Comment Re:It's a 2-way street (Score 1) 74
Bugs arn't the only attack vector - logical programming errors can also allow access, eg a simple example is if a password or certificate isn't checked.
Bugs arn't the only attack vector - logical programming errors can also allow access, eg a simple example is if a password or certificate isn't checked.
Could use IR cameras now, dont need defolliant.
On the contrary , the knee is perfectly evolved to last the *natural* human lifespan, ie about 40-50 years.
Err, how exactly do you think biochemicals get from the gut to the liver if not via the bloodstream, pixie magic?
Everything is a poison if you injest too much of it, even water. The small amount of fructose in fruit is harmless, the ridiculous amounts in fizzy drinks etc, not so much.
Grow up.
You know you can pick up a new dvd player for the price of a few hardback books, right?
So you cant watch pirated films on one of your TVs? Oh the humanity!
Clearly you've never seen or read any real sci fi if you believe any of that steaming crap you wrote. Star trek is space opera, its TV big mac. Dystopias are a huge part of the genre, go start with Orwell and work up from there, but if you cant read try these films for starters- Blade Runner, Logans Run, Silent Running.
" If we don't understand it, it is because we haven't figured out how to perform the necessary experiments."
A good remark to put on a motivational poster but its simply not true in all cases. There are no further experiments that can be done in the case of the double slit and people have been trying to think them up for a century. Its not a case of better equipment will reveal something as this is a discrepency in the fundamental nature of reality.
QT has been comprehensively tested, the results are not in question. But find someone who says they can explain the double slit paradox and you'll have found a liar.
The problem is that quantum mechanics appears to be hitting the upper bounds of human intellect as far as understanding is concerned. Its been around 100 years but no one understands WTF is going on under the hood. Physicists can explain the what but not the how and why.
A hacker needs root in linux to install boot time malware at which point its game over anyway and youll need to nuke the install from orbit including the loader so UEFI brings nothing to the table.
.. could help him find the missing 'e' in his name.
If you think UEFI enhances anything except MSs stranglehold on the PC market then theres a bridge with your name on it.
God made the integers; all else is the work of Man. -- Kronecker