|
|
|
|
|
|
There are no conversations. |
|
|
cauz |
March 18, 2014, 11:15 p.m. |
|
|
|
Scott Adams |
The best plan now is to have as many bosses as possible. I call it boss diversity. If you work for a company and you have one boss and that boss doesn't like you or wants to get rid of you, you're in trouble. But if you work for yourself, you have lots of bosses, who are your customers, and if a few of them decide they don't like you, that's okay. |
Andrew Card |
The Oval Office symbolizes... the Constitution, the hopes and dreams, and I'm going to say democracy. And when you have a dress code in the Supreme Court and a dress code on the floor of the Senate, floor of the House, I think it's appropriate to have an expectation that there will be a dress code that respects the office of the President. |
Mike Ferguson |
Very few pilots even know how to read Morse code anymore. But if a pilot could read Morse code, he could tell which beacon he was approaching by the code that was flashing from it. |
Sebastian Faulks |
Bond doesn't have an inner life. There would be moments when I'd think, 'We need to gather our thoughts here and have a breather,' where in another novel you'd slow the pace, have some description and see what Bond feels about this. But Bond doesn't reflect. All you can do is move on to the next bomb or shark or car. |
Ambrose Bierce |
Edible, adj.: Good to eat, and wholesome to digest, as a worm to a toad, a toad to a snake, a snake to a pig, a pig to a man, and a man to a worm. |
Robert Davi |
As a kid, you either wanted to play Bond or a Bond villain. Ask any of my friends in entertainment, whether they are actors or writers or producers or directors, and they will tell you that they'd love to play a Bond baddie. I can go anywhere in the world and I am known; it put me on the international map. |
George S. Patton |
Nobody ever defended anything successfully, there is only attack and attack and attack some more. |
Darrell Issa |
Every ISP is being attacked, maliciously both from in the United States and outside of the United States, by those who want to invade people's privacy. But more importantly they want to take control of computers, they want to hack them, they want to steal information. |
Richard Hammond |
No action hero is more closely associated with cars than James Bond. |
Marilyn Manson |
When I was stalking my special lady friend on MySpace, people would always say, 'Is this really Marilyn Manson or some kind of psycho?' And I'm like, 'Both.' |
|
|
Venezuelan President Survives Drone Assassination Attempt
The Venezuelan president, Nicolas Maduro, has survived an apparent assassination attempt involving drones that exploded close to him while he was speaking at an event in Caracas. State television showed Maduro abruptly cutting short his speech during a celebration of the National Guard's 81st anniversary. From a report: In a tweet, the president of Venezuela's National Assembly, Diosdado Cabello, called the incident at the military parade a "terrorist attack against the president and the high military command blaming the opposition for the violence." Venezuela's international government broadcaster, TeleSUR, said on Twitter that th...
|
|
|
|
worker bees can leave/even drones can fly away/the queen is their slave
|
|
|
|
they dont have to know how the code works, but if their the ones picking the language they should understand how it works because theyre imposing it on people who DO understand it. it would be like if i told you to code a youtube video creator and uploader but I found this REALLY AWESOME software that is VERY flexible and its so AWESOME, its called PHP. Now can you please code a program that works with cmd ffmpeg and automagically uploads videos
This post is a comment.
|
|
|
|
The software then checks to see if it can get on the Internet. If it can, it attempts to visit either http://www.mypremierfutbol.com or http://www.todaysfutbol.com . At the time, these servers were in Malaysia and Denmark. It opens an encrypted link and tells these servers that it has succeeded in owning a new PC. The worm then automatically updates itself with the newest version.
At this point, the worm makes copies of itself to any other USB sticks you happen to plug in. It does this by installing a carefully designed but fake disk driver. This driver was digitally signed by Realtek, which means that the authors of the worm were somehow able to break into the most secure location in a huge Taiwanese company, and steal the most secret key that this company owns, without Realtek finding ou...
This post is a comment.
|
|
|
|
What's the Most Sophisticated Piece of Software Ever Written?
An anonymous reader writes: Stuxnet is the most sophisticated piece of software ever written, given the difficulty of the objective: Deny Iran's efforts to obtain weapons grade uranium without need for diplomacy or use of force, John Byrd, CEO of Gigantic Software (formerly Director of Sega and SPM at EA), argues in a blog post, which is being widely shared in developer circles, with most agreeing with Byrd's conclusion.
He writes...
|
|
|
|
Thanks for talking shit about my favorite American folk hero.
This post is a comment.
|
|
|
|
rumor has it that before the company was founded, my boss was hacking some shit and selling it. help me find out what lol
|
|
|
|
Scientists Have Discovered a Shape That Blocks All Sound
Scientists have developed an "acoustic meta-material" that can catch certain frequencies passing through the air and reflect them back toward their source. When a loudspeaker was placed into one end of a PVC pipe with a 3D-printed ring of the metamaterial, the ring "cut 94% of the sound blasting from the speaker, enough to make it inaudible to the human ear," reports Fast Company. From the report: Typical acoustic paneling works differently, absorbing sound and turning the vibrations into heat. But what's particularly trippy is that this muffler is completely open. Air and light can travel through it -- just sound cannot. The implica...
|
|
|
|
yeah but science has developed way farther than you see. like self driving cars are now commercial and a robot is a saudi citizen, if the militarys technology is even double our modern tech then where could they be at. (it is said that military technology is significantly more than double advanced as what we have accesss to)/
its not like its something that is available to the public. if it exists it would be highly secret and classified. if we can clone a sheep, store info in dna, send probes to mars, utilize deep learning, and have quantum computing breakthroughs - im sure theres way crazier stuff we will never hear of already in play. ...
This post is a comment.
|
|
|
|
Hacker Steals $30 Million Worth of Ethereum From Parity Multi-Sig Wallets
An unknown hacker has used a vulnerability in an Ethereum wallet client to steal over 153,000 Ether, worth over $30 million dollars. The hack was possible due to a flaw in the Parity Ethereum client. The vulnerability allowed the hacker to exfiltrate funds from multi-sig wallets created with Parity clients 1.5 and later. Parity 1.5 was released on January 19, 2017. The attack took place around 19:00-20:00 UTC and was immediately spotted by Parity, a company founded by Gavin Wood, Ethereum's founder. The company issued a security alert on its blog. The Ether stolen from Parity multi-sig accounts was transferred into this Ethereum wallet, currently holding 153,017.021336727 Ether. Because Parity spotted the attack i...
|
|