No. Capitalist America. They must do everything in their power, that the government of the money, by the money, for the money shall not perish from the earth.
From experience, it is usually enough to have the comments and the variable names in a foreign language you don't understand to make source code completely unreadable.
Until you reach the big
Dunno about you. But mine must have skipped a bug fix or something. Because ever so often I go into the kitchen at night, open the fridge, look into it, wonder "what the hell am I doing here? I'm neither hungry nor thirsty at the moment, why did I have the urge to look into the fridge? Is it the old hunter-gatherer gene that prompts me to look at my food source location, to see if any interesting prey has shone up? This is madness!!!!", then I close it again and go back to bed.
Well, it might speed up the "Russian Coffee" fork of Java. Like sunshine mixed with happiness.
And when I say sunshine I mean coffee.
And when I say happiness, I mean vodka
The major problem probably is people behind corporate or private firewalls, or on NATs, or behind proxies, or other things that prevent them from being a "server" that the other side can see directly over the internet.
So network-wise a "third party server" that has no such restrictions might always be necessary for those www-but-not-really-internet connected people so that their machines can talk to another. Of course if one of the participants is "really" on the internet that participant could run the server part.
Ideally, the payment processor is the only one who has the hash, the merchant passes the hash they made from customer data on to the processor.
The payment processor doesn't even need to have the CC#. They just need the hash.
And where does the customer store that data? Or the printing company that prints the number on the credit card?
Also, if "the hash is all that is needed" when sending something to the payment processor, then you would have the same problems in the long run when you "store the hash" that you have now when you "store the credit card number".
Yeah!!! If God had wanted us to fly, he would have given us first class tickets!!
Hey, the Outlook Options Dialog has one named "Other" instead of "Misc.", which is basically the same in "dumbed down language"
(And every time I have to use THAT at work, I have to search through "Preferences" -> "Email Options", the "Mail Setup" and "Mail Format" Tabls, because the things that are sprinkled through them don't seem to follow any kind of logic on what is where.)
An asteroid field. Granted, an asteroid field that attracts a lot of nostalgic sight seers.
Hey, it involves XML. In most of the projects I know, every time some "customized scripts" were replaced by "just one simple XML....." the manpower needed to maintain those functions has usually tripled.
I agree, and that is actually a pretty good example on how it could/should work in IT also.
You have an architect or an engineer to make the general plans, then split that into chunks the individual construction workers can handle, and then let them do their job. On top of that you have some sort of infrastructure specialist, who might not know much about bridges, but has determined that there is a traffic bottleneck at point X that needs a bridge.
I would be perfectly happy to be either the architect or the construction worker in a project, but (for projects larger than a sawhorse) those two people SHOULDN'T be the same person. I that sense I sometime would also like to scream "Just let me Code!" instead of dragging me into all sorts of management meetings where people just sit around going "Say, wouldn't a bridge be nice?" First decide THAT you want a bridge, then decide WHERE you want a bridge, only then come to me to be the architect and get someone else to code, or get an architect that then gets me to code.
But in IT a lot of unnecessary overhead is caused because people call big meetings of construction workers before having even decided if they want a bridge or not.
But the "beauty" of sending smallpox as a weapon is that it could be done in a way that the source is unknown. Having your own samples isn't really useful for retaliations, but it could be useful for creating vaccines quickly to contain the outbreak.
Well, I cut down from ~50 SSH login attempts per minute some days to basically
What I found: No matter how secure your lock is, when you have one, big, red, secure, lock on your stuff, which people know is active, people will try to pick it. On the other hand, when there is not one, big red, secure lock, but thousands of identical looking little, grey, secure locks, and the attacker would first have to try every one of them to see which is even active, then 99.999% of the script kiddies don't bother long enough to even find the lock.
So I moved my SSH stuff to another port. Doesn't help against any "real" attacker, and doesn't really add any security, but it DOES cut down on the noise in the logs.
It is pretty hilarious however about all these kids complaining about MS Office. With the setup above MS Office is only available for Mac, for Windows 2 or 3 you would need WordPerfect instead since Microsoft had no office suite to run on their own OS.
As single applications MS Word, Excel and Powerpoint were available for Windows at that time, and even some time before that. The same way that MS Word, Excel and Powerpoint were available for Mac before. Only the "marketing gimmick" of selling all three programs in a bundle called "MS Office" was started a little over a year earlier for the Mac versions (in August 1989) as a "Limited Time Promotion" originally, before they decided to turn it into a regular product, and then also made available a Windows version of the bundle. (November 1990)