Viewing 15 posts - 946 through 960 (of 1,053 total)
I always thought that 2 months rule was an outrageously self serving marketing ploy. Seriously the price of a ring might better be put to down payment on a house...
August 9, 2006 at 8:08 am
our plant has UPS (a room full of batteries on racks) and a generator. Alas a while back a battery blew in the UPS room when power went out and...
July 31, 2006 at 9:25 am
Hell yes, I wear lots of hats (this morning working on a script engine failure in IIS) and in the overall it's not a bad thing (though sometimes overwhelming). Flexibility...
July 31, 2006 at 7:26 am
Portability is a mixed goal.
It eventually worked with c, and later c++ because the languages was designed to be a fully functional (pun?) method or expression, even with structured...
July 26, 2006 at 12:22 pm
The problem is, though that while this might be a problem in a corporate environment, it is valuable in the personal computer world. The whining of administrators (instead of working...
July 25, 2006 at 7:02 am
Shoot. One thing MS does RIGHT and it gets PULLED!
Giving people the option to actually protect their data and there is all this whining about what happens to users who...
July 24, 2006 at 7:00 am
Actually Bruce is opposed to wide scale (such as government) key escrow which expects immediate access to one of millions of copies of an application. There is not such a...
July 13, 2006 at 6:53 am
Consider TrueCrypt
It's free, open sourced (VERY valuable characteristic for encryption software), allows file/device keying in addtion to password keying, as well as completely hiddend data stores within virtual directories (plausible...
July 13, 2006 at 6:41 am
While the list idea is not bad, it should not dominate. Some of the most interesting and rewarding opportunities in life come up unbidden, often just once ... the real mistake...
July 11, 2006 at 8:24 am
hmmm....
I guess trying to phone for a taxi from the bar might cause problems ![]()
July 10, 2006 at 6:37 am
Alas a blackberry can be erased in seconds.
A HD cannot.
My blackberry doesn't even need a remote kill command. 5 unsuccessful password attempts will wipe it.
July 7, 2006 at 7:49 am
Primarily for the exponential notation capacity to represent the costs![]()
July 6, 2006 at 6:54 am
In these cases the criminals would just move the hard drive to another machine, boot that machine and access the data from another machine. They could even brute force the...
July 6, 2006 at 6:50 am
When we have massive government agencies that silently ignore legal restrictions when inconvenient, I'm not sure that this will be more than feel good window dressing.
June 26, 2006 at 9:18 am
Viewing 15 posts - 946 through 960 (of 1,053 total)