Comment Re:This Is All You Need To Know (Score 1) 431
I meant this was "all you need to know" to understand it total bullshit. Damn, I have been really good at not needing obvious sarcasm indicators.
I meant this was "all you need to know" to understand it total bullshit. Damn, I have been really good at not needing obvious sarcasm indicators.
By random I actually meant unintelligible or unknowable since the result would have no possible way to interpret it.
With all these attributes Graphene could maybe be applied to warfare as a payload. Once inhaled, some kind of detection scheme to track or detect the targets that were in the vicinity. Just put in a little graphene if you want to mark them for future surveillance, put in a shitload if you want them to inhale a bunch more...that would probably work faster than asbestos especially if it were possible to manipulate the structure to make particles ever more wickedly shaped. Like little shurikens or caltrops. Okay maybe not. But you could call that missile the Shinobi-1, that's all.
I thought that quantum entanglement couldn't transfer coherent communication since it is basically randomized and useful information transfer between particles was impossible.
"We understand 80 percent of traffic on the Tor network involves child pornography.” - Leslie Caldwell, Ast, Attorney General at the Justice Department
(Drops Mic)
That's a perfect analogy to this story. Spot on.
If this botnet is that good then unless you can monitor all your traffic to and from the suspected infected system with a separate, knowingly uncompromised system. I think a good botnet would be dormant offline and invisible to the kernel, making an offline scan using the suspected system to inspect itself useless as well. If this awesome botnet gets me, hey...oh well.
I use visual and audible cues like an oddly running HDD: going by the activity light mostly using SSDs. Also, fan operation, CPU temp, resource monitoring stuff. Just checking out what
This is the best answer. I haven't used A/V software in a long time, and an A/V program running without good supervision does more harm than good. Any malware bad enough to worry about will be from an unknown vector as would an active network intrusion. Those things are more straightforward to defend against rather than weirdo, resource-heavy a/v background executables..
Also, I shouldn't reply to dumb-sounding science stories until I at least read the article first, in case it isn't at dumb as they usually are...like this one.
With a prism from my telescope and a magnifying glass.
Scientists are finally of a consensus that yes, indeed, it is time to rock.
Here's a Ycombinator discussion on this very thing...
I was thinking that Zoe and Anna were the same person, thanks. I'll try to keep that straight...actually screw it.
Maybe some kind of software defined radio contraption in a flying platform.
According to the latest official figures, 43% of all statistics are totally worthless.