Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Trecherous Computing lol

Name: Anonymous 2005-12-14 10:12

I'm writing a debate on Trusted Computing, and after remembering a flash that's more than likely been bumped off of 4chan's /f/, I decided to ack world4ch about it. Anyone have links to good rants or articles on TC that would provide for some solid pros and cons about the issue? You guys could also throw in what you think about TC, as I can quote discussion groups.


mewtnote (lol): I was about to write this on Jackie T. and the Violence in Video Games baloney, but some professor who's much more important than me has already done it. (Very well, I might add.)

Name: Anonymous 2005-12-19 4:24

>>84
There's no possible "default-closed" policy. Not even treacherous computing for reasons mentioned in previous posts.

OSes and other often cracked software don't just work or not work. Their protection schemes are much more complex. Again, are you a Linux or Windows hacker? You have no clue of what are you talking about, so either learn it (you're welcome to ask, don't be afraid of anything and give it a couple of years) or stop writing about things you don't know.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List