Forgot your password?

Comment: hope all it does is verifies... (Score 1) 75

by pouar (#46328761) Attached to: DARPA Looks To End the Scourge of Counterfeit Computer Gear
...instead of stopping the system if it doesn't verify (kill switch) or sending the results back to headquaters (spying), otherwise it's DRM. As long as the user has full control on what this thing does such as turning it off or changing what server it sends the info to or what it registers as counterfeit and what doesn't then it could be a good thing. But if this is used to lock the user out of his own hardware or prevent him from changing or modifying it then this is going to be a huge problem.

Comment: I prefer the command line and a text editor (Score 1) 627

by pouar (#46328139) Attached to: Does Relying On an IDE Make You a Bad Programmer?
It's actually easier and quicker for me to use than an IDE. I usually use Bash as my shell and Kate as my text editor (Kate is similar to Notepad++ in functionality which is what I used before my switch to GNU/Linux). when I compile projects I either use a simple Makefile or CMake depending on the size of the project. I've done OS detection and resolution with Makefiles before.

People are always available for work in the past tense.