This is a serious poll
#52
Posted 09 September 2006 - 09:26 AM
Its like what happens when you cross a phoenix with a super black hole; it's powerful enough to destroy itself, only to be reborn in a vicious cycle of torment and pain. Or in this case, nonsense.
-Avatara, on the life cycle of ATT.
Dude, imagine Redline Trash Talk; the unholy spawn of B&B and ATT.
-ephrin
Will not get involved in a creation/evolution debate.
We're being overrun!
#54
Posted 09 September 2006 - 12:35 PM
#55
Posted 09 September 2006 - 02:57 PM
Its like what happens when you cross a phoenix with a super black hole; it's powerful enough to destroy itself, only to be reborn in a vicious cycle of torment and pain. Or in this case, nonsense.
-Avatara, on the life cycle of ATT.
Dude, imagine Redline Trash Talk; the unholy spawn of B&B and ATT.
-ephrin
Will not get involved in a creation/evolution debate.
We're being overrun!
#57
Posted 09 September 2006 - 07:24 PM
(x)enos. Awesome in a can. Without the can, though.
#59
Posted 09 September 2006 - 09:46 PM
However, you have to watch out for something if you do that.
There are people that build snowmen on hydrants because people hit snowmen with cars.
Its like what happens when you cross a phoenix with a super black hole; it's powerful enough to destroy itself, only to be reborn in a vicious cycle of torment and pain. Or in this case, nonsense.
-Avatara, on the life cycle of ATT.
Dude, imagine Redline Trash Talk; the unholy spawn of B&B and ATT.
-ephrin
Will not get involved in a creation/evolution debate.
We're being overrun!
#61
Posted 11 September 2006 - 12:04 AM
(x)enos. Awesome in a can. Without the can, though.
#62
Posted 11 September 2006 - 08:31 AM
-- Tom Sims
Never take life seriously. Nobody gets out alive anyway.
#63
Posted 11 September 2006 - 09:09 PM
Its like what happens when you cross a phoenix with a super black hole; it's powerful enough to destroy itself, only to be reborn in a vicious cycle of torment and pain. Or in this case, nonsense.
-Avatara, on the life cycle of ATT.
Dude, imagine Redline Trash Talk; the unholy spawn of B&B and ATT.
-ephrin
Will not get involved in a creation/evolution debate.
We're being overrun!
#65
Posted 11 September 2006 - 10:59 PM
Runtime libraries (aka DLLs/SOs)... those are files of code that are meant to be used by programs. The program can be made smaller because the library has a lot of the code it needs. Most distributions of Linux use the same runtime libraries, with the same vulnerabilities. Run a maliciously formed piece of code through them, and you get a buffer overflow (always bad). From there, the next piece of code the system executes is anything the hacker chooses... like a spyware installler.
By default, programs are compiled to use these libraries, so they use the same code with the same insecurities as the rest of us.
Or they could have a safeguard against your defense mechanism, which then proceeds to scare them off because you could have several other things lurking in your system that they weren't expecting...
And the moral of the story is... put teeth in your services, and people won't try to break them.
This post has been edited by The Apple Cøre: 11 September 2006 - 11:02 PM
Its like what happens when you cross a phoenix with a super black hole; it's powerful enough to destroy itself, only to be reborn in a vicious cycle of torment and pain. Or in this case, nonsense.
-Avatara, on the life cycle of ATT.
Dude, imagine Redline Trash Talk; the unholy spawn of B&B and ATT.
-ephrin
Will not get involved in a creation/evolution debate.
We're being overrun!
#66
Posted 11 September 2006 - 11:09 PM
The Apple Cøre, on Sep 11 2006, 09:59 PM, said:
Runtime libraries (aka DLLs/SOs)... those are files of code that are meant to be used by programs. The program can be made smaller because the library has a lot of the code it needs. Most distributions of Linux use the same runtime libraries, with the same vulnerabilities. Run a maliciously formed piece of code through them, and you get a buffer overflow (always bad). From there, the next piece of code the system executes is anything the hacker chooses... like a spyware installler.
By default, programs are compiled to use these libraries, so they use the same code with the same insecurities as the rest of us.
Or they could have a safeguard against your defense mechanism, which then proceeds to scare them off because you could have several other things lurking in your system that they weren't expecting...
And the moral of the story is... put teeth in your services, and people won't try to break them.
And don't make your password "aardvark"
#70
Posted 12 September 2006 - 04:03 AM
-- Tom Sims
Never take life seriously. Nobody gets out alive anyway.
#73
Posted 12 September 2006 - 09:05 PM
Now (10 seconds later) that I think of it, I don't know what it sounds like. Maybe this?
Its like what happens when you cross a phoenix with a super black hole; it's powerful enough to destroy itself, only to be reborn in a vicious cycle of torment and pain. Or in this case, nonsense.
-Avatara, on the life cycle of ATT.
Dude, imagine Redline Trash Talk; the unholy spawn of B&B and ATT.
-ephrin
Will not get involved in a creation/evolution debate.
We're being overrun!
#75
Posted 12 September 2006 - 11:59 PM
Yay! Yippee! Yahoo! Cactus! Bread! Lemur!
-Pufer