last edited by
          #4

          Even VBScripts can execute SQL's on the WMI provider to collect machine data. Malicious software vendors would do anything to get your personal data and a silly stamp from a court will do nothing to hinder them.

          SG Aham Brahmasmi!

          realJSOPR D 2 Replies Last reply
          0
          • G GAMerritt

            It seems to me that they should be required to use SQL queries to collect the data they want from your computer system rather than being allowed to install tasks which run autonomously and without your express consent. If they were required to use SQL, connecting only to specialized provider modules which you install and configure in your system and which only provide data after you have inspected as much of the report they are asking for as you like, much of the privacy problem could be avoided because the individual could assess each data item in accordance with their own standards for personal privacy. To my knowledge, no one has offered to design such a provider, nor have I ever heard of anyone proposing an adequate interface which could support this. If a suitable solution in this respect could be found, it could defer the really tough privacy issues without taking the risk of doing anyone personal damage in the meantime; and there is no sense in hurrying the law when it comes to adapting generalized rulings which would affect constitutional rights and privileges without providing precedents which could be applied fairly in all special cases. Not everyone has an SQL server installed on their local computer, of course; and the operating system administrative management tools are not designed to filter, collate, and publish the underlying details of your operating system's functioning as well as your habitual usage of it, even though system logs and counters are available to the individual possessing administrative privileges (for instance, in the Windows Management Instrumentation objects, if you are running a modern Windows operating system) and can be used to collect a great deal of extremely detailed information even from remote systems using the Remote Procedure Call mechanisms. But the average person is not going to be paid or adequately compensated for their time spent in collecting the information these agents want; and it is beyond the knowledge and expertise of the average computer user to install, configure, maintain, and operate the kind of software instrumentation which this sort of data collection requires. So you're not going to be paid to go to school to learn how to do it, you're not going to be reimbursed for the cost of the software you would need to do it if you did have the time and expertise to deliver what these agents want, and in any event they aren't going to pay you even a nickel here or a dime there for whatever data you collect for them in a situation where yo

            L Offline
            L Offline
            Luc Pattyn
            wrote on last edited by
            #5

            when the subject line is a bit mysterious and the first sentence is incomprehensible I stop reading. I see no need for you to write, or for me to read, a long message if you don't want people to know what it is about. X|

            Luc Pattyn [Forum Guidelines] [My Articles] Nil Volentibus Arduum

            Please use <PRE> tags for code snippets, they preserve indentation, improve readability, and make me actually look at the code.

            1 Reply Last reply
            0
            • S SimulationofSai

              Even VBScripts can execute SQL's on the WMI provider to collect machine data. Malicious software vendors would do anything to get your personal data and a silly stamp from a court will do nothing to hinder them.

              SG Aham Brahmasmi!

              realJSOPR Offline
              realJSOPR Offline
              realJSOP
              wrote on last edited by
              #6

              SimulationofSai wrote:

              ...and a silly stamp from a court will do nothing to hinder them.

              Yep, that's like the US passing a lwa that says criminals can't legally own guns. By their very nature, a criminal won't obey the law, so what do you really expect the outcome to be? Once again, nothing changes.

              ".45 ACP - because shooting twice is just silly" - JSOP, 2010
              -----
              You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
              -----
              "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass." - Dale Earnhardt, 1997

              W C D 3 Replies Last reply
              0
              • G GAMerritt

                It seems to me that they should be required to use SQL queries to collect the data they want from your computer system rather than being allowed to install tasks which run autonomously and without your express consent. If they were required to use SQL, connecting only to specialized provider modules which you install and configure in your system and which only provide data after you have inspected as much of the report they are asking for as you like, much of the privacy problem could be avoided because the individual could assess each data item in accordance with their own standards for personal privacy. To my knowledge, no one has offered to design such a provider, nor have I ever heard of anyone proposing an adequate interface which could support this. If a suitable solution in this respect could be found, it could defer the really tough privacy issues without taking the risk of doing anyone personal damage in the meantime; and there is no sense in hurrying the law when it comes to adapting generalized rulings which would affect constitutional rights and privileges without providing precedents which could be applied fairly in all special cases. Not everyone has an SQL server installed on their local computer, of course; and the operating system administrative management tools are not designed to filter, collate, and publish the underlying details of your operating system's functioning as well as your habitual usage of it, even though system logs and counters are available to the individual possessing administrative privileges (for instance, in the Windows Management Instrumentation objects, if you are running a modern Windows operating system) and can be used to collect a great deal of extremely detailed information even from remote systems using the Remote Procedure Call mechanisms. But the average person is not going to be paid or adequately compensated for their time spent in collecting the information these agents want; and it is beyond the knowledge and expertise of the average computer user to install, configure, maintain, and operate the kind of software instrumentation which this sort of data collection requires. So you're not going to be paid to go to school to learn how to do it, you're not going to be reimbursed for the cost of the software you would need to do it if you did have the time and expertise to deliver what these agents want, and in any event they aren't going to pay you even a nickel here or a dime there for whatever data you collect for them in a situation where yo

