My biggest beef was it was converting all my videos to quicktime. And it id not support mpg files directly. It wanted me to buy some software for jpg support. After shelling out 1300$ I hated being nickel and dimed for stupid mpg2 support. At that point I lost interest and just gave the machine to my kid. It still works it is on the next desk. But I touch it rarely. When I got it fresh, I did lots of stuff with ffmpg, scripting it to reencode some videos etc. I had an external hard disk that failed and after that there were so many dead links it was a pain to use iPhoto. I was not willing to spend the time to learn enough to clean it up.
Unless you are careful and know your way around unix basics, Apple will trap you into their walled garden. They have their own video format, audio format, image format, even ascii files have a different line ending.
Build an enclosure covering both the top of the hole and the power plant.
Set off series of small explosives to reduce the power plant to small sized rubble. The enclosure should be able to contain the debris and be airtight. They could spray gasoline on the debris and burn them repeatedly to weaken the structures before setting off these small explosives. The explosives will be set using remote controlled vehicles.
User remote controlled bulldozers to push the rubble into the hole
Back fill the hole with the tilings.
Cover it with a concrete slab some 30 meters thick.
1. Gibraltor and Madrid are the end nodes. It is not on either end of the red line.
2. Rome to Athens with one stop over. I dont see that at all in the red line
Is the output real, or is it "simulated for advertisement" we used to see in the old print ads for TV sets?
Somehow an edit went awry. Thanks for noticing. Fixed.
It is a good thing you and I are not criminals. The cops would be so totally outsmarted.
Clearly the wild pointer read error is in IE not in the server. They need to hack the server to post the exploit code in their server. But they could also create the same vulnerability in a site owned by them. No need to hack. But it is more difficult to lure visitors to the newly created malware site. That is why they need to hack a well visited site to upload the hack. But all visitors to that site using Chrome and Firefox and other versions of IE are not affected. Fault lies solely on these versions of IE
Of course Secunia will count this is as "one bug", after Microsoft agrees it is a bug. On the other hand, it will look at bugzilla of Firefox, and every bug report by everyone will be counted towards the total bug count on Firefox. Microsoft will continue to insist its browser has fewer bugs than Firefox. Gartner will issue a TCO report based on these numbers. And everyone will be scratching their head, why IE market share continues to fall when all these numbers say IE is the safest browser in the world.
I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"