KermMartian wrote:
merthsoft wrote:
KermMartian wrote:
Kaslai, very nice on all of those. I still don't know which of the IRL people in my room at this very moment added that: Elfprince13, Elfprincess13, or Sara (mreksm).
What makes you so sure it was one of them? I had only considered them as people who had access to edit my account, until I just realized that tifreak8x and you and Jonimus also have ACP access.
So then it's a question of, "Who would have the cojones to edit the admin's account?"
DShiznit wrote:
KermMartian wrote:
merthsoft wrote:
KermMartian wrote:
Kaslai, very nice on all of those. I still don't know which of the IRL people in my room at this very moment added that: Elfprince13, Elfprincess13, or Sara (mreksm).
What makes you so sure it was one of them? I had only considered them as people who had access to edit my account, until I just realized that tifreak8x and you and Jonimus also have ACP access.
So then it's a question of, "Who would have the cojones to edit the admin's account?" The other admins.
As shaun says, the other admins are my friends, and therefore I take such an edit as a friendly joke or prank, rather than anything negative. You'll notice I even incorporated it into my signature for real, because I take it as complimentary.
It looks even better in a 10 point font
350: You really enjoy that warm fuzzy feeling that you get when your answer is accepted on Stack Overflow.
KermMartian wrote:
349. You are overjoyed when a movie uses real "hacking" (MySQL, mysqladmin, in Girl with the Dragon Tattoo)
Even if the computer is still making the obligatory Hollywood bleeps and bloops?
benryves wrote:
KermMartian wrote:
349. You are overjoyed when a movie uses real "hacking" (MySQL, mysqladmin, in Girl with the Dragon Tattoo)
Even if the computer is still making the obligatory Hollywood bleeps and bloops? Hey, at least they're not using a Visual BASIC GUI to enhance a low-quality photo.
GUI? Everyone knows the Esper Machine is
voice controlled.
KermMartian wrote:
benryves wrote:
KermMartian wrote:
349. You are overjoyed when a movie uses real "hacking" (MySQL, mysqladmin, in Girl with the Dragon Tattoo)
Even if the computer is still making the obligatory Hollywood bleeps and bloops? Hey, at least they're not using a Visual BASIC GUI to enhance a low-quality photo.
That's what most of comicIDIOT's photos look like, truthfully.
350. You are gradually amassing a "fleet" of thermoses to ferry your coffee to and fro with you.
351. Bowties are cool. Including the ties, bowties, stetsons, fedoras, fezzes, trenchcoats, chocolate-and-aqua pinstriped suits, tweed jackets, or leather jumpers that you might wear, you Whovians. Or short skirts and plaid shirts, if you happen to be a redhead.
352. Your productivity obviously increases relative to the number of monitors you have.
II totally agree to 352. The more I multitask, the more I get things done!
- 353: You can't stand how Apple reserves possible great features on its products to save room for improvement in the following year's upgrade.
- 354: You NEVER discuss calculators in the sense of performing basic mathematical calculations.
- 355: You wonder why Microsoft is incapable of running the login screen in a sandbox of some sort. Old methods of getting administrative permissions included overwriting the default screensaver with cmd.exe and waiting at the login screen; a newer one (which still works in 7) is overwriting sethc.exe (sticky keys) with cmd.exe and pressing Shift 5 times. Both ran/run the prompt as the SYSTEM user. Hopefully Windows 8 brings a fix to this.
- 356: You argue as to whether Chrome or Firefox is better. *cough*Chrome*cough*
- ʟ_356a: Pinkie Pie is obviously the only one able to break the 4th wall of the Chrome sandbox
- ʟ_356b: You are unopposed to the pony-related comment in 356a, especially considering the hacker really did go under the name of "Pinkie Pie."
- 357: You are able to accept others' ideas so long as they aren't related to technology.
- ʟ_357a: If it's related to technology, it's WAR.
- 358: You would NEVER buy a pre-assembled desktop. You would only build one yourself from high-end parts.
- 359: You may or may not prefer it, but you are capable of performing most tasks on a Linux system via tty1.
- 360: You try extraordinarily hard to maintain system security.
- ʟ_360a: You always use a service such as LongURL before clicking on a shortened link.
- ʟ_360b: You make sure the BIOS has a password to boot so that nobody can boot a live Linux filesystem on your computer until you unlock the BIOS.
- 361: You find humor in people who don't know how to use their computers.
- 362: Computer help lines very rarely yield somebody more experienced than you.
- 363: You want to write an OS in this.
- 364: π (Pi) day is great, but τ (Tau) day needs to be celebrated, too.
- 365: You want to attend a Cemetech convention.
- 366: You are highly intrigued by how things work.
KermMartian wrote:
350. You are gradually amassing a "fleet" of thermoses to ferry your coffee to and fro with you.
367. You have one or more genre themed beverage carriers (specificially, a Boba Fett mug).
368. You read the sax the other night and saw the secret to Life, the Universe, and Everything.
technomonkey76 wrote:
[*]355: You wonder why Microsoft is incapable of running the login screen in a sandbox of some sort. Old methods of getting administrative permissions included overwriting the default screensaver with cmd.exe and waiting at the login screen; a newer one (which still works in 7) is overwriting sethc.exe (sticky keys) with cmd.exe and pressing Shift 5 times. Both ran/run the prompt as the SYSTEM user. Hopefully Windows 8 brings a fix to this.
So? If an attacker has the ability to modify system files like that, they already have full control and any further security measures will only slow them down.
Tari wrote:
technomonkey76 wrote:
[*]355: You wonder why Microsoft is incapable of running the login screen in a sandbox of some sort. Old methods of getting administrative permissions included overwriting the default screensaver with cmd.exe and waiting at the login screen; a newer one (which still works in 7) is overwriting sethc.exe (sticky keys) with cmd.exe and pressing Shift 5 times. Both ran/run the prompt as the SYSTEM user. Hopefully Windows 8 brings a fix to this.
So? If an attacker has the ability to modify system files like that, they already have full control and any further security measures will only slow them down.
I am too lazy to actually make my own post so instead I quote people and then don't say anything new
KermMartian wrote:
351. Bowties are cool. Including the ties, bowties, stetsons, fedoras, fezzes, trenchcoats, chocolate-and-aqua pinstriped suits, tweed jackets, or leather jumpers that you might wear, you Whovians. Or short skirts and plaid shirts, if you happen to be a redhead.
Most people just look ridiculous in these types of things.
merthsoft wrote:
KermMartian wrote:
351. Bowties are cool. Including the ties, bowties, stetsons, fedoras, fezzes, trenchcoats, chocolate-and-aqua pinstriped suits, tweed jackets, or leather jumpers that you might wear, you Whovians. Or short skirts and plaid shirts, if you happen to be a redhead.
Most people just look ridiculous in these types of things. Heh, and are you implying Kerm doesn't?
Now we need to see Kerm in a fedora. XD
369: You have graphed your signature in Graph3DP
370: You have ported the entire linux kernel to the fx9860GII SD
371: You ressurect old threads listing ways you're a cemetechian
372: You have a LFS box
373: It's your TI-83
seana11 wrote:
369: You have graphed your signature in Graph3DP
How do you do this?