Wednesday, May 11, 2011

american flag shirt

american flag shirt. AMERICAN FLAG SHIRT
  • AMERICAN FLAG SHIRT



  • Dippo
    Mar 18, 07:44 PM
    Now why do hackers have to go do this? they say they do it cuz the prices that cd's are is "unfair" and "overpriced".

    Let me repeat for those who aren't listening...
    You still have to buy the music!!!

    You have every right to rip DRM free music from a CD that you bought, and the same should go for music that you download.

    Just because the industry paid the lawmakers enough money to make a law that makes getting around DRM illegal, that doesn't make it wrong!





    american flag shirt. American flag shirt school
  • American flag shirt school



  • Rt&Dzine
    Mar 13, 03:35 PM
    Which have killed more? Hint: it's not nuclear reactors.

    True, but the total deaths from Chernobyl are unknown. Many people dying in Russia, Norway and other affected countries from cancers or other conditions caused by the contamination aren't included in the totals.





    american flag shirt. She landed some high-profile
  • She landed some high-profile



  • Apple OC
    Apr 26, 10:16 PM
    I invite you to demonstrate how Islam is a threat to freedom and democracy.

    An Islamic Internet?

    http://www.foxnews.com/world/2011/04/26/irans-plan-halal-internet-repressive-iranian-group-says/?test=latestnews





    american flag shirt. american flag shirt.
  • american flag shirt.



  • PhantomPumpkin
    Apr 21, 08:51 AM
    I own 3 macs and 5 advices. I have a PhD in electrical engineering and designed microprocessors for 14 years, including microprocessors used in many PCs. I've written millions of lines of source code in C, assembler, C++, etc.

    And most of the folks I know who use Linux or solaris all day at work to design chips use macs at home and carry iPhones. I don't know a single one of them who uses an android phone (many carry blackberries however).

    Shhh. Your experiences are obviously the exception, since they don't conform to his viewpoints.

    To be honest, the really "tech savy" ones are the ones who can and do use MULTIPLE platforms. Not just Windows, nor Mac, nor Linux, but a combination of many.

    I do love his "IT guy" argument though. I just had a friend's father, 20+ years as an IT Professional, convert over to Mac after getting fed up with the Windows Virus/Malware/other random issues train.

    He posted the pic of him in the Apple store looking at an iMac with the caption, "You're doing it right."

    :D





    american flag shirt. An American Flag Shirt?
  • An American Flag Shirt?



  • alex_ant
    Oct 9, 08:26 PM
    Originally posted by gopher
    Spec fp is extremely biased because it assumes the case of zero error code. It doesn't measure raw performance like floating point calculations per second does. When errors occur in code, the Pentium grinds to a halt, sometimes even making the Pentium IV slower than the Pentium III that is a whole Ghz slower!
    I have a question for you:

    Why does the Motorola G4 do so poorly in SPEC, while:

    The MIPS R12000 & R14000,
    The Intel Pentium III, 4 & Celeron,
    The AMD Athlon,
    The HP/Compaq PA-RISC,
    The HP/Compaq Alpha,
    The Sun SPARC,
    The IBM Power3 & Power4,

    all thoroughly trounce it? Only the Athlon and Pentium are x86 compatible. The MIPS R12000 only runs at 500MHz and it still kicks the snot out of the 1GHz G4. Why is that? Honestly, you don't believe Apple is at the mercy of a vast conspiracy which is the plot of SPEC and the processor manufacturers, do you?
    When RC5 and Genentech tests prove that raw performance the G4 is much faster than the Pentium IV or AMD, which it does, then it basically throws out the whole idea that Mhz matters. The G4 is 4 to 5 times faster.
    At certain highly specialized tasks, yes. Because these are two of the very few tasks which are ABLE with ANY amount of tweaking to perform well on the G4.
    As for hand optimizing code, you don't have to do it. What you do have to do is write developers of your software if you are displeased with how poorly they optimize code, or go seek better written software.
    Great idea.

