Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Yes, why post this? (Score 1) 325

Ok, I understand where you are coming from now. When you said it decrypts, I understood it as Checkpoint relied on Windows authentication to execute the decryption. You are referring to bypassing the process completely, similar to the freezing memory hack. In that case you are correct. Which is a big reason why I would recommend not utilizing WIL.

Comment Re:learn PowerPoint and Access skills (Score 1) 208

She'd be better off learning a scripting language, that way she won't have to sit there filling in click boxes. Instead let the computer do the job, instead of what invariably happens under the Microsoft paradigm, helping the computer do the work.

She probably doesn't want to get laid off again. Filling in click boxes will give her the appearance of being busy and needed.

Slashdot Top Deals

It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption.

Working...