Comment Re:residents in (Score -1) 249
Starting Score: 1 point
Moderation 0
50% Flamebait
50% Funny
Extra 'Flamebait' Modifier +6 (Edit)
Karma-Bonus Modifier +1 (Edit)
Total Score: 5
slashdot = stagnated
Starting Score: 1 point
Moderation 0
50% Flamebait
50% Funny
Extra 'Flamebait' Modifier +6 (Edit)
Karma-Bonus Modifier +1 (Edit)
Total Score: 5
slashdot = stagnated
what would you call the act of dispersal of a fart in a room? how about the dispersal of lipophilic compounds in oil?
ur mum's face is a shovel, idiot.
you are NOTHING
i do really have exact ideas about the n1 architecture, battery technology, and the native flash environment implementation, and the implied extra layer necessary to do the interpreting.
i also really have many exact ideas about the implementation of applications in flash not being optimal relative to latency, cpu usage, and battery life, compared with a native app capable of recreating any interface flash is capable of. why let the developer shoot themselves in the foot just because they think different about shooting themselves?
maybe you should have one of those ideas.
you are NOTHING.
there is the one way about it when backward compatibility is achieved through the application of emulation and virtualization... but that would make you the fucking idiot.
you're an anonymous coward. ur mum's face is no other way about it.
you are NOTHING
Why reinvent the wheel?
yeah, why reinvent web search when altavista and webcrawler dominate the market?
the implication that someone might expect or hope that flash would go away, thus requiring the claimed reasons why it would not.
i'd rather if the article author and slashdot editors would go away.
save for theoretical quantum encryption, there is always the potential for a MITM attack. ALWAYS.
using a 3rd party is only effective as it is an order of magnitude more difficult to middle both connections simultaneously... theoretically if you could do that, you either have access to sniff the whole internet or the 3rd party's local network or the local networks of both ends... if you already have that level of access, it's already game over. do you trust the tumbler lock on your front door, or do you nail boards over the door and barricade it with a boulder every night?
i have a legal freeware program that sniffs wireless networks to analyze them for quality of service. this will include pieces of unencrypted IP packet data. google recently used similar tools and accidentally obtained sensitive data.
add on top of SSL pre-defined challenge questions, and a message or image defined by the user and presented by the service and you've got the same level of protection as a valid SSL certificate. combining them helps even more, but there are still attack vectors.
You miss the point of this entirely. Prohibition of blasphemy is a rule you set up for the members of *your* faith only, not for others. Trying to impose your rules over people who have not signed up for your religion has to be called on.
and that works fine until your "sheep" start asking why "God" only applies to an arbitrary land border.
if you truly believe "God" is real, it is hypocritical to not assume his word applies everywhere.
so you're calling them on it... when they have nuclear weapons... to the end of what? fighting a nuclear war over someone asking you not to provide to their countrymen images of a "God" you wouldn't even know to defame if they didn't define him to you? defaming their "God", if anything, is no more than an acknowledgment of your fear of that "God"... otherwise, what is the point? because you can? they CAN detonate nuclear bombs, and they're more likely to do so the more you exercise your rights to provoke them.
I waste time compiling the email list
ok... yes, i suppose you did, lady. are all women as smart as you?
no woman in my family presents herself as a man, because no woman in my family is a nutcase, and only a nutcase woman would present herself as a man named "tom".
you are pathetic. hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca, hudson@videotron.ca
C++ is the best example of second-system effect since OS/360.