    Dear Microsoft,

    I am displeased with the performance of Word v.X on my Mac (PowerBook G4 667). The cursor always seems to lag, and the application doesn't respond nearly as quickly as it does on my similar PC notebook. Could you like, fix this? Throw a little AltiVec in there, couldn't cost you more than $50,000.

    Thanks,
    Joe User
    As for other factors which influence speed, let's look at the internet browsing which people constantly harp about being slower on a Mac than a PC. My 768/128 DSL on my G4/800 Flat Panel iMac is easily 5 times faster browsing webpages than my T-3 based Windows 2000 Pentium III 1 Ghz machine. I wait and wait on this Pentium III. Goes to show you processor isn't everything.
    So your argument has changed from "the G4 isn't slow" to "processor isn't everything anyway?"
    It is in software, and until people realize it is in the software, complaining about hardware is not going to matter a hill of beans.
    Of course "it is in the software." "It" is also in the hardware. "It" is in both. Apple needs faster software. They have been improving in that area. They need faster hardware as well. They have not been improving nearly as much as they need to be in that area.
    64 bit processors are so slow to be developed because so few people have made their software optimized for 64 bit operations. If people need it, they'll get it. For 99% of computer use processor speed of machines nowadays is more than adequate both on PC and the Mac. Adding peripherals though is much easier on the Mac, and installing and removing software still is much easier on the Mac without causing a crash. And ease also means less time spent. So what does speed of the machine have to do with productivity when machines like PCs are so hard to manage? Nothing! Because when it is easier, it takes less time. That's the Mac advantage.
    Finally, something you said that I agree with!





    american flag shirt. The American Flag: it#39;s
  • The American Flag: it#39;s



  • Westside guy
    Apr 20, 06:03 PM
    But just like Windows, it's practically impossible to have any problems unless you do something stupid.

    This is becoming more true, but historically hasn't been the case. Fortunately Microsoft eventually learned its lessons from Slammer and the like.





    american flag shirt. american flag t shirt
  • american flag t shirt



  • uefigs139
    Sep 12, 05:00 PM
    http://www.misterbg.org/AppleProductCycle/





    american flag shirt. Peace Sign American Flag
  • Peace Sign American Flag



  • pmz
    Mar 18, 09:24 AM
    FAIL

    6.2 What Are The Intended Purposes Of The Wireless Data Service?
    Print this section | Print this page

    Except as may otherwise be specifically permitted or prohibited for select data plans, data sessions may be conducted only for the following purposes: (i) Internet browsing; (ii) email; and (iii) intranet access (including access to corporate intranets, email, and individual productivity applications like customer relationship management, sales force, and field service automation). While most common uses for Internet browsing, email and intranet access are permitted by your data plan, there are certain uses that cause extreme network capacity issues and interference with the network and are therefore prohibited. Examples of prohibited uses include, without limitation, the following: (i) server devices or host computer applications, including, but not limited to, Web camera posts or broadcasts, automatic data feeds, automated machine-to-machine connections or peer-to-peer (P2P) file sharing; (ii) as a substitute or backup for private lines, wireline s or full-time or dedicated data connections; (iii) "auto-responders," "cancel-bots," or similar automated or manual routines which generate excessive amounts of net traffic, or which disrupt net user groups or email use by others; (iv) "spam" or unsolicited commercial or bulk email (or activities that have the effect of facilitating unsolicited commercial email or unsolicited bulk email); (v) any activity that adversely affects the ability of other people or systems to use either AT&T's wireless services or other parties' Internet-based resources, including "denial of service" (DoS) attacks against another network host or individual user; (vi) accessing, or attempting to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of AT&T's wireless network or another entity's network or systems; (vii) software or other devices that maintain continuous active Internet connections when a computer's connection would otherwise be idle or any "keep alive" functions, unless they adhere to AT&T's data retry requirements, which may be changed from time to time. This means, by way of example only, that checking email, surfing the Internet, downloading legally acquired songs, and/or visiting corporate intranets is permitted, but downloading movies using P2P file sharing services, redirecting television signals for viewing on Personal Computers, web broadcasting, and/or for the operation of servers, telemetry devices and/or Supervisory Control and Data Acquisition devices is prohibited. Furthermore, plans (unless specifically designated for tethering usage) cannot be used for any applications that tether the device (through use of, including without limitation, connection kits, other phone/smartphone to computer accessories, BLUETOOTH� or any other wireless technology) to Personal Computers (including without limitation, laptops), or other equipment for any purpose. Accordingly, AT&T reserves the right to (i) deny, disconnect, modify and/or terminate Service, without notice, to anyone it believes is using the Service in any manner prohibited or whose usage adversely impacts its wireless network or service levels or hinders access to its wireless network, including without limitation, after a significant period of inactivity or after sessions of excessive usage and (ii) otherwise protect its wireless network from harm, compromised capacity or degradation in performance, which may impact legitimate data flows. You may not send solicitations to AT&T's wireless subscribers without their consent. You may not use the Services other than as intended by AT&T and applicable law. Plans are for individual, non-commercial use only and are not for resale. AT&T may, but is not required to, monitor your compliance, or the compliance of other subscribers, with AT&T's terms, conditions, or policies.

