Comment Re:Software Robot? (Score 1) 231
Either way it seems like a silly way to go about it. I'm sure a dozen ham enthusiasts would have jumped all over a chance to practice their RDF skills on something useful.
Either way it seems like a silly way to go about it. I'm sure a dozen ham enthusiasts would have jumped all over a chance to practice their RDF skills on something useful.
In fact the first transmitters used arc as well - spark gap transmitters.
That is crazy impressive!
How does one enable Wifi in a data storage card!?
So, aggressive drugs that could enter the virus could then be targeted to act on the capsid, sparing other cells/bacteria/viruses in the body.
I know nothing about this though, really.
Depends where the vulnerability is. If they get in prior to that check, then it would be obeyed, but if it's later in the codepath then of course it wouldn't apply.
Which is actually true... if you leave enough time between hammer blows for your osteoblasts to do their job.
Repeated stress on a bone results in that bone being strengthened. Here's what this looks like after a good long time of it. That's one of the leg bones from a Cobbler. Holding shoes over his/her leg and pounding nails into them through the majority of their lifetime resulted in that large reinforcement of bone.
Yes, that was exactly my thinking when I was writing the comment. I could see a developer implementing the same technique into a disk encryption scheme.
In fact I think that's how Windows NTFS disk encryption (not bitlocker) works. The file is there, and you can see information about it - you just can't read the data out of it without the key.
Yea well, dogs are dogs. Your stepfather is a person (who can reason, etc - as evidenced by his attempts to suppress/correct his impulse).
I bet you would have made a good Nazi.
Pedophiles are deranged. Mentally ill. Sick. You can't reason with them because their brains do no work like normal people. The only thing that they respond to is force.
OK, Dr. Let's see your credentials?
By that same argument, the guy now has every reason to claim the stress has caused him to forget the key. Anything they throw at him for that would be better than playing along with the "we know you have kiddie porn" line.
I'm sure PLA MUCD Unit 61398 has you beaten to the punch.
Don't even need to do that - just zero the data that associates where cylinders begin, platter alignment etc.
You can't just pop the logic board off and slap another one on there - not without (effectively) scrambling the data that (used to be) on it.
I would imagine it does support full disk encryption. Just not on your boot disk.
You don't need an identical drive, you just need a drive (or storage system) that can fit that many bytes on it. You can then slap it on a loopback block device or such and access it - no need to use a physical disk.
Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.