Comment Re:the only thing worth coming for (Score 1) 629
If it's good enough for Protectors, it's good enough for us,
If it's good enough for Protectors, it's good enough for us,
Look, we already know that genetic diversity doesn't increase at any predictable rare. For most pf life's existence on earth it was limited to anaerobic bacteria and that there was very little genetic diversity. Then the oxygen levels in the oceans and atmosphere reached saturation levels and aerobic live took over. And with the higher complexity of possible life forms, the increase in reproductive frequency, and the over-all speedup of this rocket-fueled form of life genetic diversity exploded.
I think they meant "more storage". It's a common mistake.
V erfrzoyr gung erznex.
"You die, and it turns out you were wrong and there is a God. What do you say?"
There's nothing to say. God knows everything.
Getting old sucks... I meant a Celery 333 overclocked to 450. And the P233 is obviously a P266.
As you were.
Let's see... if we stay just with Intel: 8086 4.7Mhz, 80286 (forgot the speed), 80386SX 20, 80386 33, 80486 DX2/66, Pentium 133, 233, Celery 350 (2, one overclocked to 400), P3 500ish, and a slew of Core X and iX chips, and my Xeon-fueled Mac Pros.
If we open it up to other CPUs, well, how much time have you got?
This is exactly why I described it as a "possible" cyber attack. Could just be a bad patch push.
It sounds like the username shared was "ngarcia", not his own. So he was sharing an account that he created and remembered the password to, not one that was technically his own. If he did it at all, that is.
The site doesn't have ads. It's got two amazon affiliate links on the About page (for the movie Hackers and a search of William Gibson's books), but that's it.
I'm just trying to do something good.
Yep, that's what I thought. Epic no-win scenario.
Maybe there's a way to Kobayashi Maru it.
Many of the available PCI-type scanning tools seem to recommend it, so this is wonderful. Certainly sounds riskier than the recent BEAST vulnerability.
I'm sure this will lead to a few new entries on my gibsonindex.org cyber attack severity ranking project, as people find ways to apply this attack vector.
Anyone know what Cipher Suite configuration is the "safest" now?
I guess he's decided it's time to do something about those damned Martians.
"Conversion, fastidious Goddess, loves blood better than brick, and feasts most subtly on the human will." -- Virginia Woolf, "Mrs. Dalloway"