    LOL and you believe that would hold up in court against the significance of the word "Unlimited"?

    You are Flat Out Wrong. AT&T would hold up their fine print. The prosecution would wave it away, and so would the judge. It happens every day, and only most uninformed of legal amateurs are unaware of this.





    american flag shirt. for Wearing Flag Shirt
  • for Wearing Flag Shirt



  • Phayz
    Apr 5, 05:39 PM
    If you use keyboard shortcuts a lot - e.g. window switching, copy& paste, start+anything, you may find it different when first using it.





    american flag shirt. US Flag Shirts conservative
  • US Flag Shirts conservative



  • AlBDamned
    Aug 29, 11:24 AM
    danielwsmithee is right.

    At work, we never throw out a mac. But the pc boxes get replaced often.






    american flag shirt. Obituary American Flag T-Shirt
  • Obituary American Flag T-Shirt



  • Number 41
    Apr 15, 09:56 AM
    there is a very fine limit to it. Problem is a VERY VERY small percentage of people are going to take on 99% of the bulling.

    Class of 30 students you will have 1 kid who is targeted. As that moves up to Jr high and high school the ratio gets even worse were you may find a 100 to 1 or higher ratio. That 1% has to take on 99% of the bulling and what makes it worse is that same 1% is not going to be helped or defended by others for fear of them being dragged into it and being the target as well. It is ugly. I was on the receiving side.
    It is one thing for minor picking on things from friends but another for bulling.

    And, for many in that 1%, it's never going to stop until they learn to deal with it -- you can stop bullying in schools, but once you get out in the real world it becomes a much more difficult thing. You can't shield people from hate / fear / dislike or being singled out for being different. You can try to educate, you can try to get people to stop, but at the end of the day there will always be bullies and there will always be people being picked on.

    Developing coping skills is far more important than efforts to end bullying -- you can help yourself, you can't force someone else to be nice.





    american flag shirt. and American flag emblem
  • and American flag emblem



  • Nuvi
    Apr 13, 02:51 AM
    I think they will still have the full studio boxed in store, I don't fancy downloading 6 DVDs worth of FCS from the app store, although it would make updates very easy.

    I very much hope they are coming out with boxed version with printed manuals. Downloading pro apps or suit of pro apps from App Store without physical media or real manuals makes no sense.





    american flag shirt. wear American flag shirts.
  • wear American flag shirts.



  • KnightWRX
    May 2, 05:51 PM
    Until Vista and Win 7, it was effectively impossible to run a Windows NT system as anything but Administrator. To the point that other than locked-down corporate sites where an IT Professional was required to install the Corporate Approved version of any software you need to do your job, I never knew anyone running XP (or 2k, or for that matter NT 3.x) who in a day-to-day fashion used a Standard user account.

