Stories
Slash Boxes
Comments
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
 Full
 Abbreviated
 Hidden
More | Login | Reply
Loading... please wait.
  • I used to say that the way to do this was to cut the network cable: not unplug it, take out a knife and slice the wires so somebody couldn't reconnect it.

    Then someone told me that the only secure computer was one that was turned off.

    But that wasn't good enough for another friend, who said I would also have to encase it in concrete and drop it into the ocean, and then maybe, just maybe, there wouldn't be an exploit.