Dear Google, some messages for you! Same story has the one of teenager who made a giant penis on the roof of his parents’ house, but this time on a car. I took the picture in a parking not far from Brussels, Belgium. The message is clear 😉
Category: Fun
Where are My Processes?
This screen capture shows a ‘top’ running on a multi-CPU server (4 x quad-core)… Now, I can fully understand the real value of the hot key <1>(*) 🙂 (*) from the top man page: “Toggle_Single/Separate_Cpu_States On/Off – This command affects how the ’t’ command’s Cpu States portion is shown. Although
Compromized Bagde? ;-)
I’m back from Maubeuge where was organized the “Salon Informatique“. I had some free time this weekend and decided to visit our south-neighbors to make some social networking. The event had several aspects: exhibitors active in the open source world (users groups, schools, associations and professionals), a LAN party and
Security Fail
Remember: even the best bullet-proof security solution will not protect you if not included in a global security policy… Source: failblog.org.
Hacked Nacked Truck?
Yesterday, on the way back to home, I saw the following truck: A pauldotcom.com “Hack Naked” fan? 😉
When a Picture is Worth a Thousand Words
A security awareness is mandatory but can become quickly boring! Sometimes, a good picture is worth a thousand words. During a Google Image search, I found this one excellent! (Source: Minnesota States Colleges and Universities)
We Have Spare Time in IT?
Source: eviljaymz.com/
Security by Obscurity?
“The “Brief Safe” is an innovative diversion safe that can secure your cash, documents, and other small valuables from inquisitive eyes and thieving hands, both at home and when you’re traveling…” Is it what we call security by “obscurity” ? 😉 Source: random-good-stuff.com.
Find the Error!
Read here: “Chaque utilisateur de l’Internet est identifié, sur les réseaux, par un numéro àplusieurs chiffres, également appelé adresse IP (pour Internet Protocol). Par exemple : 128.263.36.45. Et seuls les fournisseurs d’accès (Orange, Free…) peuvent savoir qui est la personne derrière chaque adresse IP. Cette information était considérée comme
How do Companies Adapt to the Crisis?
First, adapt the marketing! Review your logo: Source: tosorto.zip.net.