    Of course, I don't know of any Linux distribution that doesn't require root to install system wide software either. Kind of negates your point there...

    In contrast, an "Administrator" account on OS X was in reality a limited user account, just with some system-level privileges like being able to install apps that other people could run. A "Standard" user account was far more usable on OS X than the equivalent on Windows, because "Standard" users could install software into their user sandbox, etc. Still, most people I know run OS X as Administrator.

    You could do the same as far back as Windows NT 3.1 in 1993. The fact that most software vendors wrote their applications for the non-secure DOS based versions of Windows is moot, that is not a problem of the OS's security model, it is a problem of the Application. This is not "Unix security" being better, it's "Software vendors for Windows" being dumber.

    It's no different than if instead of writing my preferences to $HOME/.myapp/ I'd write a software that required writing everything to /usr/share/myapp/username/. That would require root in any decent Unix installation, or it would require me to set permissions on that folder to 775 and make all users of myapp part of the owning group. Or I could just go the lazy route, make the binary 4755 and set mount opts to suid on the filesystem where this binary resides... (ugh...).

    This is no different on Windows NT based architectures. If you were so inclined, with tools like Filemon and Regmon, you could granularly set permissions in a way to install these misbehaving software so that they would work for regular users.

    I know I did many times in a past life (back when I was sort of forced to do Windows systems administration... ugh... Windows NT 4.0 Terminal Server edition... what a wreck...).

    Let's face it, Windows NT and Unix systems have very similar security models (in fact, Windows NT has superior ACL support out of the box, akin to Novell's close to perfect ACLs, Unix is far more limited with it's read/write/execute permission scheme, even with Posix ACLs in place). It's the hoops that software vendors outside the control of Microsoft made you go through that forced lazy users to run as Administrator all the time and gave Microsoft such headaches.

    As far back as I remember (when I did some Windows systems programming), Microsoft was already advising to use the user's home folder/the user's registry hive for preferences and to never write to system locations.

    The real differenc, though, is that an NT Administrator was really equivalent to the Unix root account. An OS X Administrator was a Unix non-root user with 'admin' group access. You could not start up the UI as the 'root' user (and the 'root' account was disabled by default).

    Actually, the Administrator account (much less a standard user in the Administrators group) is not a root level account at all.

    Notice how a root account on Unix can do everything, just by virtue of its 0 uid. It can write/delete/read files from filesystems it does not even have permissions on. It can kill any system process, no matter the owner.

    Administrator on Windows NT is far more limited. Don't ever break your ACLs or don't try to kill processes owned by "System". SysInternals provided tools that let you do it, but Microsoft did not.

    All that having been said, UAC has really evened the bar for Windows Vista and 7 (moreso in 7 after the usability tweaks Microsoft put in to stop people from disabling it). I see no functional security difference between the OS X authorization scheme and the Windows UAC scheme.

    UAC is simply a gui front-end to the runas command. Heck, shift-right-click already had the "Run As" option. It's a glorified sudo. It uses RDP (since Vista, user sessions are really local RDP sessions) to prevent being able to "fake it", by showing up on the "console" session while the user's display resides on a RDP session.

    There, you did it, you made me go on a defensive rant for Microsoft. I hate you now.

    My response, why bother worrying about this when the attacker can do the same thing via shellcode generated in the background by exploiting a running process so the the user is unaware that code is being executed on the system

    Because this required no particular exploit or vulnerability. A simple Javascript auto-download and Safari auto-opening an archive and running code.

    Why bother, you're not "getting it". The only reason the user is aware of MACDefender is because it runs a GUI based installer. If the executable had had 0 GUI code and just run stuff in the background, you would have never known until you couldn't find your files or some chinese guy was buying goods with your CC info, fished right out of your "Bank stuff.xls" file.

