Comment Re:Anti-FUD (Score 1) 575
Hundreds of thousands of US servicepeople had access to the stuff put on wikileaks (network was open to every grade), but only one leaked it.
So, yes, open secrets can be kept.
Hundreds of thousands of US servicepeople had access to the stuff put on wikileaks (network was open to every grade), but only one leaked it.
So, yes, open secrets can be kept.
You mean retail price, not cost. The cost of gasoline is not related to crude barrel cost in USA, and heavily loaded by taxes in UK (for example). The cost of electricity generation is often discounted by government; best example being nuclear electricity generation which is priced artificially cheap.
...and you should budget for 8GB memory to run the ZFS filing system properly. Oh, and FreeNAS runs from a 2GB (min) USB stick, doesn't waste a HDD.
To soft-start the investment, you could buy the MB + RAM first, set it up in a cardboard box with a spare PSU and 5 any-size SATA HDDs you have kicking around.
I got a Fractal Design Array R2 Mini-ITX NAS Case which is gorgeous, takes 6 HDD in a small case. MB is Sapphire Pure Fusion Mini E350 AMD Dual Core E350 which is very low power, 5 x SATA III + 1 eSATA II, USB 3, GbEthernet.
FreeNAS 8 supports the hardware, and ZFS filing system is reliable.
Not enterprise level, but excellent for home use.
"...and signals propagate faster." just ain't true. It's the same speed, just takes less time because the distance is shorter.
In fact she married Bill Posters while he was in prison...
...to alleviate post-offer depression in the price, but there's a sizeable market of US investors who want to get in, and that'll keep the prices up for a while. Of course, initial investors can sell some then, for instant profit.
Care to share details of the USB implementation?
And you may be interested in John Kortink's MMC card storage system for BBC B and Master (at http://web.inter.nl.net/users/J.Kortink/home/hardware/gommc/index.htm )
..laughed my cotton socks off. Thanks.
Imagine if investigators simply state that their analysis, not disclosable under state secrets privilege, shows hidden text saying "We'll bomb the Eiffel Tower on Thursday". The suspect is now stuffed with no defense.
All the investigators need to do is run some fake but seemingly complex program that looks at the file under inspection and says "yes, stenography in use". Then the full weight of the law comes down, because now the suspect has to prove the negative - impossible of course.
So actually what is needed is a suspect's right that investigators prove any assertion that files have been hidden if that assertion/analysis is used as evidence in court.
As further proof, 27 percent confirmed that the source of the infection was a USB device connected to a computer.
Actually that's evidence, not proof.
Why did the Roman Empire collapse? What is the Latin for office automation?