                C Offline
                C Offline
                Chris Meech
                wrote on last edited by
                #7

                GAMerritt wrote:

                It seems to me that they should be required to use SQL queries ... blah .... blah ... blah ... blah

                Who is the they that you are referring to? Oh, and SQL is no more an answer for a security issue than laws are going to stop people from stealing. :)

                Chris Meech I am Canadian. [heard in a local bar] In theory there is no difference between theory and practice. In practice there is. [Yogi Berra] posting about Crystal Reports here is like discussing gay marriage on a catholic church’s website.[Nishant Sivakumar]

                O 1 Reply Last reply
                0
                • N Nish Nishant

                  GAMerritt wrote:

                  Comments, anyone?

                  You should include a TLDR too.

                  Regards, Nish


                  Are you addicted to CP? If so, check this out: The Code Project Forum Analyzer : Find out how much of a life you don't have! My technology blog: voidnish.wordpress.com

                  P Offline
                  P Offline
                  peterchen
                  wrote on last edited by
                  #8

                  Especialy since he starts with an *Omnious They* and still burns through a whole jar of electrons for the message.

                  FILETIME to time_t
                  | FoldWithUs! | sighist | WhoIncludes - Analyzing C++ include file hierarchy

                  1 Reply Last reply
                  0
                  • G GAMerritt

                    It seems to me that they should be required to use SQL queries to collect the data they want from your computer system rather than being allowed to install tasks which run autonomously and without your express consent. If they were required to use SQL, connecting only to specialized provider modules which you install and configure in your system and which only provide data after you have inspected as much of the report they are asking for as you like, much of the privacy problem could be avoided because the individual could assess each data item in accordance with their own standards for personal privacy. To my knowledge, no one has offered to design such a provider, nor have I ever heard of anyone proposing an adequate interface which could support this. If a suitable solution in this respect could be found, it could defer the really tough privacy issues without taking the risk of doing anyone personal damage in the meantime; and there is no sense in hurrying the law when it comes to adapting generalized rulings which would affect constitutional rights and privileges without providing precedents which could be applied fairly in all special cases. Not everyone has an SQL server installed on their local computer, of course; and the operating system administrative management tools are not designed to filter, collate, and publish the underlying details of your operating system's functioning as well as your habitual usage of it, even though system logs and counters are available to the individual possessing administrative privileges (for instance, in the Windows Management Instrumentation objects, if you are running a modern Windows operating system) and can be used to collect a great deal of extremely detailed information even from remote systems using the Remote Procedure Call mechanisms. But the average person is not going to be paid or adequately compensated for their time spent in collecting the information these agents want; and it is beyond the knowledge and expertise of the average computer user to install, configure, maintain, and operate the kind of software instrumentation which this sort of data collection requires. So you're not going to be paid to go to school to learn how to do it, you're not going to be reimbursed for the cost of the software you would need to do it if you did have the time and expertise to deliver what these agents want, and in any event they aren't going to pay you even a nickel here or a dime there for whatever data you collect for them in a situation where yo

                    D Offline
                    D Offline
                    David1987
                    wrote on last edited by
                    #9

                    Ok, that's a bit long. I've always felt that there should be a firewall-like thing that intercepts such malicious data gathering and lets you choose between allowing it, denying it or returning some custom value that could be a complete lie. Something like that doesn't appear to exist yet, but I'm sure there's a market for it. I for one don't like it if Any program (not even Steam or such) is able to uniquely identify my computer.

