This Is What I Think.

Monday, August 11, 2008

My privacy is important to Microsoft-Corbis-Al Qaeda alliance and they want as much of my privacy as they can steal.













http://www.navy.mil/management/photodb/photos/080806-N-8467N-001.jpg

080806-N-8467N-001 GROTON, Conn. (Aug. 6, 2008) Chief Fire Control Technician Jason Vega Cruz talks about nagivation aboard the fast-attack submarine USS Philadelphia (SSN 690) to actor and Army Veteran Rip Torn. The 77-year-old Torn visited Philadelphia while on a tour to Submarine Base New London. (U.S. Navy photo by John Narewski/Released)


http://www.navy.mil/view_photos_top.asp

080806-N-8467N-001










http://www.cswap.com/1983/WarGames/cap/en/25fps/a/00_57

WarGames


:57:50
What's going on?

:57:51
There's been a serious penetration
into our WOPR execution order file.

:57:55
- What the hell's he sayin'?
- In English.

:57:57
I'll give it to you. Somebody got
into Mr McKittrick's [ well-known ] system

:58:00
and stole the codes
that'll launch our missiles.










http://en.wikipedia.org/wiki/System_administrator

System administrator

A system administrator, systems administrator, or sysadmin, is a person employed to maintain and operate a computer system and/or network. System administrators may be members of an information technology department.

The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Sysadmins are usually charged with installing, supporting, and maintaining servers or other computer systems, and planning for and responding to service outages and other problems. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff. A System Administrator must demonstrate a blend of technical skills and responsibility.





http://dictionary.reference.com/browse/password

password

a secret word or expression used by authorized persons to prove their right to access, information, etc.

a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a multiuser computer system or its data resources.










http://www.cswap.com/1998/Deep_Impact/cap/en/2_Parts/a/00_18

Deep Impact


:18:49
This was never
gonna be a secret

:18:51
as long as you wanted
it to be.