@kettlewhistle: Prepare for yet another of my long replies...
@kettlewhistle: Prepare for yet another of my long replies...
This is a fun thread. Enough with the RAM vs HDD analogies though, we all know them. Let me toss out some more obscure (but commonly asked about) topics and see what people can come up with.
@Moe Kalbouneh: Good catch, I was ranting about how so many technological terms already have apt metaphors built-in and should be self explanatory, but I totally forgot about Trojan Horses.
I feel for you dude. Been there my self.
I think some of the best analogies are already common knowledge, yet people are still to thick-skulled to let the term sink in.
People are such whimps. Use a hot, wet towel (around 130° F). Apply for 1 minute to the face and shave. No shaving cream needed, and you'll get a very smooth shave.
It should be known I don't work in consumer sales. I deal with other dealers, and they all know the game. It's not like I'm taking advantage of your grandmother at a store.
I think the major problem with sales negotiations is that for many, their first experience with sales puts them in a position where they can't negotiate. People trained in retail are notorious for this. If they come down any on a price, they're at risk of being fired. If they tell a prospective customer to "get…
@shwnchr: That was my intent. But you're right, the last sentence was all I needed to make my point.
Unknown Friend requests are also sometimes escort services. They ask to chat privately on another service, you get a quote and so on...
@exoren22: Phone charms... Wine Charms. I'll just file it under "Things no straight man would ever consider buying".
The lack of competition is troubling, I love Google, but it would be nice to see them with a formidable rival. The microsoft monopoly is nothing compared to the Google Empire.
Agreed
I'm still waiting for a good PM3.HD clone to be ported over. Until then I'm sticking with XBMC.
@1112:
@Nick Benthem: If you're talking about malware that uses and explicit reference to "Guest", than yeah it could slow it down. But guest isn't an Admin level account. It's more likely that malware would try "Administrator" first. Usernames can also be compromised via other routes. Least effective would simply be…
@JonathonW: There are other possibilities, such as a remotely loaded script that when executed compromises other usernames and passwords via the guest account. But to do so requires more work than other means, and changes to accounts from guest like "control userpasswords2" to change other passwords doesn't work if…