Toxus
Toxus
Toxus

Hmm, good idea, I hadn't thought of that. But do the GPIO pins reset when the Pi does a soft reboot? It seems that this does the same as if you simply had a photosensitive switch on it though

But if you're doing it that way, a photosensitive circuit should be the better way to do it then.

You probably wouldn't be able to do this effectively running any of the Linux distributions due to the startup time. (The person you're attempting to catch would be gone by the time it started the siren.) However I could see this working if you had your own Bare Metal operating system on the Pi to do it.

Especially after the Twilight's Hammer cult forced her consort Korialstraz to sacrifice himself. Poor Life-Binder.

I used to use TrueCrypt but I hated the idea of needing a container to store the encrypted files in since I heavily rely on cloud synchronization. Found BoxCryptor and have been using it since :)

Vote: BoxCryptor

I agree with this, I try to get Lossless or if not lossless, at least the highest quality I can, the quality of the file is definitely the weakest link in the chain and can make all the difference. I use normal consumer Bluetooth headphones and they work great for what I need.

I've been having this problem since I bought my console. There were times that we put it in Sleep, then attempted to pull it back out the next morning and had to manually reset the thing. It got better with the last update (not 2.0) in which we were finally able to turn the thing on even in "Rest Mode". Haven't tried

I've been wanting to do this! xD After hearing about "Ok, Google everywhere" I was like, I can't wait... till I can enter a room, say Ok, Google and hear Bloop!

This has existed and preforms the same function. However it only appeared on drives that had System Restore enabled as it made use of Volume Shadow Copies. It did exist, and did not perform a different function, it has just been expanded to allow restoring from File History.

I've run into this a couple times, and the one infection that the client decided to pay for since he had no backups saw us with both a copy of the private key used and his files decrypted. So there must be some honor among thieves.

DDoSing doesn't even remotely count as hacking. It's like hundreds of braindead idiots pressing F5 on a single browser at one time, anyone with enough patience, man (or machine) power, and a button could do it. (They just choose not to.)

I've noticed that it tends to do it alot with downloads from Dropbox's UserContent domain, even if the file is not malicious. I routinely keep certain CD images like ntpasswd and the like up on Dropbox but I think the filename of the archives is what trips it off. If it's like all numbers or random characters possibly?

For some of them, they moved the option to the Downloads page. For example if Chrome says "Chrome has blocked a malicious executable from being downloaded", Hit CTRL+J, goto Downloads and click "Recover Malicious File" then click "Hurt me plenty!" and the file will finish downloading. It is there, just weird.

Since I couldn't edit for some reason.. I have looked at your code portfolio as per your link, so I take back the idea that you're inexperienced as a programmer. However, VB6 and VB.net are not what these were written in. I must admit though, your DX applications are impressive. I hadn't even been able to do DirectX

I forgot this in my previous reply. It may take a single line conditional, but there's other things that you need to take into consideration, such as the code inside that conditional, what variables it changes, what other conditionals and subroutines would be affected by the change?

Alright, So many things are wrong with your comments, so I'll reply to these four from 3:07pm to 3:11pm...

You really have to be inexperienced if you believe it's that simple. Just commenting out one line could have multiple implications. They would need to set variables telling the game the gender, rewrite the localization, etc. (really, Waltfeld has the right idea.)

Recently, I purchased an Apple computer. The computer was sold to me without filters to block out pornography. I was not provided with any warning by Apple that pornography was highly addictive and could alter my reward cycle by the manufacturer. Over time, I began preferring sex with my computer over sex with real

Probably not, but you may be able to do it with Tasker. Make a Variable that is something like WIFI_MORNING and set it to 0. Make a profile that checks for your Wifi connected, have the task check if WIFI_MORNING is 0 or WIFI_MORNING is 1, if 1 don't do anything, if 0 open a URL. then have it set WIFI_MORNING to 0 and