We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
One usually has multiple kids because the first kid is usually the most well behaved and quiet kid one ever has.
And probably sometimes you have a second (or another) child if it's therapeutic for the mother.
I had a Cisco switch and an embedded Linux appliance that needed less than a week to reach the 5 years uptime. Unfortunately a fire broke in the building they were hosted in and the fire brigade had to cut the power. I was prepared to take a screenshot with "show ver" and "uptime" outputs...
_16s (1963724) writes "I wrote a passive key stroke logger (back in 2007) called 16k to demonstrate how these type of key stroke loggers work. No one has ever paid it much attention, until yesterday when several anti-keylogging softwares discovered it and realized that their software did not detect it. Since that time, my hosting provider has received multiple abuse notices and take-down requests that I have had to respond to and a few DNS services have blacklisted my domain names (clear cloud dns). My source code and binaries are GPG signed, authenticode signed and MD5'ed and have not changed for more than a year. They've been available for download for many years. And now, all of a sudden, out of the blue they are labeled as malware. I had a small degree of respect for commercial security before this, but now I have none. It seems Security Theater and morons are in charge of companies claiming to make the Web safe. I was hoping/. would help me get the word out." Link to Original Source