Comment Limerick! (Score 0) 73
Policy so Queer, takes a Second Look
Spammers Invade
Makes the site Second Grade
Your Data they done took
Policy so Queer, takes a Second Look
Spammers Invade
Makes the site Second Grade
Your Data they done took
...in communist China, Mars probe launches you!
Partly pleasurable with a 50% chance of death.
Is it any wonder why so many people are used to the rules and non-regulations of a Windows machine?
That being said, every flavor of Linux I've tried has some different scheme to it, making basic operations unnecessarily complex.
Standardizing basic ops like install/uninstall, media player/ect. would be a good start, but probably terribly unrealistic among mainstream distros.
It's like telling your enemy "Hey, I know where and when your going to strike"
We know it's capable to updating itself, this just gives the author an 8 day head start on writing a new pseudo random URL generator.
Additionally, if your that fucking concerned about this attack, wait 30 sec to 1 min after shutdown when logic gates loose electrical charge and are defaulted to zero.
Perhaps I don't fully understand the details of this attack, but it seems as if this would be impractical as a way to steal data. My understanding is that the data only exists for a short period of time after shutdown.Please correct me if I'm wrong...
...those ITT Tech and other TV commercials who advertise making games after 2 years. That's bullshit...
So true, I know a buddy who attended one of these institutions and couldn't even write a simple "Sprite" Class.
Upon inquiring further, when asked what a Sprite was with respect to game programming, he replied "Uh..it's something that moves!"
Needless to say, you wont be seeing his name in any game credits anytime soon.
Never trust a computer you can't repair yourself.