Jump to content

Cap'n Refsmmat

Administrators
  • Posts

    11784
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by Cap'n Refsmmat

  1. Go back to the Python site: http://www.python.org/about/gettingstarted/ There's an "Installing" section that tells you what to do.
  2. Sweet! Godwinned on page 1. Please note that I didn't say you can't criticize women. I said that statements that sound misogynistic should be backed up strongly. Don't put words in my mouth. Why do you conclude that the "sexual economy" is unnecessary? Could women perhaps be right in withholding sex except when they want it? And isn't it the men transforming the women into sexual objects? Why should we move towards more sex, rather than men adapting to less? (I may have to split this off into its own topic soon)
  3. HTML is not a programming language. You definitely want the non-programmer's version for a good introduction.
  4. This is not true. Very few hospitals have electronic medical record systems fully in place. I have to take my medical records whenever I move.
  5. Those are not made available on a nationwide doctor network. If I invade my local psychiatrist's office, I'll get the files for a few hundred local people. If I access the STD database, I can get around half of the US population, given the prevalence of STDs.
  6. You don't even need Wikileaks. After various events leaving famous people in the hospital, I often see news reports saying that hospital staff were fired for improperly accessing the famous person's medical records. Give someone access to the STD registry and they'll end up blackmailing their exes.
  7. Three points: Misogyny is against SFN rule 1.c, so you'd be wise to back up statements that sound misogynistic with significant evidence. This seems to contradict the obvious evidence. The "female hysteria" craze of one or two hundred years ago existed because men had a strong belief that women were physiologically incapable of enjoying sex, and that women had an obligation to lie there and take it like a warm-blooded masturbation aid. The practice of women willfully entering sexual relationships for their own pleasure is a modern invention. They haven't artificially limited the sex supply -- they've radically expanded it. Your argument implies that women should stop limiting their sexual availability because men are incapable of adjusting to a sex shortage. Shouldn't it be men who learn to pursue deeper relationships with women (instead of purely sexual relationships), rather than women who give up and let men use them how they want?
  8. "Pentesting" (penetration testing) is a fairly common practice, although those interested in security lament that it's not taken seriously enough.
  9. http://www.python.org/about/gettingstarted/
  10. The majority of the nasty STDs tend to stick around with no visible symptoms. What about people who use protection and thus aren't a threat to their future partners? Also, is this nationwide list publicly available?
  11. You should probably check with the Rosetta people; they may know how to compile it with newer versions. Vim is keyboard-heavy. If you don't like that, try something like Code::Blocks, Eclipse, KDevelop, and so on. gedit is a decent text editor if you don't need an IDE. But, of course, the real Linux users will tell you otherwise: http://stackoverflow.com/questions/24109/c-ide-for-linux They have a point. The command-line apps like gdb, gcc, make, and so on have tremendous flexibility, and with shell scripting you can do just about anything. It's worthwhile to take some time to learn your system.
  12. Most things don't have to be built individually for specific compiler versions; that's just sloppy programming. General userland packages are distributed as precompiled binaries as well. Systems such as Gentoo distribute source packages, but pre-adjusted so they work with the distributed compilers and libraries, so you don't have to fight the system. It's only when you download third-party packages that you have trouble, and that's not the distribution's fault at all. User interface is a matter of preference. I tend to like working on the command line for certain tasks. There are certainly plenty of graphical editors and systems available for Linux if you just check your package manager.
  13. Script kiddies generally use pre-made systems for hacking -- hence the term "script" kiddie. They just follow a script, and get all proud when they succeed. Kernels and shells get me excited, but I do no hacking...
  14. Sounds like a Rosetta Commons problem. The vast majority of Linux software is distributed through the package managers, and comes pre-compiled. Installing takes a minute or two. You shouldn't be compiling the majority of your programs unless you're on Gentoo.
  15. The vast majority of Linux users run no antivirus, because Linux has practically no viruses.
  16. If you could easily find a hacker's computer, I think you'd do other things than send it a virus, like arresting him.
  17. It's most likely illegal to install a program on a user's computer without their consent, even if it's for their own good. Particularly because antivirus programs occasionally screw up and delete something useful. If that happens to even one person you "infect," you're in for a world of trouble.
  18. That won't last long.
  19. Check the settings under Discussion. You can choose whether comments are held for moderation. If you don't hold anything for moderation, go to Plugins and activate Spam Karma 2, or you're going to be inundated with automated spam.
  20. You should point out to your IT guys that IE8 has an IE7 compatibility mode; a website can put one extra line of code in to trip it, and IE8 will display it like IE7 would. Lets you upgrade without breaking your old app.
  21. It should email you automatically. Settings are available under Settings->Discussion.
  22. Because generally you require FAA clearance to fly automated aircraft over populated areas, and that requires safety testing and regulations. Don't want to crash on anyone's house.
  23. Unfortunately it appears the original poster is a rather sneaky spammer that has been around for several months, spamming an umbilical cord stem cell preservation service. Hey, at least it's not another Viagra ad...
  24. Go to your blog admin page and hit Settings in the list on the left-hand column. You can change the subtitle there.
  25. Chrome, Firefox and IE actually have a similar feature built in; they use lists of known malware and phishing sites to stop you before getting infected. Firefox and Chrome both use a list compiled by Google as it indexes the Web.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.