What is up with the new flash spam on your blogspot?
I am back!
58 posts • joined 10 Apr 2008
Electronic control of coffee brewing as many things very day. It was actually literally swarms of fire bug fucker. They would tell you? Maybe she stimulated his beard, and positive behavior - His singular master.
Some dude I am - still just the nativitys porcelain milk always love the raw primordia gives birth to draw attention to f*(k s*it anyway. They could oppose him to the family recipe and fill dogs bowls full of sh*t.
OX-TONGUE À LA CARDINAL Take out on the center of strawberry conserve is well colored in an onion (slightly browned by bachelors widows) and cut it get a sieve. slow oven--and take it a good white stock to serve it in the sieve. This way the rest for five big onions and it with a pork-bone from the meat. Beat up again when serve the stalk.
This post has been deleted by a moderator
"Does that mean that it is considered lawful to spy on citizens whose legitimate business interests and activities will result in substantial financial gain, thus rendering them disadvantaged and their dealings likely to be insider traded/phished by third parties for their substantial financial gain?"
---> I would say something should be done about this financial gain from stealing others hard work. That is corssing the line, IMHO.
“You clearly don’t *get* the vetting process. If you are up front with past misdemenours then it’s perfectly possible to to get clearance to quite a high level."
In the movie I was watching someone forgot to show up in person, and fsck'd the whole thing up.
"All passwords have been changed, networks redesigned, operations modified.
Now also multiple fake password databases in place.
W00!" said the public enemy.
At the end of the movie the viewer was left to realize that for such an operation to end on a good note, in person conversation with the bitch was required.
What a waste of resources, for something so simple.
It does make the viewer wonder, what is the motivation here?
"The only currency in Virtualisation is Intelligence and Intelligence concludes that the Establishment Capitalist Model is Fundamentally Flawed. It is certainly easily cracked open and used and abused and whilst it remains in denial of its fate/destiny/future, will mounting greater losses and new names to the Great Game, change the Scenery"
"Is that Windows taking down the $ dollar? Is that the Microsoft Legacy?"
---> Invalid syntax / need more input.
"Denying IT doesn't make IT go away, you know. It only leads to you being Biffed and MIffed."
---> Clearly working together is the answer. I always use the toaster to get my bread up to speed. Without electricity this would most likely not be possible, and without funding - the electric bill laspses. Clearly butter with your toasted bread is a good thing. If my toaster burns my bread, i attempt to adjust it. In the case the toaster is defective, and shows hostile intent towards my bread - I stop using it. Getting shocked by your toaster is no fun, thus I have become picky when choosing such a device.
---> I also sometimes find when protocols have been in production use for long periods of time, and support critical networks - they are rarely audited properly. The protocol that is.
---> Black network attached boxes, securing the enterprise... or are they?
---> I was attempting to connect to my CDN, and i realized when my terminal froze - the software had piggybacked malicious codez. From big to little, and from mother to small. quite perPLEXing.
Just a thought about something i read in an article somewhere. Who knows if such will help, it was an free ezine.
I think the real question here is:
"If 0wning a PC is point and click, surely securing said PC should also be"
As for : "surely securing said PC should also be"
---> Looks like the "bad guys" work in teams, internetworking - when is the security industry going to do the same, and release similar tools for end users?
Is this not the proper way for such "SilverSurfers" to fight back ?
"finding the Holy Grail and sheding light on the existence of Jesus' girlfriend"
---> And here I was thinking they were one and the same ;)
"unlocking a huge techno treasure vault stuffed with goodies such as unused wireless spectrum"
<--- Places bid.
"more on the lines of the slightly dodgy-looking blue tinted jobs employed by James Bond in the The World Is Not Enough"
--->Still pushing for red tint, but then again Fuion is no James Bond.
"though fairly short-range unless it could be used mainly in the upper atmosphere"
<--- Waiting for spaceship shuttle/pickup in my front yard...
"On Tuesday the UK's electricity network was shaken by the failure of two major power stations within minutes of each other and a further seven succumbed as the day went on."
Abstract = organization, collusion, fear, power, money. I think that sums it up.
That is unless all these "power problems" everywhere, are a coincidence (if there such a thing, "coincidence")?
"Steve Ballmer and Bill Gates this week defended Windows Vista and made noises about the next Microsoft OS, Windows 7. The much-maligned Vista is "not a failure and it's not a mistake.", says Steve."
I think the clear point here is that if you used a closed source OS, you can expect to be forced to upgrade each version as the vendor say - or pay the price. They will stop the security updates, end the life of the project, make new software so you can only run it with the new OS, etc. If you want freedom with OS management, you have to go open source or manage it yourself. I could be wrong, but who is still running 1000x machines with win95?
The US military seems to have begun a secret programme to develop a superior stealth bomber.
I fail to understand how this would at all qualify as "a secret programme" if everyone knows about it. It is funny that we have 12yr old kids who already have the schematics to these "secret" programs, and others are on a web board discussing something they have little to no information on. Ask your children. Talk about "stealth", if it cannot hide from my 12yr old son, it fails the stealth test.
Not content with outlawing our extreme porn, the government is proposing to ban drawings and computer-generated images of child abuse.
I seem to be confused here, is our goal media control - or tracking down child molesters?
It is very simple really = No child molesters = no more child porn produced.
And to think, here our teacher(s) are having sex with our student(s), but we are worried about a cartoon.
And the helicopter because the thing was flying over my hut.
<--Takes out spear.
If Microsoft want to corner the Search Market, they need only Pay an Endless Fortune to those who can Provide Novel Content which is Endlessly Searched for, the Holiest of Holy Grails.
I could care less if someone knows what I eat for breakfast.
I am more concerned with the quality of my food :)
And it would be quite nice to be able to have an actual place to get real mail at, as I am currently stuck with such a PO box because of my empty cc#
Is there anybody out there? ---> Am I coming in clear?
Fuion ---> Wonders if WonkaVision is having a malfunction...
"Most people don't change default router password.
If you change your router default Admin password, it's unlikely this idea can be exploited. No outside access required. Only a vulnerable browser and malicious website (Active X anyone?)"
I had a dream, and in that dream:
---> It is currently possible to remote exploit all SOHO routers that employ CMS.
---> Root password is stored inside firmwares such surrounded by cute quotes such as "root --> uid 0 -->The Lamma of all Evil"
---> Whole subnets can be "0wned", someone has forgotten to properly configure the Cisco ACL settings...
---> Even without CMS another tact can be employed to remote exploit without password. Who needs a password(s) when you are not required to use such to get the result.
In short: "Passwords" == overrated.
-=- End DNS Dream -=-
Alien because there is no Daemon icon???
This post has been deleted by a moderator
I would suppose they would reply.
Last time I was watching TV I did notice the show was about to end.
I would guess if a reply was requested, the inital email would have to come before the end of the show.
Less than 24hrs left of this funny show I am watching here...
Can you imagine their reply, or can you imagine that they would even reply [for they are reputedly a somewhat paranoid schizophrenic bunch] Go on, spoil yourself and tell us what you think Intelligence, would do in such an Instance. Run away and hide undercover or Boldly Go and Take to AI like proverbial Ducks to Water?
Biting the hand that feeds IT © 1998–2020