A qubit, like today's conventional bit, can have two possible values: a 0 or a 1. The difference is that a bit must be a 0 or 1, and a qubit can be a 0, 1, or a superposition of both. "Suppose you take 2 qubits. You can be in 00, 01, 10, and 11 at the same time. For 3 qubits you can be in 8 states at the same time (000, 001, 111, etc.). For each qubit you double the number of states you can be in at the same time. This is part of the reason why a quantum computer could be much more powerful," Ketchen said.
I find that to be a terrible explanation. What he said: "For each qubit you double the number of states you can be in at the same time." is also true for normal bits. Huh? Here is a better explanation: http://en.wikipedia.org/wiki/Qubit
On the server end there is a SQL injection exploit being used to get the malicious code out there.
My point being that you don't need to do a SQL injection to do this.
To prevent a SQL injection, you need to change ' to '' on input from the user that you pass to sql.
To prevent a HTML+script injection, you need to change < to <, > to > & to & etc. on input from the user that render to the browser. The sites in question are not doing this, hence, just stick the code you wish to inject into at comment or some other user field. This has nothing to do with SQL.
My local stores still sell NEW netbooks with NEW licenses of XP on them... where's bug support for the new buyers?
Microsoft don't want you to buy the XP version, they want you to buy the Vista/7 version.
I'll bet you forgot to tell them that a few months down the road he will have no way to install an up-to-date application unless he updates the whole system. And that he will have to update (aka reinstall) the whole system every few months, since thats the usual duration his applications officially are up to date.
I don't know about SuSe - but for Ubuntu - LTS releases are supported for 3 years. And if he wants to just update 1 application - he just needs to add the backports repository.