Comment Re:Correction...That you know of... (Score 3, Funny) 115
I prime all my drives with GNU shred since its PRNG is faster than
I prime all my drives with GNU shred since its PRNG is faster than
That isn't necessary. The sheeple are already conned into believing that the bill of rights enumerates all rights of the people and the government has the power to regulate anything not on the list as well as some particulars of things that are listed.
Most huge commercial operations are using fluorescent lighting in their facilities. Switching to LED en masse would entail a loss.
You forgot:
America! Fuck yeah!
Retransmitting analog cell phone calls was made into a crime which is why Google is getting slapped over this. Multi-band radios used to be able to tune them in before analog became essentially obsolete. The difference, of course, is that WiFi APs *advertise* their presence on purpose rather than carry the presumption of privacy but we can't expect old people to understand technology.
Hey but you can learn about all the Pokemon and Transformers trivia you could ever want to know.
Rather than whine about being a guinea pig you could just not play their game. Every hour spent on Facebook is an hour of your life lost to more productive or enriching pursuits.
Apple won't be happy until they've reimplemented MS Bob but with a little more style.
because there was a company with a centrally-located antenna and a lot of people paid to access its signal over wires.
Yes. That's what Community Access TV was originally developed for.
And the uranium? Just blowin in the wind.
This is a solution in search of a problem.
This is why whole drive encryption is bad. Even creating a "hidden volume" for plausible deniability is going to look suspicious if anyone bothers to ask who so much of the physical HD space is unused by a dummy OS with a curiously small amount of activity recorded in the system logs.
A safer solution is to randomize new drives with GNU shred (faster PRNG than
At that point it's much easier to deny the presence of encrypted data or, if forced to admit its presence, you can use the "I forgot" or "I can't regenerate the password" excuse which can't be done believably with a computer in regular use that has whole disk encryption.
Hacking? This man is obviously a terrist fer'ner. Get him to Gitmo in a rendition wagon ASAP.
Betting the farm on Parrot and then waiting *years* to start implementing the Perl 6 spec is what killed it. Besides, around these parts we wait for Netcraft to confirm. We haven't succeeded in killing off the *BSDs yet have we?
despite the fact that anyone who had ever been in an IT project before knows that version control is not just a good idea.
Please tell that to the older cowboy coder I have to deal with who refuses to use git more frequently than once a month and has a hissy fit if I check anything into the mainline branch that he's working on as it will mess up his "merges".
Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker