I didn't say it wasn't good I said it wasn't modular.
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
And OpenBSD's init system (rc) is about as non-modular as it gets.
This is about talking to Cisco not from Cisco.
Use netcat (aka nc) for that. It works just as well and you can just ^C to get out of it.
I know I am splitting hairs here but neither was a state at the time.
So, what do I add to USE or CFLAGS to be able to call myself rich using imaginary money? CFLAGS="-fmake-money"? USE="federal_reserve"?
You think we get nothing from exploring beyond our tiny little insignificant spec of space?
So, some day the children of helicopter parents will get their revenge.
Assuming some of them at some point learn how to live.
Yeah, if you don't mind someone else coming along and formatting your apparently unformatted drive for you.
Or a rogue boot loader (like the Windows one installing itself at the start of your filesystem.
I ran into that a few years ago when I added a 4TB hardware RAID5 to my Linux server. The partition table that is made by fdisk can't handle it. I was forced to use parted to make an EFI partition table instead. It was a little different but completely doable. Took me about 2 minutes on Google to find a howto.
What will kill DJBDNS is when PCI and other standards groups start to require DNSSEC in order to do business. Then companies will be forced to switch to a less secure DNS server just to speak a slightly more secure protocol.
Flare guns count too. Plus they are unregulated in every state. Their ammo is not allowed though.
This guy has some good info: http://deviating.net/firearms/packing/
Actually, flying with a checked and properly declared firearm is a great way to keep your stuff safe. You are required by federal law to use locks that the TSA can't open so you don't have to worry about them stealing stuff from your case.
Are these researchers doing anything about it? Have they handed the IP lists with timestamps over to the appropriate ISPs or corporate network administrators so that the infected systems can be dealt with? Did they even put up a page where you can check yourself or your network?
Merely counting the infected is nothing but mental masturbation. Even the lame government census has moved beyond simply counting.
Since we are talking about web logins here there is a simple solution...
Most modern web browsers support remembering passwords and typing them in for you. If you are so unconcerned about security that you want your password to be displayed on the screen for anyone to see then you may as well just let your browser type it in for you and eliminate the typo problem completely.