Re: The ONLY things going for it were
ndiswrapper! oh god forgot how that blew my mind!
Its all a matter off perspective.
175 posts • joined 6 Jul 2009
ndiswrapper! oh god forgot how that blew my mind!
Its all a matter off perspective.
LIE!, win95 didnt boot that fast.
For most off the chinese these ARE thier laptops...so yes.
"Only one problem: what you say about robots can be said about humans, too! It's a dilemma: you need a means to defend yourself, but what's to stop the means of defending yourself being used to usurp you instead?"
In a Democracy HUMANS are you!
"however, the password and the user name are hardcoded and are not changeable.
"Like bionetric fingerprints.
So very realistic then.
1 well yes.
1b/c ...anyone who lets the PC get pwned wont be doing this.
2 3 4 5.....irrelivant, youre using dev tools.
[I] Success[FULLY BUILT MY FIRST PIECE AT ABOUT ]the fourth attempt, a failure rate that [KEPT IKEA IN] business. Problems on early attempts included [ME] breaking some parts.
Wow could you sideload apps? this would be great for offline authenticator.
in fact what is the longest offline phone battery life on a small phone.
isnt that too many black holes.
85% black holes?
You wouldn't be able to move for the buggers(in a very literal way)
Im an ocrams razor guy but i think the test-tube jugglers have missed somthing really obvious and its to do with the Lyman-alpha forest.
That applies to smaller 30kWh batteries but this truck apparently has as much as 1000kWh
Basically it will consume any and all breaking energy tesla throws at it.
Good intentions, bad execution.
Im just about to exit this phone.
1)their choice off gorilla glass was great but then cutting a hole in it and leaving the burred edge exposed was ultimately going to result in a cracked screen. 3 days into ownership.
2)making the battery removable but not selling a replacement battery......What can I say!!!
3)Made worse by the fact only special deep usb connector would stay in securely. Many a late wakeup has been the result, and dieing 5 minutes before a motorway junction as the usb connector had come free was my last issue(1 hr late into a new office)
4)changing the boot screen from black to white, meaning i now needed 5% charge before I could turn on the phone as the boot process drained so much power it powered straight off again.
It wasnt me!
...yep the network band with, cpu cycles and storage space.
thier personal cloud...partially on your machine.
or part off a botnet that will never get swatted. remember this is INVISIBLE to the os.
There could be infection out there as we speak, if they keep thier cpu load low nowbody will ever know.
An undectectable, full admin,network able, reinstall proof, full access bug,
All this is missing is remote injection.......Currently...i suspect badusb will get recruited for that duty somhow,
and remember, if your machine is comprised in another way the firmware could be rolled back.
Fool me once, shame on you; fool me twice, I'll sue you for breach off NDA
This is bad right?
They get your processor and your network cards.........
a hardware level exploit that can communicate with the outside world!
could this be combined with badusb?
As an admin, Might be facilitation.
and that can be trumped up to equal to each offence comitted.....
Elon musk suggest no law should ever have an eternal term.
I thought thats stupid...
Now im not so sure..
So thiers nothing three contracts here.
the GPLv2, the modified GRSEC patch contract and the Gr sec supply contract.
The issue is the supply contract is supplied with the caveat that it will end WHEN you distribute the patch.
But it cannot end before then, if you say im going to take this patch and distribute it, they STILL have to give it to you. So the patch contract does not prevent you distributing it.
If the supply contract works otherwise, it inhibits GPLv2
Of course you could argue that the fact you have a contract with and end date. that can be cancelled before hand is an inhibiting factor.
Think this may come down to what the definition of future business.
Are contracted but unfulfilled future patches classed as future business? im pretty sure its not ,being agreed in the past.
I take it nobody is distibuting these patched kernels? cant see that being possible under the two agreements.
you Forgot your'e pedents' coat .
This is a variation Of what I do, except its simpler and done in my head.
To get my (for example)Bank password the need to.
A)get my bank hash and guesstimate an apparently random 11+ digit password.
1.get at least two other sets off hashes, (they prob have my old yahoo and linked in )
2. guesstimate two different apparently random 11+ digit password,
3. take those two passwords and try and work out what my "internal algorithm"
4. Find my banking username and generate my bank password.
5. do this before my rolling password resets complete(About 2 years)
remember related but not the same is as far as hashing is concerned completely different.
The way I see it I trust NO-ONE with my hashes now and assume them all vulnerable to guestimating.
so if A) is "secure enough" for me then the B step 2 x B step 2 difficulty is secure enough for me.
Remeber you cant outrun the (fancy)bear, you just need to outrun the other internet users.
(eg your password just needs to be hard enough to take too long to guesstimate, and as your banking password only need to be twice as hard to crack just make it ONE digit longer)
Im going to have spend millions spinnning up production..are you sure?
And you will buy it?
Ok that will be £500.
Wha...I have to actully pay for it....I mean if it was free id defo have one...but PAY for it!
Thats why KS works....it full off amazing ideas that i would back...if only i didnt have to risk any money.
Dont you mean a Vauxhaull chavelier.
Thats your opinion....it may be based on fact....but it wrong.
Because data shows they don't end up where you say. Either statistically or actually.
What this Drumpf thing....is it an insult....the Man comes with built in insult in his name.
Trump.....to release gas containing minute excrement particles......aka a stinky little shit.
Did you use the right gallon?
Or hthey didnt......or Poes Law?
Couldn't you just ask the defendant after you coach them.
"What your opinion of the evidence against you."
Def:"the IPA section 55 prevents me from answering this question truthfully"
In fact you could USE this as a defence even in cases where there are no evidence collected under IPA since denial that it was collected under IPA cant be gurenteed to be true DUE TO THIS LAW.
Once somebody gets off by answering this. I could see this law being removed pretty sharpish.
That was my though....What else IS bitlocker for?
If you cant afford iStuff.....you cant afford this.
And who pays 300$ for pictures off stuff YOU ALREADY OWN....
Here's an idea , (a bit mad) sign up pages should log in to your email address using the password you give them, if it succeeds then reject the password. Should negate the largest risk factor resulting from a breach, others getting into your email account.
David davis is a True Liberal.
Both in markets...(making him far right)
and Rights...(which is why he voted againts 90 days)
So not at all unexpected
Estimates are that Humans are releasing the carbon that took a million years to lay down in ONE year......if that not a big enough number for you.
I got paid in ££ .Which now have dropped 15% in value in an eye blink.
that like saying i dont trust these new fangled cars with thier immobilsers and double shielded locks, because off this:-
Symform! that is all.
Meh businesses will move to Edinburgh A city in the UK, UE Member
Which should become...
Edinburgh Capital of The Kingdom Of Scotland. EU member
Its actully in the intel chipset!
Stupid design...keeping me in a job since Windows 95.
Its called ....THA FUCHAAAA
Where can I buy that t-shirt?
Fibre FIBRE....phew got that out of my system..pub time
You can RE plug a recognised one back in, but not add one.
theres a hand held you can buy in version from £30 to £500 connect to a TV remotely(think its called casting.)
Comes with as many games want(size restictions apply)
Apparently you can make phone calls with it too.
"The best suggestion I've seen for finding out who's linking to your content is simply to ask Google."
Google strenth is in indexing references and links to sites and comparing who has the most/best.
your search results are driven by this information.
thier ads ride off the back off your searches
thier revenue comes from ads
If the web effectively did this by itself...it could distroy the root of thier power.
Biting the hand that feeds IT © 1998–2018