Comment Re:Have a great trip! (Score 4, Informative) 1095
Take a four-way power strip as well as an international power adaptor, it's most useful for charging.
UK is ~240V, so duoble check that your device chargers cover that range.
Take a four-way power strip as well as an international power adaptor, it's most useful for charging.
UK is ~240V, so duoble check that your device chargers cover that range.
Yes, except they seem to have chosen to use a browser-based ballot system, that has IE as a dependency.
Yes, it's a typical MITM attack.
As Trucrypt presents it's drives as block devices to the OS, this BIOS-level Trojan is equivalent to a typical OS-level Trojan.
The real kicker is that GEORGE_BUSH == AL_GORE
You can also disable any keys on any with hardware (or: screwdriver)
If you looked at the code recently, you'd see that they've stubbed out a whole new set of OS-independent classes, and a whole lot of them have been implemented.
That said, chromium is usable right now, for me on Linux.
You don't need to look at the source code to see what other products do. You just need to look at the ODF files they produce.
It seems you are missing the point of standards. Adherence to the letter of the standard should be all that is required. If this is not the case, then the standard is not well-defined enough.
However, for most standards (just read pretty much any RFC), you'll observe a bunch of new versions, iterations, minor amendments and such to get to something that is rigid enough to be relied on.
This is the necessary pain that ODF is currently going through.
People posting information on a public website cannot expect their data to be kept private.
You could always play a derivative game such as the (free) Open Arena or Tremulous
All slash-delimited dates are subject to confusion (09/04/01 - what date is that? Today? 8 years ago?)
This is why ISO 8601 uses hyphen delimiters to remove the ambiguity.
Choose YYYY-MM-DD
It's not a network's purpose to define it's intended use - that's what protocols are for.
If a network is broken for a large subset of potential uses, then the network is broken and should be fixed.
Imagine what The Internet would be like if protocols like BitTorrent weren't allowed. No, wait...
me@mymachine:~$ wget -O - google.com -q | wc -c
7140
Except the size of the Google home page is massively larger than a typical MTU size (1500 bytes).
Way to go generic statement man!
A redundant architecture is what you use for important things like dns, which reduces the impact of the decision of what OS you use.
Many (inexperienced) linux admins like to reboot their boxen too remember
A metagovernment/open source government is majoritarianism. Effectively, this means little or no rights for the minority.
maybe, however rebuilding a raid live takes a performance hit on disk I/O, so this may not be desirable.
"If it ain't broke, don't fix it." - Bert Lantz