                    modified on Monday, May 2, 2011 11:37 AM

                    D 1 Reply Last reply
                    0
                    • G GAMerritt

                      It seems to me that they should be required to use SQL queries to collect the data they want from your computer system rather than being allowed to install tasks which run autonomously and without your express consent. If they were required to use SQL, connecting only to specialized provider modules which you install and configure in your system and which only provide data after you have inspected as much of the report they are asking for as you like, much of the privacy problem could be avoided because the individual could assess each data item in accordance with their own standards for personal privacy. To my knowledge, no one has offered to design such a provider, nor have I ever heard of anyone proposing an adequate interface which could support this. If a suitable solution in this respect could be found, it could defer the really tough privacy issues without taking the risk of doing anyone personal damage in the meantime; and there is no sense in hurrying the law when it comes to adapting generalized rulings which would affect constitutional rights and privileges without providing precedents which could be applied fairly in all special cases. Not everyone has an SQL server installed on their local computer, of course; and the operating system administrative management tools are not designed to filter, collate, and publish the underlying details of your operating system's functioning as well as your habitual usage of it, even though system logs and counters are available to the individual possessing administrative privileges (for instance, in the Windows Management Instrumentation objects, if you are running a modern Windows operating system) and can be used to collect a great deal of extremely detailed information even from remote systems using the Remote Procedure Call mechanisms. But the average person is not going to be paid or adequately compensated for their time spent in collecting the information these agents want; and it is beyond the knowledge and expertise of the average computer user to install, configure, maintain, and operate the kind of software instrumentation which this sort of data collection requires. So you're not going to be paid to go to school to learn how to do it, you're not going to be reimbursed for the cost of the software you would need to do it if you did have the time and expertise to deliver what these agents want, and in any event they aren't going to pay you even a nickel here or a dime there for whatever data you collect for them in a situation where yo

                      OriginalGriffO Offline
                      OriginalGriffO Offline
                      OriginalGriff
                      wrote on last edited by
                      #10

                      I have taken the liberty of providing a summary of your text, by extracting just every 42nd word:

                      It to problem proposing sense local available the to the there way is unobtrusive individual inclusion comprehensiveness in they I'm DOMAIN cost, security until any which there your harmed which after simply glasses. ought individuals

                      I think it is about as readable.

                      Real men don't use instructions. They are only the manufacturers opinion on how to put the thing together. Manfred R. Bihy: "Looks as if OP is learning resistant."

                      "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                      "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                      C V N H 4 Replies Last reply
                      0
                      • S SimulationofSai

                        Even VBScripts can execute SQL's on the WMI provider to collect machine data. Malicious software vendors would do anything to get your personal data and a silly stamp from a court will do nothing to hinder them.

                        SG Aham Brahmasmi!

                        D Offline
                        D Offline
                        Dan Neely
                        wrote on last edited by
                        #11

                        SimulationofSai wrote:

                        Malicious software vendors would do anything to get your personal data and a silly stamp from a court will do nothing to hinder them.

                        Yes and no. The (US) CAN SPAM[^] act did a lot to help with the spam problem. Not by stopping the illegal spammers, but by forcing legit merchants to cut back on questionable tactics, making it much easier for a heuristic to guess if a message is spam of legitimate opt in marketing. If ( :laugh: ) marketers had to go through a standard API that could be filtered by antisnoopware software something similar could be achieved here. **IF**... :laugh:

