Kevin Hill on Thu, 9 Sep 1999 11:53:09 -0400 (EDT) |
I'm ready. I have my towel. Kyle Burton wrote: > > One of the larger problems with Y2K issues, isn't what your systems do when > isolated by themselves, but what will happen when they interact with systems > that don't behave properly. > > And you can't test that by just rolling your clock forward a couple of months. > > It'll all shake itself out soon enough. People survive hurricanes and > earthquakes, where they go for days/weeks/months without basic servies > (like electricity, grocery stores, atm machines, basic access to their > bank accounts, clean water, etc), and they somehow make it through those > trials and tribulations. > > Y2K will at worst be a few days of not being able to use a handful of > these basic services. That's it. I can't see anything more devastating > than that happening. > > Don't panic. It's a waste of time. Besides, the guide says not to :) > > k > > ------------------------------------------------------------------------------ > Live fast, die young, and leave a good looking corpse. > -- James Dean > mortis@voicenet.com http://www.voicenet.com/~mortis > ------------------------------------------------------------------------------ > > On Thu, 9 Sep 1999, Morgan Wajda-Levie wrote: > > > I seem to remember Vale saying that he had been running his box in Y2k > > for a while at the last meeting. Just so he can know nothing funky > > will happen next year. :) > > > > On Thu, Sep 09, 1999 at 11:02:03AM -0400, Graham, John wrote: > > > Sorry I know this is way left field, but what's up with the date? > > > > > > -----Original Message----- > > > From: secher [mailto:vkenny@quarterleaf.com] > > > Sent: Saturday, September 09, 2000 10:46 AM > > > To: plug@lists.nothinbut.net > > > Subject: [Plug] a question of terminology.. > > > > > > > > > Ok, if we can't get htis straight, we can't ask the media to do > > > otherwise. > > > Hacking == working at programming, with the implication that there is a > > > problem to be solved. > > > Cracking == working at breaking into a supposedly secure system or > > > software, with or without the use of programming tools. > > > > > > Ok? I'm neither one, not qualified to be, but I have been around long > > > enough to know the difference. > > > > > > Just a gentle reminder, > > > Peace, > > > Vale > > > > > > > > > _______________________________________________ > > > Plug maillist - Plug@lists.nothinbut.net > > > http://lists.nothinbut.net/mail/listinfo/plug > > > > > > _______________________________________________ > > > Plug maillist - Plug@lists.nothinbut.net > > > http://lists.nothinbut.net/mail/listinfo/plug > > > > -- > > Morgan Wajda-Levie > > http://www.worldaxes.com/wajdalev > > PGP fingerprint: > > A353 C750 660E D8B6 5616 F4D8 7771 DD21 7BF6 221C > > http://www.worldaxes.com/wajdalev/public.asc for PGP key > > encrypted mail preferred > > > > _______________________________________________ > Plug maillist - Plug@lists.nothinbut.net > http://lists.nothinbut.net/mail/listinfo/plug begin:vcard n:Hill;Kevin tel;fax:215.283.4942 tel;work:215.283.4877 x-mozilla-html:TRUE url:http://www.quarterleaf.com/ org:The Sycamore Group;Enterprise Development Division version:2.1 email;internet:khill@quarterleaf.com title:Senior Application Architect adr;quoted-printable:;;580 Virginia Drive=0D=0ASuite 100;Fort Washington;PA;19034;USA x-mozilla-cpt:;25440 fn:Kevin Hill end:vcard
|
|