    That's the thing, infecting a computer at the system level is fine if you want to build a DoS botnet or something (and even then, you don't really need privilege escalation for that, just set login items for the current user, and run off a non-privilege port, root privileges are not required for ICMP access, only raw sockets).

    These days, malware authors and users are much more interested in your data than your system. That's where the money is. Identity theft, phishing, they mean big bucks.





    american flag shirt. American Flag amp; GDA Logo Navy
  • American Flag amp; GDA Logo Navy



  • gatekpr
    Jun 8, 09:35 AM
    I jailbroke my iPhone 3GS and switched to T-mobile. I haven't had ONE dropped call since I did that in November. The edge network is a little slower, but well worth the switch. I could never use the 3G in Houston anyway. Sad, the 4th largest city in the nation and I would get 5-10 dropped calls a day. It was worse with the Blackberry Bold--you can't turn off the 3G, so it would drop incessantly.

    I'm excited about the iPhone 4, my sources tell me they already have a jailbreak for it. I'm excited!





    american flag shirt. American flag shirts on
  • American flag shirts on



  • Macky-Mac
    Mar 26, 12:44 PM
    Priests make the choice to do it. Why should gay people be expected to do it? To make everyone else feel better about it? Why shouldn't heterosexuals abstain then?

    there are people who think the government should make MORE laws about sexual behavior ....here's one who is in favor of making heterosexual relations outside of marriage illegal. :eek:

    Sex outside marriage should be illegal, says Parnell nominee
    Don Haase was active for years as advocate for socially conservative issues.

    JUNEAU -- Gov. Sean Parnell's appointee for the panel that nominates state judges testified Wednesday that he would like to see Alaskans prosecuted for having sex outside of marriage.....


    link (http://www.adn.com/2011/03/23/1772266/senate-panel-questions-judicial.html)





    american flag shirt. sweet American flag shirt
  • sweet American flag shirt



  • CaoCao
    Mar 27, 04:15 PM
    If he did that, he goofed. But I know I made a mistake: I missed your point. Now I understand it. Thanks. Maybe he tried to communicate with me in Latin because he know I usually attend the Traditional Latin Mass.

    Indeed sir, that is why I tried.

    Deo favente
    Pax





    american flag shirt. Distressed American Flag T-
  • Distressed American Flag T-



  • Caliber26
    Apr 15, 10:27 AM
    You would be one of them. It stings when the mirror is held up in front of you, doesn't it? I was like you at one time too, and I know where you are right now. At some point, you will come to understand that there is a difference between people who are simply trying to be themselves (us) and people who are trying to keep us from being ourselves (social conservatives). One deserves respect, one does not.

    No, sorry. There's nothing stinging. And that's not a mirror he's holding up to me, either. He's basically telling me that I "hate" myself. That's a very strong word to use towards someone you don't know at all.

    In case you haven't read my other posts: there is NOTHING wrong with being gay and disagreeing with certain aspects of homosexuality and the lifestyle attached to it, or what the media says and does in our "favor".

    I'm sorry, dude, but this is not a case of 'crap or get off the pot'. We, as a gay community, are nothing more than a blend of a million different tastes and flavors. Sorry if MY way of being gay and dealing with it doesn't suit your interests, but it is what it is and not you, not that other poster, NOT ANYONE, has a right to tell me I hate myself because of what I believe in. You're just as narrow-minded and selfish as the conservatives you like to criticize.





    american flag shirt. American Flag Polo Shirt by
  • American Flag Polo Shirt by



  • jav6454
    Mar 18, 04:07 AM
    Big Thumbs up AT&T. I am glad they are just taking it to enroll people into the 2gig plan and add tethering, saves people the trouble of having to do it themselves!

    Plus I won't have to subsidize their data usage from their stealing bandwidth and access from AT&T.

    I can't wait though, in a few weeks / months, though, when we start seeing people complaining how AT&T screwed them and changed their dataplan even though they did nothing wrong and weren't using MyFi and AT&T is horrible and a crook.

