Should be jamming their banks of modems that do financial transactions. You know, to actually do some real damage to their targets.
Should be jamming their banks of modems that do financial transactions. You know, to actually do some real damage to their targets.
@theorieofself: Chomsky rules. Very insightful. Thanks!
Wow, a PC for a controller. I thought maybe an arduino board or two. That's rad.
Rosa, nipples get to do whatever they want. Duh.
Now you don't have to watch that weird CG hand stroke people for two minutes to see this weird lady smile.
That robot has one hell of a beer hat.
So real or not?!?!?
@eddiemonster: my MD5 checksum is on the list... Booo! I had to change mine and now I will be changing that same u/n p/w combination on all my low level security sites.... :-( Oh well.
@im2fools: AWESOME!
@cmdrfire: Makes sense! Thanks!
@eddiemonster: Great information. I can't trust the Gawker infrastructure after reading your post.
@Jason Chen: Hi Jason! Thanks! You might want to suggest we change our passwords to "throw away" ones in case the information can still be compromised. Much appreciated!
How was the information taken? How do I know my new password won't be compromised in the same way?
"Worm farm." Both disgusting and hilarious... Coaxing out worms with a ham hock. Fucking great.
@Sumada: Sure, I'll be sure to do that in the future. I just didn't think it was NSFW...
@cmdrfire: Interesting... So none of the product can sit at any of the stages in the process? I know there's chemical reactions and etching involved, but other than that I'm clueless in the actual chip creation process.
Unfortunately, this will probably not happen. As others have stated this could only be successful if:
Woz knoz what's up.
The power brick is almost as big as it!
@BlueBeard: OK, sure, but so is Wikileaks. ;-)