|
We don't need no stinking underpants.
|
|
|
|
|
Then don't make them stinky
But that's the first step to profit! (Step 3 is profit)
Or was that a "Britches? We don't need no stinking britches"?
--------------
TTFN - Kent
|
|
|
|
|
3.Appropriation: To take to one's self in exclusion of others
I don't sleep with stinking britches!
|
|
|
|
|
John McAfee lived up to his reputation Saturday as tech's most popular wild child, electrifying an audience with new details of his plan to thwart the NSA's surveillance of ordinary Americans with an inexpensive, pocket-size gadget. And by "reveals details", they mean "pre-announced something that might never be built"
|
|
|
|
|
Does the solution to secure instant messaging from prying eyes lie in how torrents work? BitTorrent thinks it might, and is testing out a server-free messaging system. don't Assuming in you mind order coming random message
|
|
|
|
|
Millions of pieces of malware and thousands of malicious hacker gangs roam today's online world preying on easy dupes. Reusing the same tactics that have worked for years, if not decades, they do nothing new or interesting in exploiting our laziness, lapses in judgment, or plain idiocy. Respect yourself, protect yourself
|
|
|
|
|
Microsoft handed out nearly $60 million in stock grants to eight executives on the same day it filed papers with the U.S. Securities and Exchange Commission (SEC) announcing that the board had authorized special incentives to keep senior management from jumping ship. "How ya gonna keep 'em down on the farm?"
|
|
|
|
|
Your resume can do as much harm as good when you're hunting for a new IT job. Over 50 years experience with .NET!
|
|
|
|
|
Quote: 5. Listing work experience in descending order. I found it hard to match the explanation with the definition of "Descending". The way I understand descending is from recent year to early year. And I don't know how it affect your resume.Correct me if I'm wrong.
|
|
|
|
|
6. Giving any credibility to Information Leak.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Looks like it's more the "resume advice guy" definition of descending versus the programmer/DBA definition of descending. In other words, it should be as the explanation describes: most recent job first.
I'm guessing that some people in this case view descending as "starting with the earliest", which would be wrong (and dumb, IMO).
--------------
TTFN - Kent
|
|
|
|
|
Have you ever churned out fairly extensive code, then returned to it many years later? Did you like what you saw? Never look at old code, just rewrite it
|
|
|
|
|
|
joke:
(noun) a thing that someone says to cause amusement or laughter, esp. a story with a funny punchline.
(verb) make jokes; talk humorously or flippantly.
Perhaps, not clearly enough
--------------
TTFN - Kent
|
|
|
|
|
Iris recognition finally seems ready to break into the mainstream. "You'll shoot your eye out, kid."
|
|
|
|
|
Create engaging, interactive HTML5-based designs and motion graphics that can run on any device. Welcome back, Frontpage
|
|
|
|
|
Technology can enable us reach out to people in ways that were never possible before, but at the same time, it is also extremely capable of bringing out the absolute worst of humanity as well. Smart phones, dumb people?
|
|
|
|
|
The UK is to create a new cyber unit to help defend national security, the defence secretary has announced. They're trying to stop people cybering?
|
|
|
|
|
Cyber-man, Cyber-man, does whatever a cyber can.
|
|
|
|
|
Respected analyst firm Gartner is set to recommend that all BlackBerry enterprise customers find alternatives to the struggling vendor's smartphones and enterprise management software over the next six months. IT Shops to Gartner: 'No Duh'
|
|
|
|
|
At the same time Gartner is selling fud by arguing that anyone still using Dingleberries needs to create a 6 month plan to migrate off them. Even assuming RIM's buyer begins immediately dismembering the zombie it bought revenue from BES is one of the few income streams it has left and will end up being sold to someone who'll suck every last drop of the dieing cash cow. The bigger threat's at least a year out when new Dingleberry phones would stop being available; but the simple failure to sell well means that the existing inventory of junk will be around for a long time.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Microsoft received 37,196 global requests for user data from law enforcement agencies during the first six months of 2013. The company revealed the figure today in its second Law Enforcement Requests Report. (Its first came in March.) The requests, which factor in all Microsoft services including Skype, involved a total of 66,539 accounts. "As with the 2012 report this new data shows that across our services only a tiny fraction of accounts, less that 0.01 percent are ever affected by law enforcement requests for customer data," the company says. But like last year, a vast majority of those inquiries came from the United States. Isn't it nice to know you're loved?
|
|
|
|
|
Java was the most targeted development platform for exploit attacks during the first half of the year, and attacks have increasingly shifted to zero-day vulnerabilities, according to F-Secure's new threat report. I'm shocked. SHOCKED!
|
|
|
|
|
Quote: "Of the top five most targeted vulnerabilities, four are found in the Java development, either the Runtime Environment (JRE) or the browser plug-in,
Would it be too much to give a breakdown between PRF and plugin exploit levels? I, and AFAIK a lot of other people, were of the opinion that all that was really needed was to boot the plug in. THis is implying otherwise so I'd really like more information on it.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
So Java is one of the most common languages in corporate web solutions, especially when you add in the JVM based non-Java technologies, and it is one of the most targeted points for hackers. Shocking isn't it!
This, I fear, is the same story as Window targeted viruses, of course there's more as there are more targets to exploit. It is nothing to do with the technology, but everything to do with the ubiquity.
speramus in juniperus
|
|
|
|