    It is coming...

    By the way the supposition as to how they are detecting this is likely way off base. It is probably pretty easy for them to determine it. I suspect Apple has included some kind of method for them to determine it. People who think it is not detectable just don't understand how it works/what it is doing at the device level.

    Someone is failing... hard





    american flag shirt. burning American flag held
  • burning American flag held



  • matticus008
    Mar 20, 07:28 PM
    Which is why copyright is a bunch of bull.

    I think you missed the point of that one. h'biki was saying that if someone, let's say someone well-known, like Britney Spears, got a copy of your wedding video and used it to make a music video for her latest song, that it wouldn't hurt anyone. It'd just be infringing on copyright, after all, even though it's your face and your wedding that's now on MTV without your permission.

    And to your earlier comment, yes, breaking the law is wrong. If the law is unfair and unjust, you change the law. The exception to this is when the law, again, as I said and you must have skipped, causes you direct personal or meaningful financial harm. Then you might have an argument for breaking the law. Otherwise, the right thing to do is to have the law changed. The digital music situation fits into this category. If you break the law, you don't encourage the law being changed, and there is no immediacy of threat to justify your illegal actions except that it's more convenient for you and that you don't care about the law. You're the reason DRM exists in the first place.





    iJohnHenry
    Apr 15, 11:40 AM
    I feel sad at how many of you are totally distorting the message of Christ.

    Well, perhaps if the Bible didn't contain so much self-serving crap by religious 'elders', we might have a better chance picking out Christ's nuggets.

    The real blame goes on those who use his name to sully his very purpose.

    The real blame goes to those that cover themselves in His name, but only for false purpose.

    Those false Christians make me sick.

    OK, you got me on that one. Me too.





    SLR2009
    Jun 19, 10:08 PM
    I've been getting dropped calls on my Iphone 3GS as well but it's gotten much worse over the last few months. It's gotten so bad that I'm hesitating in purchasing an Iphone 4G and was considering very strongly in switching over to a droid phone. AT&T's dropped calls are unacceptable.

    It's not just with me either, I was talking to a guy in an electronic store where they have Verizon phones on display. He said that he used to have an Iphone but kept getting dropped calls so he switched to a droid phone.

    I suggest that you guys do the same until AT&T gets there act together and fixes the issue. We shouldn't be paying for a service that's not working properly and is frustrating to use.





    pika2000
    Mar 18, 03:00 AM
    This is why I bought the Nexus One.
    Although I'm afraid I might be forced to let go my grand-fathered unlimited data plan in the near future. Does anybody know if adding a line and converting both it and my line into a family plan will kick me out of the grand-fathered unlimited data plan?





    munkery
    May 2, 01:02 PM
    As with all malware that doesn't achieve privilege escalation via exploitation, this will not be very widespread or successful.

    BTW, Windows already has far more privilege escalation vulnerabilities this year alone as Mac OS X over it's lifespan.

    This type of malware will no longer work in Safari once Webkit2 is released given the scripting engine will run as a seperate process that is sandboxed (similar to Chrome). The scripting engine does not run as a separate process in IE.

    Also, check out the links in my sig for more security tips. Then, PM me your credit card number (obviously, this is a joke).





    Ugg
    Mar 13, 12:21 PM
    What is the alternative to nuclear power? These green ways of producing electricity cost a lot more and what I've heard, they can't provide enough power. Plus they don't work everywhere (not enough sun or wind in here for example).

    Whether it's a good move to build nuclear plants near tectonic plate joints, that's another question. We don't have seismic activity in here so such natural catastrophes aren't a concern.

    Of course you would say that, Finland gets ~30% of its energy from nuclear. Olkiluoto isn't exactly coming in under budget, is it?

    It's not just a matter whether it is safe in your country, it's also a matter of whether it's safe for your neighbors. If I remember correctly, y'all had to throw away a lot of caribou meat after Chernobyl.