> Don't
> even tell me a worm armed with the NSA's login credential (reversed from
> the hard coded hash) is jumping around between Cisco routers...
### Welcome to Tier-N Global Network Console ###
% [research...]
# for node in $critnodes do shell $node "{ write erase ; reload ; } &"
# { dd
The younger generations today need rescuing, frankly.
In the Absence of Fathers: A Story of Elephants and Men
http://thesestonewalls.com/gordon-macrae/in-the-absence-of-fathers-a-story-of-elephants-and-men/
The Delinquents - CBS News
https://www.cbsnews.com/news/the-delinquents/
[PDF]
Trump warns Antifa.
See below for the world's largest "far right" nationalist marches in
Poland - 200,000+ people.
The ultimate wood-gassification oven has wiped out much of
Hol-ly-Wood, wel-come to Black-mail-Wood.
Da Jooish media includes le 'Ollywood as most already know, and God's
been
here's a guy called craig wright, also known as 'satoshi nakamoto' (LMAO!!!)
https://www.youtube.com/watch?v=MXMCzhwm554
the points he makes are quite interesting : his and the
bloomberg-journo-asshole's criticism of the lightning network is that LN
users(nodes) would be 'unlicensed money
Hey Zenaan,
Are your posts always off topic to Cypherpunks? Maybe other people disagree
with me, but I somehow feel your purpose here is to make users unsubscribe 樂
Alfie
Sent from my iPhone
> On 15 Nov 2018, at 10:29 am, Zenaan Harkness wrote:
>
> The younger generations today need
On 11/14/18 11:03 PM, Alfie John wrote:
> Hey Zenaan,
>
> Are your posts always off topic to Cypherpunks? Maybe other people disagree
> with me, but I somehow feel your purpose here is to make users unsubscribe 樂
Aw shucks. Zenaan didn't make me unsubscribe. He did make me create a
spam
Pretty embarrassing for “Intel Inside” if you ask me. Wonder how many
“whitehats” let their findings get suppressed for money.
On Wednesday, November 14, 2018, jim bell wrote:
> Sounds like a valid issue!
>
> Jim Bell
>
> On Wednesday, November 14, 2018, 9:36:06 AM PST, Ryan
While many x86 implementation vulnerabilities in the past involve either
electromagnetic emissions or cache timing attacks, I have not read anything
about instruction dispatch contention. According to anger fog’s research,
Intel’s implementation of the x86 instruction set does not dispatch more
Sounds like a valid issue!
Jim Bell
On Wednesday, November 14, 2018, 9:36:06 AM PST, Ryan Carboni
wrote:
While many x86 implementation vulnerabilities in the past involve either
electromagnetic emissions or cache timing attacks, I have not read anything
about instruction
On Wed, 14 Nov 2018 19:00:52 + (UTC)
jim bell wrote:
> My company, SemiDisk Systems, was very close to the first disk emulator for a
> number of types of PC, including the S-100, TRS-80 Model II, IBM PC, Epson
>
Let my life be a lesson in futility. Go up against the government, and
they’ll send everything they got against you, including things that defy
known laws of physics.
Go with the government, get paid out of the NATO vulnerability slush fund
of tens of millions of dollars a year.
And sometimes a
In "the good old days", in the 1970's, microprocessors were so much simpler.
My favorite one for awhile, the Z-80 was trivial by today's standards. No
multi-threading, no pipelining, no speculative instruction execution, etc. I
built my own homebrew personal computer, which I called the
On Wednesday, November 14, 2018, 11:52:43 AM PST, juan
wrote:
On Wed, 14 Nov 2018 19:00:52 + (UTC)
jim bell wrote:
>> My company, SemiDisk Systems, was very close to the first disk emulator for
>> a number of types of PC, including the S-100, TRS-80 Model II, IBM PC, Epson
On Wed, Nov 14, 2018 at 4:15 PM jim bell wrote:
>
>
> On Wednesday, November 14, 2018, 11:52:43 AM PST, juan
> wrote:
>
>
> On Wed, 14 Nov 2018 19:00:52 + (UTC)
>
> jim bell wrote:
>
>
> >> My company, SemiDisk Systems, was very close to the first disk emulator
> for a number of types of
14 matches
Mail list logo