Comment Re:Steganography (Score 1) 483
Finally, someone devious enough to get it!
I thought I was the only one.
Finally, someone devious enough to get it!
I thought I was the only one.
What's the matter with you people? Back in the day, Slashdotters would have figured this out immediately.
It's the *terrorists* using the bid data as an out-of-band *communication protocol* for transmitting *encrypted messages*! Remember? Like they were doing with steganography in eBay auction photos? The brilliance is they are using our own tools against us!
Bear with me a moment, pour yourself a large frosty mug o' xenophobia, and think about all those *overseas programmers* in the financial industry. Why, if we don't stop them, they'll probably code up some *derivative bots* that will f-up the mortgage industry!
I've heard:
"This takes us to the crotch of the matter" (which, I suppose, might make sense in contexts other than the one in which it was delivered).
"Nothing more to talk about -- it's a mute's point"
"He was essentially in involuntary certitude"
"More changes are coming down the pile"
"We'll come to that bridge when we get to it"
"You need to think outside the blocks"
"There's no 'me' in 'Team'"
There are eight million stories in the naked city...
except that there are ten million of 'em in the County, and in the extended city it's closer to twenty-two million.
When the thief fences the goods to someone who blogs about the exploits, I imagine you'll get more attention from the police.
It's true: justice is not applied equally. But that doesn't mean justice shouldn't be pursued.
I think there's another distinction you're missing. The purchaser of stolen goods published to an international news source a detailed story, gloating about how they purchased the goods. I suspect this influenced the police's decision to get involved. True, it doesn't hurt that the goods were stolen from a multibillion dollar corporation with one of the biggest PR budgets in the country.
The difference in received justice between corporations and individuals is one issue. The investigation following the publication of details of committing a crime is a different issue.
wow. echoes of the Palm Treo 600 and 650...
They need a special launcher to run apps of an SD card. And that's 5 or 6-year-old tech.
Which is why Nantucket Corporation could/should have owned the world with Clipper, had they just kept moving it forward. But they squandered their 5 year lead...
Now, of course, you'd be insane to use xBase for anything. But at the time, it was pretty cool stuff.
NewDOS 80 v2!
We pedants use it as a shortcut method for figuring out whether or not a person is a blithering idiot. Grammar errors don't trigger an irrevocable condemnation, but they sure provide a good first indicator.
I always like it when at the scene of an accident, the officer is asking "What happened here?" and the driver is saying "I don't know
Huh? You're piloting a ton or more of steel at 60km/h, and you don't know? Did it ever occur that you might want to know what's going on around you?
Based upon my own personal experience (as an ex-child myself), there is very little a parent can do to stop a determined, curious kid.
Statistically, you lose a few. Most of the dangerous things kids get into are treatable after the fact, or will only leave some scarring.
I thought the pill did ban children!
yeah, GEM was fun. More fun than DOS, anyway.
You had assembly language? You lucky, lucky bastard! We had to hand-place electrons on the bus of our S100 system to even boot CP/M.
LD HL, 3C00
LD DE, FA00
LD BC, 0F00
LDIR
The Macintosh is Xerox technology at its best.