Filthy thief, Overbiting Mongoose, Moneycharging Oranguatan...Usurous Eunoch, Gouging George, etc.
Awesome post, chapeau sir. I fear there is much correctness in your predictions, there is a feral and ferocious future awaiting us potentially, or is it almost certainly? But I don't know if there will be an energy solution available to power this strip mining and these underwater cities. Possibly, but also very possibly humans will end up back burning firewood and staring up at the night sky in impotent maudlin despair.
What is this? Keyword loading? This some kind of sick SEO move?
Speed limit is 70mph on motorways. I read somewhere, a few years ago mind, that the _average_ non-HGV (Heavy Goods Vehicle) speed was around 80mph. It's not a rule that is particularly vigorously enforced. Over 100mph may get more attention and generally results in loss of licence for a period if prosecuted.
Or one day, amazon will be all that's left. You want that? I agree that many small businesses are badly run, and often can't or don't get the service right, but if you end up with only one or two massive impersonal players, you will regret it. That means, noiw, today even, making a choice to stop that happening by buying from the small guys even if that means paying a couple of dollars more.
(the same stand may push me to stop buying from Amazon some time soon).
Good. Don't know why, really, but I think that's a good plan. Otherwise, we'll wake up one day going wtf just happened.
Plus, the price differences are so negligible it hardly matters. Support the good guys, whomsoever you perceive them to be. Don't be a slave to tiny dollar differences.
Honest post I feel. I salute that. But 2 km walking isn't enough really, you need more calorie burn and less calorie intake. If you are going to rely on the 2k walk, walk hard! And just don't eat, if possible. Then eat meagrely when you have to. Don't accept your current physique. Just don't.
SOME programmers walk around in the "10 types of people" t-shirt and what-not. They are actually hyper-competitive and offensive people in my experience. They alienate men too. Myself, I wasn't really an outcast as you put it. But I could and do appreciate the astounding edifice we are standing on and I was amazed as a child by the various computers I encountered as they appeared in my lives. I wanted, instinctively, to understand how they worked and how to control them if possible, like any machine or system I come across.
But yet, the computer has never really done what I have told it to do. The normal result, of course, is that the program immediately blows up on the next line of code. Sometimes it works; and that is the reward, the micro-reward who's puirsuit I suspect defines a programmer. Sometimes, so rarely, the project bug list is actually emptied. Troubleshooting and debugging code is what makes it hard, tiring work. But the rewards are intellectually satisfying, like solving cryptic crossword puzzles, even if it's as ephemeral as cocaine.
I am sure it's environmental, the actual work involved can be done by woman as easily and proficiently as men. We just have to kill all the nerds first.
Dunno, it's all above my pay grade really, but either this is as you say utter dipshittery or it's so obscure it's irrelevant. Reads like a poorly written April fool joke.
I would assume so too. I once got involved in a C++ product that was licensed to oil companies for c. $10,000 a year. It had a 10,000 line main(). The owner wrote it at university while learning C++ on his course. Incredibly shoddy, unstructured code, but it works, and he's rich.
And that, kids, is what encryption is for.
...and onion routing, kids.
So was I. You can't specify the port number in an MX record.
Bouncing packets "back where they came from" is a recipe for disrupting even more innocent parties.
Aye. DNS amplification attack, for example.
I don't think you can call dictionary attacks on phpmyadmin and its possible installation paths a "scan". Well, you can if you want but in what I would call a scan one is scanning available ports for interesting services to attack. ydmv and fairly pointless comment on my part anyway so have a good day.
Both of you are wrong. A Linux box set up according to current good practice will not be easy to pwn, even for the great NSA. Where did you get this idea from? Pay better attention to the story please. The NSA has taken advantage of the treasure trove of network communication metadata primarily, which has nothing to do with linux boxen per se, The NSA has taken advantage of access to important nodes on the internet and to listen in - where possible - to the actual packet payloads. The NSA has taken advantage of security key infrastructure and no doubt been able to decrypt SSL and more. The NSA has taken advantage of its dark political power to coerce, force or flatter the big US internet companies into giving them as much access as they could squeeze from these mega data stores. All of this is already a massive, unprecedented, ominous new development in human society. This is what the NSA has been doing. But what they haven't been doing is pwning mcgrews linux box. Nobody is, unless he's an idiot.