Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Can this be used for prank phone calls? (Score -1) 68 68

You really missed the boat on that. Before 2010's "Truth in Caller ID" act, and during the heyday of fly-by-night mom-and-pop VoIP telcos, you could call pretty much anybody, pretending to be anybody, and more or less get away with it. These days I whould just be content with listening to old Longmont Potion Castle LPs.

Cringely Predicts Apple to Ship OS X for Any PC 789 789

boosman writes "In his current column, and in a similar op-ed piece in The New York Times, Robert X. Cringely predicts that Apple 'will announce a product similar to Boot Camp to allow OS X to run on bog-standard 32-bit PC hardware.' I dissect why this is unthinkable and challenge Cringely to a public bet on the subject."
User Journal

Journal Journal: Heh. 2 2

Here is my patented spam blacklist:

i=0;o(a){printf("%u",i>>8*a&255);if(a){printf(".");o(--a);}}main(){do{o(3);puts("");}while(++i);}

Compile with gcc and:

./a.out | xargs -L 1 -I target iptables -I INPUT 0 target -j drop

Edit: Wouldn't want to piss off the BSD users, so:

How many surrealists does it take to screw in a lightbulb? One to hold the giraffe and one to fill the bathtub with brightly colored power tools.

Working...