Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Yes, why post this? (Score 1) 325

Ok, I understand where you are coming from now. When you said it decrypts, I understood it as Checkpoint relied on Windows authentication to execute the decryption. You are referring to bypassing the process completely, similar to the freezing memory hack. In that case you are correct. Which is a big reason why I would recommend not utilizing WIL.

Comment Re:learn PowerPoint and Access skills (Score 1) 208

She'd be better off learning a scripting language, that way she won't have to sit there filling in click boxes. Instead let the computer do the job, instead of what invariably happens under the Microsoft paradigm, helping the computer do the work.

She probably doesn't want to get laid off again. Filling in click boxes will give her the appearance of being busy and needed.

Slashdot Top Deals

The best book on programming for the layman is "Alice in Wonderland"; but that's because it's the best book on anything for the layman.

Working...