|
If you think that anything I have ever posted is contradictory, by all means, point out the location of this supposed contradiction. I would gladly examine your evidence.
It's not necessary to point out sepcific sentences. I have read extremely long post that you fail to even acknowledge any portion of it. You simple revert to pretending to be a psychologist. I think possibly you need to go out into the real world and spend a little less time sitting out home watching Fraiser. You article and many of your post are in regards to eliminating all the basic freedoms of even legal activities simply because you take no part in them. I'm sorry but not everyone in the world wishes to be a pompous jackass clones of elenchos.
As far as your ignorance of the progress of our campaign to end hacking, perhaps you need to stop writing viruses and stealing IP Tokens for once and go inform yourself a little. Don't blame me for your own lack of knowledge.
You think for someone with a bio that states "He is a computer scientist" you would have a better understanding of the subject you are referring to. First of all, no where did I meantion that I was a software engineer. I wouldn't know how to write a virus if someone were to tell me. Your pitiful assumptions are amuzing. Secondly, if you were a computer scientist or someone with basic understandings of networking (such as a pathetic MCSE) you would no that there are no such things as IP tokens. I would seriously love to know what this technology supposedly is. It's seems odd that a token is nothing more than a a method for communication on a network referred to as token passing.
A communications network access method that uses a continuously repeating frame (the token) that is transmitted onto the network by the controlling computer. When a terminal or computer wants to send a message, it waits for an empty token. When it finds one, it fills it with the address of the destination station and some or all of its message.
Every node on the network constantly monitors the passing tokens to determine if it is a recipient of a message, in which case it "grabs" the message and resets the token status to empty. Token passing uses bus and ring topologies.
It seems rather odd that you have yet to present any sort of evidence that would suggest that your campaign has been successful. Well, at least not your campaign. Surely you have mention anti-copying methods used on compact discs to prevent them from being burn onto, for example, a mixed CD for your own listening pleasure. You have failed to mention that these methods are so utterly full of bugs that the retail copy (not the one burned yourself) will not even play properly on standard CD players.
Maybe you a referring to Microsoft threatening to pull Windows from the market completely. Yet this has nothing to do with the removal of various programs and application you claim are nothing more than "hacker tools "(although you have never mention how thigs such as the command prompt are such).
But wait, that has more to do with Microsoft's misinterpretation of the guidelines proposed by the states still suing Microsoft. Microsoft CEO Steve Ballmer (Bill Gate's right hand man) even gave a deposition making the entire company look like a pack of idiots and liars. MS has asked for time to, as one author put it, it's going to take time for the Beastly spinmeisters to figure out how to mis-characterize the now-clarified position of their opponents.
It is true that your perceived freedom, and that of other terrorists, is increasing.
I do not hold the same ideals as those of any terrorist. I was referring to the freedoms put forth by the Constituion. Perhaps you should read it sometime as you see to have a rather imaginative understanding of what's in it.
I would argue that terrorism is actually winning right now.
TRANSLATION: No one with a bit of intelligence is buying into our bullshit.
Perhaps it is too late, and banning programming and ending hacking will not be enough to prevent the fall of civilization.
The only way you could do this is to remove technology from the hands of normal people. Drugs are illegal yet they are still bought, sold, and used.
The irony, of course, is that when fundamentalist Islam takes over, there will not only be no hacking, there will be no Internet and no computers.
So now we have gone from communists to Islmaic radicals? It seems that the enemy of the day is whoever, is the bad guy in the news that month. Who's next? The Isrealis or the Palestinians? Possibly Pat Robertson and the Kristian KKKoalition?
Then you will wish you had listened to me, eh?
Sure. Just let me know when you say something intelligent.
|