Search:

Type: Posts; User: droidhacker; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.29 seconds.

  1. I assumed nothing. Read his FIRST SENTENCE.

    I assumed nothing. Read his FIRST SENTENCE.
  2. Not sure where you come up with the idea that it...

    Not sure where you come up with the idea that it might fry something. More like not enabled by default because its not yet RELIABLE.


    Also @phoronix: this development CLEARLY had NOTHING AT ALL...
  3. If it can be found by somebody, then it can also...

    If it can be found by somebody, then it can also be found by somebody else. This is a fact that cannot be disputed.
  4. This is simply not true. ddwrt certainly *is*...

    This is simply not true. ddwrt certainly *is* open source, but not as much a purist as openwrt -- i.e., for certain devices, you may find binary drivers, whereas with openwrt, if there is no source...
  5. CeroWRT **is** OpenWRT. Or more specifically,...

    CeroWRT **is** OpenWRT.
    Or more specifically, its a specialized development fork that tracks and pushes back to upstream OpenWRT.
  6. Because you are running a HOTEL and this router...

    Because you are running a HOTEL and this router is running in your front lobby.
  7. Every hacker in the world already knows about it.

    Every hacker in the world already knows about it.
  8. a) Sure. Give a grace period for every hacker in...

    a) Sure. Give a grace period for every hacker in the world to exploit everything. Great idea.
    b) Nonsense. Those people exploiting bugs... ARE ALREADY.
    c) Then **TURN IT OFF**. You can't exploit a...
  9. There is a big problem with what they've written...

    There is a big problem with what they've written up... they talk all about transparency, but then go on to say that they will only report bugs to the software's vendor and then only publish out in...
  10. rpi "foundation" seem to be more interested in...

    rpi "foundation" seem to be more interested in flaming than in supporting anything.
    Also, you would not *believe* the source code I talked out of a china-junk vendor once... Its completely wild out...
  11. I may be pointing out the obvious... but you...

    I may be pointing out the obvious... but you flamed the china junk, then recommended a few other bits of... china junk.

    Also, rpi is pretty much junk as well, broadcom is NOT fun.
  12. How is it irrelevant when you can 10x the bang...

    How is it irrelevant when you can 10x the bang for the buck for an extra $10?
    As an educational device, it was WAY obsolete before it was even planned.
    Give the kiddies something DECENT to play...
  13. Sure, go ahead... but only if you don't mind...

    Sure, go ahead... but only if you don't mind having several dozen $5000/hour lawyers knocking on your door 10 minutes later...
  14. That link doesn't actually say anything.

    That link doesn't actually say anything.
  15. Frankly, this takedown notice looks like some...

    Frankly, this takedown notice looks like some kind of automated crap, probably just some DMCA troll, likely not even Qualcomm behind it since it is so weak -- and for it being qualcomm.. you would...
  16. Dev hardware has a trickle effect. First, its to...

    Dev hardware has a trickle effect.
    First, its to the major hardware buyers, then later on, the next layer of dev hardware from a 3rd party for consumer/hacker buyers (like IFC), then later on when...
  17. Let it die already. For real. Nobody with half a...

    Let it die already. For real. Nobody with half a brain will *ever* use this fs.
  18. Hmm... I've had lots of spinning magnets fail,...

    Hmm... I've had lots of spinning magnets fail, but never yet an SSD.
    Or are you talking about price per megabyte?

    Who does backups *to* a laptop anyway?
  19. Tons of evidence, actually. Also, "Objective C"...

    Tons of evidence, actually.
    Also, "Objective C" is irrelevant. Nobody here is talking about that at all.
    Not sure what point you are trying to make... if any.


    There is a big difference...
  20. In the majority of cases, this behavior is...

    In the majority of cases, this behavior is intended to fulfill precisely ONE objective; generating vendor lock-in.
    If you use standard languages and standard libraries, building your software for a...
Results 1 to 20 of 100
Page 1 of 5 1 2 3 4