                        3x12=36 2x12=24 1x12=12 0x12=18

                        1 Reply Last reply
                        0
                        • G GAMerritt

                          It seems to me that they should be required to use SQL queries to collect the data they want from your computer system rather than being allowed to install tasks which run autonomously and without your express consent. If they were required to use SQL, connecting only to specialized provider modules which you install and configure in your system and which only provide data after you have inspected as much of the report they are asking for as you like, much of the privacy problem could be avoided because the individual could assess each data item in accordance with their own standards for personal privacy. To my knowledge, no one has offered to design such a provider, nor have I ever heard of anyone proposing an adequate interface which could support this. If a suitable solution in this respect could be found, it could defer the really tough privacy issues without taking the risk of doing anyone personal damage in the meantime; and there is no sense in hurrying the law when it comes to adapting generalized rulings which would affect constitutional rights and privileges without providing precedents which could be applied fairly in all special cases. Not everyone has an SQL server installed on their local computer, of course; and the operating system administrative management tools are not designed to filter, collate, and publish the underlying details of your operating system's functioning as well as your habitual usage of it, even though system logs and counters are available to the individual possessing administrative privileges (for instance, in the Windows Management Instrumentation objects, if you are running a modern Windows operating system) and can be used to collect a great deal of extremely detailed information even from remote systems using the Remote Procedure Call mechanisms. But the average person is not going to be paid or adequately compensated for their time spent in collecting the information these agents want; and it is beyond the knowledge and expertise of the average computer user to install, configure, maintain, and operate the kind of software instrumentation which this sort of data collection requires. So you're not going to be paid to go to school to learn how to do it, you're not going to be reimbursed for the cost of the software you would need to do it if you did have the time and expertise to deliver what these agents want, and in any event they aren't going to pay you even a nickel here or a dime there for whatever data you collect for them in a situation where yo

                          R Offline
                          R Offline
                          Rajesh R Subramanian
                          wrote on last edited by
                          #12

                          Sorry, but I got bored after reading the 38th paragraph.

                          "Real men drive manual transmission" - Rajesh.

                          1 Reply Last reply
                          0
                          • realJSOPR realJSOP

                            SimulationofSai wrote:

                            ...and a silly stamp from a court will do nothing to hinder them.

                            Yep, that's like the US passing a lwa that says criminals can't legally own guns. By their very nature, a criminal won't obey the law, so what do you really expect the outcome to be? Once again, nothing changes.

                            ".45 ACP - because shooting twice is just silly" - JSOP, 2010
                            -----
                            You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
                            -----
                            "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass." - Dale Earnhardt, 1997

                            C Offline
                            C Offline
                            Corporal Agarn
                            wrote on last edited by
                            #13

                            Should this be in soapbox? Problem with people in the US is, they have been taught that people will do the right thing. When I grew up if you lost your license to drive you did not drive, now they do not think twice about still driving. :((

                            W 1 Reply Last reply
                            0
                            • D David1987

                              Ok, that's a bit long. I've always felt that there should be a firewall-like thing that intercepts such malicious data gathering and lets you choose between allowing it, denying it or returning some custom value that could be a complete lie. Something like that doesn't appear to exist yet, but I'm sure there's a market for it. I for one don't like it if Any program (not even Steam or such) is able to uniquely identify my computer.

                              modified on Monday, May 2, 2011 11:37 AM

                              D Offline
                              D Offline
                              Dan Neely
                              wrote on last edited by
                              #14

                              Well you could use something like roboform to give bogus registration details to websites automatically...

                              3x12=36 2x12=24 1x12=12 0x12=18

                              D 1 Reply Last reply
                              0
                              • realJSOPR realJSOP

                                SimulationofSai wrote:

                                ...and a silly stamp from a court will do nothing to hinder them.

                                Yep, that's like the US passing a lwa that says criminals can't legally own guns. By their very nature, a criminal won't obey the law, so what do you really expect the outcome to be? Once again, nothing changes.

                                ".45 ACP - because shooting twice is just silly" - JSOP, 2010
                                -----
                                You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
                                -----
                                "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass." - Dale Earnhardt, 1997

                                W Offline
                                W Offline
                                wizardzz
                                wrote on last edited by
                                #15

                                Felony convictions do currently bar one from legally owning a gun. What good that's doing...

                                Craigslist Troll: litaly@comcast.net "I have a theory that the truth is never told during the nine-to-five hours. " — Hunter S. Thompson

                                1 Reply Last reply
                                0
                                • C Corporal Agarn

                                  Should this be in soapbox? Problem with people in the US is, they have been taught that people will do the right thing. When I grew up if you lost your license to drive you did not drive, now they do not think twice about still driving. :((

                                  W Offline
                                  W Offline
                                  wizardzz
                                  wrote on last edited by
                                  #16

                                  djj55 wrote:

                                  Problem with people in the US is, they have been taught that people will do the right thing.

                                  Huh? I thoughtonly liberals thought this.

