Comment In this case (Score 1) 1
I hope they gave the man a ACMA certified beer fridge to replace the pirate fridge (stealing from telstra)
I hope they gave the man a ACMA certified beer fridge to replace the pirate fridge (stealing from telstra)
Agree,
I guess there just isn't enough criminals out in society to offset the criminals in parliament (regardless of country).
It appears that "Their" ultimate goal is to control the population by controlling everything else.
Who would ever want to live in a place where food is marketed the same as printer cartridges? You get the food printer with a "lite" cartridge that can only print 4 meals for $500. To purchase additional cartridges it will cost $5000. If you try to put your own food substance in the cartridge you will have the full force of the US [private company] defense force come down on you screaming DMCA.
Control the food, control the people
Why do people assume that the hacker is only one hop away. If they were able to hack into the US network, couldn't they have also hacked into the Chinese network first?
if I was hacking a major military facility I would start by hacking into a crappy little network somewhere, from there a slightly larger network until eventually I am targeting my destination.
Or maybe it was the US hacking into the Chinese networks then hacking back into the US networks.
I hardly use Windows so I'm not sure if it works or not but wouldn't setting the software to run in Windows XP compatibility mode on Windows 7 mean she wouldn't need to get the newer version of the medical software, or has the software company arbitrarily decided that if you upgrade to Windows 7 you have to upgrade their software as well?
This is a bit like forced redundancy. Imagine if you had to buy new CDs or MP3s every time you purchased a new phone.
Perhaps just ban people.
to the question of why can men survive with one pair of jeans whereas women need a closet full of clothes?
Didn't the piratebay traceroute from a couple of weeks are highlight that it is easy to fake the location of servers? Also, if they attacked South Korea, surely they could also have attacked China and then used those compromised boxes to send out the attack?
Oh, that's right - they're able to attack remote systems but can only do so with one hop.
This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian