58 posts • joined Thursday 10th April 2008 04:48 GMT
What is up with the new flash spam on your blogspot?
I am back!
Alive still :P
"So, Errr .......Thanks for your invaluable contribution? :-("
Anything you have from me was stolen.
You took my project and used it to set me up.
When I get back "on the outs" - I will remember to phone a "fsck you" your way.
@Inculpatory Evidence ..... Fiscal Meltdown
Electronic control of coffee brewing as many things very day. It was actually literally swarms of fire bug fucker. They would tell you? Maybe she stimulated his beard, and positive behavior - His singular master.
Some dude I am - still just the nativitys porcelain milk always love the raw primordia gives birth to draw attention to f*(k s*it anyway. They could oppose him to the family recipe and fill dogs bowls full of sh*t.
@amfM Calling Michael Dell re Colouring IT with Shells of Orange Apps.
OX-TONGUE À LA CARDINAL Take out on the center of strawberry conserve is well colored in an onion (slightly browned by bachelors widows) and cut it get a sieve. slow oven--and take it a good white stock to serve it in the sieve. This way the rest for five big onions and it with a pork-bone from the meat. Beat up again when serve the stalk.
An odd press release today:
"The 3 aliens have decided that amanfromMars have been granted power of attorney. Direct all further correspondence to:amanfromMars. amanfromMars will inform the 3 aliens in person when the mothership has landed"
Actions speak louder than words.
"Does that mean that it is considered lawful to spy on citizens whose legitimate business interests and activities will result in substantial financial gain, thus rendering them disadvantaged and their dealings likely to be insider traded/phished by third parties for their substantial financial gain?"
---> I would say something should be done about this financial gain from stealing others hard work. That is corssing the line, IMHO.
--- Mars Bars ---
“You clearly don’t *get* the vetting process. If you are up front with past misdemenours then it’s perfectly possible to to get clearance to quite a high level."
In the movie I was watching someone forgot to show up in person, and fsck'd the whole thing up.
"All passwords have been changed, networks redesigned, operations modified.
Now also multiple fake password databases in place.
W00!" said the public enemy.
At the end of the movie the viewer was left to realize that for such an operation to end on a good note, in person conversation with the bitch was required.
What a waste of resources, for something so simple.
It does make the viewer wonder, what is the motivation here?
"The only currency in Virtualisation is Intelligence and Intelligence concludes that the Establishment Capitalist Model is Fundamentally Flawed. It is certainly easily cracked open and used and abused and whilst it remains in denial of its fate/destiny/future, will mounting greater losses and new names to the Great Game, change the Scenery"
"Is that Windows taking down the $ dollar? Is that the Microsoft Legacy?"
---> Invalid syntax / need more input.
@The End of the Road.... Beginning of the Rains
"Maybe they can't do any of that stuff that they say they can do and are just Phishing and Flashing for those who Can and Do?."
---> End of public postings.
"Denying IT doesn't make IT go away, you know. It only leads to you being Biffed and MIffed."
---> Clearly working together is the answer. I always use the toaster to get my bread up to speed. Without electricity this would most likely not be possible, and without funding - the electric bill laspses. Clearly butter with your toasted bread is a good thing. If my toaster burns my bread, i attempt to adjust it. In the case the toaster is defective, and shows hostile intent towards my bread - I stop using it. Getting shocked by your toaster is no fun, thus I have become picky when choosing such a device.
---> I also sometimes find when protocols have been in production use for long periods of time, and support critical networks - they are rarely audited properly. The protocol that is.
---> Black network attached boxes, securing the enterprise... or are they?
---> I was attempting to connect to my CDN, and i realized when my terminal froze - the software had piggybacked malicious codez. From big to little, and from mother to small. quite perPLEXing.
Just a thought about something i read in an article somewhere. Who knows if such will help, it was an free ezine.
A title is required.
---> You seem to be mis-informed.
"carefully selected plebs half-baked "opinions" "
---> Your also a cock sucker.
"The helicopter was stationary, hovering at 500ft and waiting for clearance to land on June 7, when the crew spotted the UFO hurtling towards them from below."
That was my parts delivery, the sentra doors. Thanks a load for freaking out the delivery men...
I think the real question here is:
"If 0wning a PC is point and click, surely securing said PC should also be"
As for : "surely securing said PC should also be"
---> Looks like the "bad guys" work in teams, internetworking - when is the security industry going to do the same, and release similar tools for end users?
Is this not the proper way for such "SilverSurfers" to fight back ?
@Talking Shop ……
"Is “on the fly” being redefined?"
---> One can only hope.
@couldn't agree more
"The alien, because if the Martians did land they'd think we're pretty stupid for spending hours in front of our PCs answering stupid questionnaires on films."
---> Would "Martians" be laughing at You even before landing?
"A title is required"
"finding the Holy Grail and sheding light on the existence of Jesus' girlfriend"
---> And here I was thinking they were one and the same ;)
"unlocking a huge techno treasure vault stuffed with goodies such as unused wireless spectrum"
<--- Places bid.
"more on the lines of the slightly dodgy-looking blue tinted jobs employed by James Bond in the The World Is Not Enough"
--->Still pushing for red tint, but then again Fuion is no James Bond.
"though fairly short-range unless it could be used mainly in the upper atmosphere"
<--- Waiting for spaceship shuttle/pickup in my front yard...
Rocks in the the street.
---> Math joke.
The nature of this beast
"Head Honchos not Realise the Power of Open Source Networking"
--->In this case failure to realise == failure to capitalise ?
And RedHead because Fuion said: Nothing but the best will do.
@John A Thomson
"doing the needful"
---> Yes, please do the needful.
"Bobby Sands, Dead and buried, but more Alive now than ever."
RE: ResPonSe V
And I quote:
"Such professionalism, such dedication to duty, such is my coat, my hat."
---> Well said.
Perhaps it is not the idea, rather the implementation.
Even the best glue fails with poor application ?
The caveman perspective:
"On Tuesday the UK's electricity network was shaken by the failure of two major power stations within minutes of each other and a further seven succumbed as the day went on."
Abstract = organization, collusion, fear, power, money. I think that sums it up.
That is unless all these "power problems" everywhere, are a coincidence (if there such a thing, "coincidence")?
"Steve Ballmer and Bill Gates this week defended Windows Vista and made noises about the next Microsoft OS, Windows 7. The much-maligned Vista is "not a failure and it's not a mistake.", says Steve."
I think the clear point here is that if you used a closed source OS, you can expect to be forced to upgrade each version as the vendor say - or pay the price. They will stop the security updates, end the life of the project, make new software so you can only run it with the new OS, etc. If you want freedom with OS management, you have to go open source or manage it yourself. I could be wrong, but who is still running 1000x machines with win95?
The US military seems to have begun a secret programme to develop a superior stealth bomber.
I fail to understand how this would at all qualify as "a secret programme" if everyone knows about it. It is funny that we have 12yr old kids who already have the schematics to these "secret" programs, and others are on a web board discussing something they have little to no information on. Ask your children. Talk about "stealth", if it cannot hide from my 12yr old son, it fails the stealth test.
Not content with outlawing our extreme porn, the government is proposing to ban drawings and computer-generated images of child abuse.
I seem to be confused here, is our goal media control - or tracking down child molesters?
It is very simple really = No child molesters = no more child porn produced.
And to think, here our teacher(s) are having sex with our student(s), but we are worried about a cartoon.
And the helicopter because the thing was flying over my hut.
<--Takes out spear.
I say hooray for those who would support further education, as "a little commitment" is a small price that the willing are happy to provide.
And where are the *BSD icons ?
-Mine is a link because of the above.
Datacenter Fusion without the Fuion ?
Why was I not invited to such a place?
With my now clear vision I can see:
Faceparty ---> Smoking Crack
Crack Kills ---> Faceparty Dies
We can all be assured that this "Crack Epidemic" will soon cease to exist.
OK to T's & C's.
If Microsoft want to corner the Search Market, they need only Pay an Endless Fortune to those who can Provide Novel Content which is Endlessly Searched for, the Holiest of Holy Grails.
I could care less if someone knows what I eat for breakfast.
I am more concerned with the quality of my food :)
And it would be quite nice to be able to have an actual place to get real mail at, as I am currently stuck with such a PO box because of my empty cc#
RE:Is there anybody out there?
Is there anybody out there? ---> Am I coming in clear?
Fuion ---> Wonders if WonkaVision is having a malfunction...
"Most people don't change default router password.
If you change your router default Admin password, it's unlikely this idea can be exploited. No outside access required. Only a vulnerable browser and malicious website (Active X anyone?)"
I had a dream, and in that dream:
---> It is currently possible to remote exploit all SOHO routers that employ CMS.
---> Root password is stored inside firmwares such surrounded by cute quotes such as "root --> uid 0 -->The Lamma of all Evil"
---> Whole subnets can be "0wned", someone has forgotten to properly configure the Cisco ACL settings...
---> Even without CMS another tact can be employed to remote exploit without password. Who needs a password(s) when you are not required to use such to get the result.
In short: "Passwords" == overrated.
-=- End DNS Dream -=-
Alien because there is no Daemon icon???
Bush tests "Castro" with mobile phone ;)
If (neo) ---> (cuba) then (http://www.trustedbsd.org/trustyteenie.gif) else (http://www.lclark.edu/faculty/jsmiller/objects/idea_bulb.jpg) ++ (http://silvrique.com/blog/?p=352#comment-18)
Who said Bush was bad guy ?
I would suppose they would reply.
Last time I was watching TV I did notice the show was about to end.
I would guess if a reply was requested, the inital email would have to come before the end of the show.
Less than 24hrs left of this funny show I am watching here...
Can you imagine their reply, or can you imagine that they would even reply [for they are reputedly a somewhat paranoid schizophrenic bunch] Go on, spoil yourself and tell us what you think Intelligence, would do in such an Instance. Run away and hide undercover or Boldly Go and Take to AI like proverbial Ducks to Water?
- On the matter of shooting down Amazon delivery drones with shotguns
- Review Bring Your Own Disks: The Synology DS214 network storage box
- OHM MY GOD! Move over graphene, here comes '100% PERFECT' stanene
- IT MELTDOWN ruins Cyber Monday for RBS, Natwest customers
- Google's new cloud CRUSHES Amazon in RAM battle