                                  Craigslist Troll: litaly@comcast.net "I have a theory that the truth is never told during the nine-to-five hours. " — Hunter S. Thompson

                                  C O 2 Replies Last reply
                                  0
                                  • OriginalGriffO OriginalGriff

                                    I have taken the liberty of providing a summary of your text, by extracting just every 42nd word:

                                    It to problem proposing sense local available the to the there way is unobtrusive individual inclusion comprehensiveness in they I'm DOMAIN cost, security until any which there your harmed which after simply glasses. ought individuals

                                    I think it is about as readable.

                                    Real men don't use instructions. They are only the manufacturers opinion on how to put the thing together. Manfred R. Bihy: "Looks as if OP is learning resistant."

                                    C Offline
                                    C Offline
                                    Chris Meech
                                    wrote on last edited by
                                    #17

                                    LOL. Did you use SQL to do that? :laugh:

                                    Chris Meech I am Canadian. [heard in a local bar] In theory there is no difference between theory and practice. In practice there is. [Yogi Berra] posting about Crystal Reports here is like discussing gay marriage on a catholic church’s website.[Nishant Sivakumar]

                                    1 Reply Last reply
                                    0
                                    • W wizardzz

                                      djj55 wrote:

                                      Problem with people in the US is, they have been taught that people will do the right thing.

                                      Huh? I thoughtonly liberals thought this.

                                      Craigslist Troll: litaly@comcast.net "I have a theory that the truth is never told during the nine-to-five hours. " — Hunter S. Thompson

                                      C Offline
                                      C Offline
                                      Corporal Agarn
                                      wrote on last edited by
                                      #18

                                      They are doing the teaching. :)

                                      W 1 Reply Last reply
                                      0
                                      • C Corporal Agarn

                                        They are doing the teaching. :)

                                        W Offline
                                        W Offline
                                        wizardzz
                                        wrote on last edited by
                                        #19

                                        These days you mean, striking?

                                        Craigslist Troll: litaly@comcast.net "I have a theory that the truth is never told during the nine-to-five hours. " — Hunter S. Thompson

                                        1 Reply Last reply
                                        0
                                        • G GAMerritt

                                          It seems to me that they should be required to use SQL queries to collect the data they want from your computer system rather than being allowed to install tasks which run autonomously and without your express consent. If they were required to use SQL, connecting only to specialized provider modules which you install and configure in your system and which only provide data after you have inspected as much of the report they are asking for as you like, much of the privacy problem could be avoided because the individual could assess each data item in accordance with their own standards for personal privacy. To my knowledge, no one has offered to design such a provider, nor have I ever heard of anyone proposing an adequate interface which could support this. If a suitable solution in this respect could be found, it could defer the really tough privacy issues without taking the risk of doing anyone personal damage in the meantime; and there is no sense in hurrying the law when it comes to adapting generalized rulings which would affect constitutional rights and privileges without providing precedents which could be applied fairly in all special cases. Not everyone has an SQL server installed on their local computer, of course; and the operating system administrative management tools are not designed to filter, collate, and publish the underlying details of your operating system's functioning as well as your habitual usage of it, even though system logs and counters are available to the individual possessing administrative privileges (for instance, in the Windows Management Instrumentation objects, if you are running a modern Windows operating system) and can be used to collect a great deal of extremely detailed information even from remote systems using the Remote Procedure Call mechanisms. But the average person is not going to be paid or adequately compensated for their time spent in collecting the information these agents want; and it is beyond the knowledge and expertise of the average computer user to install, configure, maintain, and operate the kind of software instrumentation which this sort of data collection requires. So you're not going to be paid to go to school to learn how to do it, you're not going to be reimbursed for the cost of the software you would need to do it if you did have the time and expertise to deliver what these agents want, and in any event they aren't going to pay you even a nickel here or a dime there for whatever data you collect for them in a situation where yo

                                          J Offline
                                          J Offline
                                          Joan M
                                          wrote on last edited by
                                          #20

                                          GAMerritt wrote:

                                          Comments, anyone?

                                          tooooooooooooooooooooooooooo looooooooooooooooooooooooooooooooong! X|

                                          [www.tamelectromecanica.com] Robots, CNC and PLC machines for grinding and polishing.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups