Comment Re:SkyNet (Score 1) 192
IIRC, when in running with the -server switch, java is willing to -eventually- remove some of the unused memory in permgen.
IIRC, when in running with the -server switch, java is willing to -eventually- remove some of the unused memory in permgen.
Aaah, yes. TPM and Palladium to the rescue!
Ditto. *ahem* Europe.
Besides, It's a part of the atmosphere... flayed and mounted on Lexan hanging from my wall (with lots of carefully routed wires and a few pretty lights that blink intermittently) -- I find wallputers more interesting/functional at than most paintings, plus it's easier to clean, takes up less space and promotes a cozy cyber-punk feel.
Your ideas are intriguing to me and I wish to subscribe to your newsletter.
Explain this to me; why is UPnP so insecure? UPnP can only be switched on by a random application if that application has access to the LAN. That application is then _already_ running locally on one of the machines on the network. It can _already_ connect to random machines/ports. If that application now wants to exploit a vulnerability on one of the machines connected to the LAN, it can do it directly, no need to configure any port forwarding to let yet something else in.
I haven't yet read any realistic argumentation on why UPnP is dangerous (and I looked!). Mainly just FUD. The only security issue I can see is that _after_ the baddies take over your PC, they can open up ports.
Sure, but why, in the holy trinity of three hells, would you embed it in child pornography, as the second linked article suggests?
From http://www.boeing.com/news/releases/2005/q1/nr_050214s.html
The two X-45As began the latest test, known as Peacekeeper, by departing from Edwards and climbing to altitudes of 24,500 and 25,500 ft respectively. Separated by approximately 25 miles and operating at Mach
Once alerted to the first threat, the X-45As autonomously determined which vehicle held the optimum position, weapons and fuel load to properly attack the target. After making that decision, one of the X-45As changed course and the pilot-operator allowed it to attack the simulated ground-based radar. Following a successful strike, another simulated threat emerged and was subsequently destroyed by the second X-45A. The two X-45As completed their mission and safely returned to Edwards.
In the future, ground-based pilots will be controlling multiple combat aircraft with high-level commands: Patrol that sector, destroy target, refuel, RTB.
I hope a WPA2 security key was set in that router's configuration?
Even if Windows phones are just as good as droids and iphones, the current market shares can be the determining factor in purchase decisions. Maybe what MS needs is to have WP7 be better than its competition. And that is going to be hard to do.
AFAIK, in the USA, if games can be art, then games get some kind of free speech protection. I hear it is a relatively large legal issue with US states trying to ban/regulate some games.
The good news for GeoTag is that the Nazgûl are still behind the Black Gate of Armonk.
I think the idea would be that the energy beam arrives at the mirror evenly distributed over its surface. The mirror would then do the focusing and targeting. As for execution, I don't know if this is feasible, but it made for a great Tom Clancy novel though. (The Cardinal of the Kremlin)
http://www.amazon.com/Cardinal-Kremlin-Tom-Clancy/dp/0425116840
Stowaway mammoths? Really?
You say that like that's a bad thing.
Well, the big boss did get caught in the book. Haahahaha!
On the eighth day, God created FORTRAN.