Comment Limerick! (Score 0) 73
Policy so Queer, takes a Second Look
Spammers Invade
Makes the site Second Grade
Your Data they done took
Policy so Queer, takes a Second Look
Spammers Invade
Makes the site Second Grade
Your Data they done took
...in communist China, Mars probe launches you!
Partly pleasurable with a 50% chance of death.
Is it any wonder why so many people are used to the rules and non-regulations of a Windows machine?
That being said, every flavor of Linux I've tried has some different scheme to it, making basic operations unnecessarily complex.
Standardizing basic ops like install/uninstall, media player/ect. would be a good start, but probably terribly unrealistic among mainstream distros.
It's like telling your enemy "Hey, I know where and when your going to strike"
We know it's capable to updating itself, this just gives the author an 8 day head start on writing a new pseudo random URL generator.
Additionally, if your that fucking concerned about this attack, wait 30 sec to 1 min after shutdown when logic gates loose electrical charge and are defaulted to zero.
Perhaps I don't fully understand the details of this attack, but it seems as if this would be impractical as a way to steal data. My understanding is that the data only exists for a short period of time after shutdown.Please correct me if I'm wrong...
...those ITT Tech and other TV commercials who advertise making games after 2 years. That's bullshit...
So true, I know a buddy who attended one of these institutions and couldn't even write a simple "Sprite" Class.
Upon inquiring further, when asked what a Sprite was with respect to game programming, he replied "Uh..it's something that moves!"
Needless to say, you wont be seeing his name in any game credits anytime soon.
"Pay no attention to the man behind the curtain." -- The Wizard Of Oz