Tristan-I
Tristan
Tristan-I

You have a lot more control than just trying. Just trying isn’t gonna lead to success. If you apply for colleges, you still may not get accepted. It’s up to you to create a scenario that succeeds. I know plenty of people who are “job hunting” and when you actually watch them do it, they are filling out applications,

I don’t like the complex constructs we assemble to forgive ourselves for failure. Failure happens, and it’s not a big deal (unless it is, at which point you prolly should have taken a more conservative approach to the larger problem).

No, it wasn’t... It was the NeXT operating system, rebranded. The NeXT operating system was a UNIX operating system based off of the Mach Kernel, using components of FreeBSD. Didn’t you read my last comment?

OS X isn’t BSD. It is based off of the Mach kernel, which is a unix kernel that developed separately from BSD. OS X uses the networking stack, POSIX API, filesystem, and a few other subsystems from FreeBSD. FreeBSD uses the Virtual Memory management system from Mach, so I guess it’s all even.

“vicious enough to break through Apple’s legendary security”

So, uh, what exactly is the benefit? Instead of playing video games in front of your big TV on your comfy couch, you get to play video games on your tiny laptop on your kitchen table?

Hands down, the Nespresso is one of the most costly, wasteful, and low quality way to make an espresso at home. Sure, the machine is on a deep discount right now, but at almost a dollar each for the capsules, you’re still spending 3-10x as much as you would with a regular coffee machine.

Hands down, the Nespresso is one of the most costly, wasteful, and low quality way to make an espresso at home.

This works for a shallow fry, a deep fry would likely cause a splash.

It would be an interesting twist to turn Bruce into Batwoman’s Robin.

Physical access isn’t necessary. An adequately compromised system will give up it’s passwords. You are assuming that a hacker is going to take the hard way. The easy way is to compromise the system, wait for the user to unlock it, then access it normally. Unless you are breaking out your two factor authentication

My main concern with a password manager is that it’s a neat an organized list of every single password you use. If it gets compromised, then everything is compromised. It’s a very large single point of failure.

That is sorta what I was thinking of. I think it’s important to actually penetrate. With the right trajectory, you could chuck a single piece of garbage into the sun and it’d burn up, but that wouldn’t be very fun, would it?

If you think that common sense will protect you better than an antivirus, you have none.

Let’s put math to a more important question. If we launched a garbage barge directly into the sun, how big would it have to be to actually penetrate the sun. Corollary: How big of a rocket would it take to launch the barge out of earth’s atmosphere?

It is unfortunate that the actual templates aren’t available, and it says “Basically, figure it out” (paraphrasing).

If your interpreted code crashes, you’ll crash the interpreter. The only way it’ll crash your operating system (Remember, every OS has a “Blue Screen”) is if it interacts with the kernel in a way which puts the kernel in a state that it isn’t designed to be in.

I expect that many folks who try this will end up with some pretty ugly looking plated silver dinner knives.

You are incorrect.

All operating systems have a “Blue Screen”. In linux, BSD, and OSX it’s called a “Kernel Panic”. It happens when hardware acts in a manner that the software is unable to deal with. It is usually caused by faulty hardware or poorly written device drivers.

My parents had two sets of kids, about 10 years apart. After my brothers and I moved out, our Aunt died and my parents adopted her two children as well, so it was a pretty full house. I had my computer set up in the utility room because there wasn’t any other space.