Comment Re:The trouble is Apple bans programming apps (Score 1) 340
Any app that provides programmability is not allowed....
Incorrect:
https://itunes.apple.com/us/app/hewlett-packard-15c-scientific/id503720774?mt=8
Any app that provides programmability is not allowed....
Incorrect:
https://itunes.apple.com/us/app/hewlett-packard-15c-scientific/id503720774?mt=8
Well, I had a revision B motherboard (something I specifically requested, because of certain features I wanted to experiment with), and the extended 80 column adapter, which expanded my system memory to 128k (bank switched, since only 64k was addressable), but the CPU in my system was definitely not a 65c02.
My system also did not have the MouseText characters that came out with the
This website refers to a model that was discontinued in 1985, and is right beside an image that looks exactly like the model that I had. Note that it has the
It's all pedantry anyway. But sounds like you had what could be called a "partially enhanced" machine:
http://mirrors.apple2.org.za/ground.icaen.uiowa.edu/MiscInfo/Empson/iie.vers
If you are able to turn the machine on, the easiest way to identify an
enhanced IIe is to look at the machine name printed on the top line of
the startup screen:
Apple ][ indicates an unenhanced IIe
Apple
The catch is that you might have a machine which has been partially
enhanced: it is possible for the CPU, video ROM and firmware ROMs (CD
and EF) to be updated independently (the firmware ROMs must be a
matching pair). Looking at the chips would be safest bet.
I remember engaging in many online (BBS & Usenet) discussions where the common shorthand was to use ][e for unenhanced,
The logo on it still said "Apple
I also remember the splash startup logo on my
The early machines said ][ in the splash screen; the laters said
http://stason.org/TULARC/pc/apple2/faq/01-010-What-is-an-Apple-II-The-Apple-e.html
You're thinking of the ][+. The
So the Enhanced
When are they expect to arrive here?
What I'd really like to see is some good scientific research put in to this sort of thing, stripping away the associated mysticism and getting right to the core of it. Based on the rather limited article, it appears this might not be too difficult as he may already be keeping the mysticism to a minimum.
Check out Shinzen Young (Shingon lineage but now teaches in Therevada tradition). That's the exact sort of thing he's trying to do.
Happiness is its own reward, it's its own before-and-after. There's no prerequisite for it other than consciousness.
Indeed. "Happiness independent of condition" as it's often called....
You could ask these guys how they go about it:
http://lostclassics.apple2.info/
they dont claim windows viruses, they claim PC viruses, last time I checked Apple makes Personal Computers
But to most people, "PC" is synonymous with "Windows machine", so the analogy holds.
Only reason it's a big deal is because Apple used to advertise OS X "doesn't get PC viruses." So when a Mac gets one, now everyone jumps on it with a
Well, it's still true that OS X doesn't get Windows viruses. Perhaps a tautology, but true nonetheless....
Do you check all atms, gas pumps, etc that you use for card skimmers? http://krebsonsecurity.com/all-about-skimmers/ , http://www.thelocal.de/national/20110818-37041.html and http://boston.cbslocal.com/2011/11/17/atm-skimming-device-found-at-eastern-bank-in-taunton/
They are getting pretty good at making realistic ones. And in some cases have gotten them inside gas pumps.
If that was addressed to me: yes, I do, always. Although as you say, some skimmers now are undetectable to customer.
Okay, you couldn't use it for online purchases, but at a brief glance, you can get magnetic card encoders for 150+ USD. Not sure about whatever tech they use for the contactless style ones, but here's what I'm thinking:
Step 1: Steal contactless CC data.
Step 2: Burn semi-realistic magnetic card with CC data. Emboss the number on the front. 99% of all retail employees will not look twice at the card.
Step 3: Profit.
You don't need the security code for purchases made in person, and if you're doing this in person, you can probably speculate what the zip code is for the few places that even ask for that. Granted, this requires making purchases in person, so you're subject to video surveilance for anyone who REALLY wants to come after you, but since you can repeat this process, it's essentially a use one, throwaway kind of thing.
Or,
2a: Burn numbers into some other magnetic card (even a customer loyalty card will work, so I'm told). Use cloned card at self-checkout, gas pump, or other unattended POS system. No need to emboss or even disguise the card.
3: Profit!
I know this works, because my CC info has been stolen twice in the last year and used to make cloned cards (the cloned cards were used at a brick-and-mortar store which is how I know the card was physically cloned). The first time was February, the second time was yesterday. Still don't know where the breach is occurring. I don't shop anywhere sketchy....
Granted the numbers were probably not stolen via the mechanism this story is about, but once you have the numbers the procedure is the same.
"No Headphone"
I do not wear headphone, and in my office and in my home I do not turn on the radio either
When I surf online, I do not stream any music
I carry out my work without having to listen to any "background noise", and I find that I can focus better without hearing anything that's annoying
I wear headphones because I find that I can focus better without hearing anything that's annoying. Congratulations on your quiet work environment. Wish I had one.
the bible commands us to consider the work of his (God's) hands, and from that to draw our own conclusions about God's reasons.
*
"If one could conclude as to the nature of the Creator from a study of creation, it would appear that God has an inordinate fondness for beetles." -- J. B. S. Haldane
The hardest part of climbing the ladder of success is getting through the crowd at the bottom.