| Subject | Datestamp | Replies | Score | |||
|---|---|---|---|---|---|---|
| Re:Qualifications... | ||||||
| attached to IT Security Interviews Exposed | ||||||
| Re:Extensibility? | ||||||
| attached to Wal-Mart's $200 Linux PC Sells Out | ||||||
| Re:Counterargument | ||||||
| Re:Counterargument | ||||||
| attached to Virtualization Decreases Security | ||||||
| Re:Write-in vote | ||||||
| attached to What is Your Favorite Fictional Company? | ||||||
| Re:The summary missed those parts. | ||||||
| attached to Should Vendors Close All Security Holes? | ||||||
| Re:Oh, come on! | ||||||
| attached to Why Are T1 Lines Still Expensive? | ||||||
| Re:Beryl is pointless | ||||||
| attached to Beryl User Interface for Linux Reviewed | ||||||
The young lady had an unusual list, Linked in part to a structural weakness. She set no preconditions.