Comment Re:Way to go. (Score 1) 313
> Guerrilla marketing is all the rage these days
Ahhh Des Moines, where Instagram is new and Hurd has some life in it.
> Guerrilla marketing is all the rage these days
Ahhh Des Moines, where Instagram is new and Hurd has some life in it.
Free as in Kaczynski and Liberty Dollars, don't you know?
I don't understand why you posted that.
Almost everyone who has seen a radial lead electrolytic capacitor inside their computer or other consumer kit and recognized it as a capacitor would know or correctly infer the part of the capacitor that TheGratefulNet is referring to.
Why not take this opportunity to simplify your life by owning less stuff? It would save you from having to pack, ship, track, and store everything.
There are far more opportunities available if you're mobile enough to fit your life into a couple of suitcases and leave the bulky/sentimental stuff with relatives. More importantly, your spending will naturally shift from things to people and experiences that can't get damaged or lost in transit.
Parent post wasn't showing. I'm disappointed that you didn't mean the
> or buy one of the numerous premade systems.
Better yet, buy two and sync one as an off-site backup, not because you want an off-site backup, but because most consumer NAS devices lack enterprise build quality. Drobo devices are the exception.
Also, be sure to examine the firmware before making a purchase, by downloading the source from the manufacturer's website. The NAS boxes cobbled by the hard drive manufacturers tend to be based on older versions of (possibly insecure) open source NAS tools, with some in house garbage on top to implement custom features.
For example, on one particular brand of web-enabled NAS by a famous hard drive manufacturer, the URL to reset the configuration settings *for all models in the line* is widely available in support forums. This gets you remote admin. The web host for their custom scripts runs as root, and contains several locations where unsanitized strings from the URL get passed directly into an exec(). Some of the cloud-sounding services that enable you to remotely access your firewalled NAS are so poorly secured that it's possible to Google for particular strings appearing on the NAS remote admin configuration pages.
(Yes, the manufacturers know about all this. No, they're mostly not interested in fixing these problems in unsupported use modes: "The manual says not to connect these devices to the Internet.")
One could show Star Trek without Star Trek, by staring with good stories.
TNG: Darmok
DS9: The Visitor
VOY: Blink of an Eye
TOS: The Devil in the Dark, The City on the Edge of Forever
(and a few others)
Such stories are accessible to new viewers since they do not depend on much cannon or story arcs or character history to be fully enjoyable. The major cannon episodes that series fans enjoy for being loaded with many intersections of individual motivations, big conflicts, implicit story, and consequence (e.g., "The Best of Both Worlds") would be lost to anyone who had not been exposed to the big players and landmarks. Starting with character development episodes would bet too much on new viewers caring about the characters on first exposure, and similarly with arc development episodes.
The alternative to BSD is not necessarily GPL.
MS could have implemented their own stack, or bought out Trumpet Winsock, or taken any number of alternative paths where (L)GPL could have no effect.
Then they came for the Alans Cox...
There are many, many more students than there are scientists. This matters because many jurisdictions in Europe and Asia require undergraduate students to produce published or publishable work as part of their degree requirements.
...Assuming that the DAC/ADCs between the magnetic and digital signals can keep up, and also that whatever process prods the magnetic domains can do transitions sufficiently rapidly.
> Best indication of a government agency a 24 hour attack rather than a cycling attack.
FTFA: "However, for the last 24 hours the site has been largely inaccessible world wide"
The attack does not appear to have been sustained in a constant way.
> Individual users will still want to use the computers and bandwidth for other things.
*Distributed* denial of service attack. If the attack is successful, each individual user does not need to devote more than a small fraction of whatever broadband access they have, since their victims would not successfully communicate back.
> Even botnet controllers will want to get back to money making spam.
They could also make money by renting out their botnets...
> The only people who can keep it up solid had computers and bandwidth to waste
Or non-government entities such as botnet operators, as you mention, telecommunications companies, multi-national organizations...
> and obviously will want to work the divide and conquer angle.
Successfully taking out one site (even a highly connected one) wouldn't be dividing anything except that site from all the strongly connected others. This attack created no salients against which to deploy any kind of conquering tactic, and this kind of attack cannot possibly do so against such a highly redundant network.
The problem is that Facebook is optimized for narcissistic _self_-promotion through _telling_ your echo chamber how great you are, not for _showing_ others your status even through the usual consumption displays that are required to promote _others_.
Today is a good day for information-gathering. Read someone else's mail file.