Probably just has to drool into the collection jar considering how much time these guys spend sucking themselves off.
An early bird in the hand gets the low hanging fruit in the bush.
Probably just has to drool into the collection jar considering how much time these guys spend sucking themselves off.
Strong entry for an Ig Nobel Prize if nothing else.
Turns out this was all due to a clerical error in the contract back when the system was built: instead of UN Secure Information Access, they got Unsecure Information Access.
But if I probe a deer, they say I’m a deviant and put me on a list. Bullshit double standard.
I use a fine spray bottle for this fight instead. I mist where OP missed.
If you want to see someone who really deserves that title, check out Brendan O’Connor’s talk about the CreepyDOL project at DEFCON 21. Nice reminder of how much information most of us are leaking in the RF spectrum for anybody interested in listening and piecing things together.
And the side project authored by Chuck Tingle:
Sort of like how after you walk off a cliff, you don’t start falling until you look down.
Years are set as 360 day intervals. A month has 30 days, no more, no fewer. That’s 5 6-day weeks (and “hump day” can get humped) per month. Typical work schedules are 2 days on, 1 day off or 4 on, 2 off. Major holidays are on days 0, 90, 180 and 270. 45, 135, 225 and 315 are not federally-recognized holidays but people still tend to mark the occasion with a nice family dinner or by visiting with friends.
All leftover time not accounted for with this system is allocated to dogs since they don’t live long enough under the current rules.
Sounds like A Nice Morning Drive. As noted in the archived page above, that story inspired the song Red Barchetta by the band Rush.
Sounds like Facebook’s going to get some new features.
It’s a reference to this scene from Star Trek IV: The Voyage Home (1986).
Scotty, having traveled back in time to the year 1986 as part of a mission to rescue some whales, attempts to use a computer by speaking to it and then mistakenly tries to use the mouse as a microphone when the machine does not respond. He is prompted to use the keyboard instead of verbal commands and gives information on how to manufacture transparent aluminum. This material was not invented until about 150 years later according to the pre-trip history of the Star Trek future but Scotty has given it a head start.
The AI said I could have the pilot’s seat. Open up, let me in and let’s light this candle!
Pons_Aelius is not in the sudoers file. This incident will be reported.
Shit company is capable of doing the right thing once in a while. Now they can go right back to being evil.
They think they do but they don’t. They really, really don’t.
Yeah, just having a little fun in the role of a paranoid admin. My setup isn’t worth mentioning since it fits my threat model (i.e. nobody gives a shit about my network, just don’t be the low hanging fruit) but I’m interested in other replies. Hope you get some useful responses here.
Nice try, attacker trying to get me to do their reconnaissance work for them. I’m on to you.
I’m worried that stupid is our best case scenario. For all we know, the rest are stupid plus a cattle prod to the junk so might as well stick with the one that isn’t currently zapping my balls.