Comment Someone call Robert Hayes (Score 1) 554
It's time for another AIRPLANE movie!
It's time for another AIRPLANE movie!
I just don't understand them.
I speak with Americans every day. They all seam like rational, clear thinking. But you look at the TV ad's and look at the hysterics that they put on TV and I wonder who those people are?
The whole process is based on fear. If they could put an AD out saying "If you vote for my opponent you are going to DIE!" They would.
I find the whole process fascinating.
Now can someone explain what is the difference between delegates and super delegates?
I have played Dark Age of camelot for 5 years, World of warcraft for 5 years, EvE Online on and of for a while, Acheron's call, City of Heros City of Villans and other to a lesser extent.
None of these MMO's came out done. NONE. It is the nature of MMO's to be works in progress. Sure they have to have some sort of playability and having played my Zealot to 31 in Warhammer at release it was a good game. The public quests worked the battleground worked, the quests worked.
they added some classses later, but so did Wow they added BRD and other dungons after relese date. Darkness falls in DAOC. I did not play EvE from the begining but I am sure the same thing happened as changes are made after every patch.
I also understand that publishers want a product to release or else you could be faced with George Broussard's 10 year excursion of development.
Is it trying to push a browser vulnerability!!!
Yes actually I do this quaterly.
We divide the vulnerabilities in 3 category.
OS patching.
OS Hardening.
Application Patching.
By doing this you can focus to the root cause of the issues. System owners, Application owners. It's a nice 2 page report with colours. they love it.
Administrators who care and are not tied up in red tape tend to really shine in these reports.
Another thing to realise is that in a corporate production environment, nothing will ever be 100% secure 100% of the time.
The lack of details in the paper makes it so that it is impossible to know exactly what they found. Scanners such as Nessus, Foundstone, Languard are really noisy and can report normal system operation as a high vulnerability irregardless of system configuration.
Something like telnet will be a high, but put the proper mitigation such as access list, 2 factor authentication and you can show it as a medium or low.
It's all subjective.
But you have to take into consideration gender for everything. This something they do not have in English.
A table is a table while in French une table is feminin.
This is also true for Spanish and Russian. Something that I always found interesting, All nouns are the same gender. Who decided this?
Why is table not masculin in Russian?
Weird
You can think of Top Secret as a governmental NDA. Breaking this one will land you in jail instead of a fine or other penalties. Worst case senario is that you will be charged with treason and all that could possibly imply.
Not all people who have Top secret work for projects related to terrorism.
Mostly it's a requirement to interact with that particular agency.
it's regular FUD journalisim.
Can't wait for Rockband 3
http://www.youtube.com/watch?v=D5De9eCH1EU
Most good developers, but if like me you belong in a very large company and developpers are hired by contract the end result can always be suprising. Because most don't care. They are given a timeline and no matter what the sales dept. will have their way.
oh yes we do vulnerability assessments and code review, but if someone invents the magic wand to make all the bad go away we would surly invest in it.
Oh look it's summer, here comes the students to work on all those special projects.
One small step for man, one giant stumble for mankind.