Forgot your password?
typodupeerror

Comment: Re:Can this be used for prank phone calls? (Score -1) 68

You really missed the boat on that. Before 2010's "Truth in Caller ID" act, and during the heyday of fly-by-night mom-and-pop VoIP telcos, you could call pretty much anybody, pretending to be anybody, and more or less get away with it. These days I whould just be content with listening to old Longmont Potion Castle LPs.

Cringely Predicts Apple to Ship OS X for Any PC 789

Posted by CowboyNeal
from the aqua-for-all dept.
boosman writes "In his current column, and in a similar op-ed piece in The New York Times, Robert X. Cringely predicts that Apple 'will announce a product similar to Boot Camp to allow OS X to run on bog-standard 32-bit PC hardware.' I dissect why this is unthinkable and challenge Cringely to a public bet on the subject."
User Journal

Journal: :pt:

Journal by tehdely
__
_ _ __ | |_ _
(_) '_ \ | __(_)
_| |_) | |_ _
(_) .__/ \__(_)
|_|
User Journal

Journal: Heh. 2

Journal by tehdely

Here is my patented spam blacklist:

i=0;o(a){printf("%u",i>>8*a&255);if(a){printf(".");o(--a);}}main(){do{o(3);puts("");}while(++i);}

Compile with gcc and:

./a.out | xargs -L 1 -I target iptables -I INPUT 0 target -j drop

Edit: Wouldn't want to piss off the BSD users, so:

Lo! Men have become the tool of their tools. -- Henry David Thoreau

Working...