It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by projectvxn
The Game boy(Nintendo) is a handheld video game device that has been around over 20 years. But it was not the first. The first was a handheld called the Sega Game Gear, which boasted a 365 color screen, and a 16 bit processor.
The Gameboy outsold the Game Gear 2 to 1 for the better part of the early 90's. Even though the Gamegear was cheaper and better in every way, people still chose to buy and use the nintendo gameboy which boasted a duotone backlit LCD and an 8 bit processor which they used as standard until the year 2000. But it isn't as if Nintendo was having problems figuring out small color screens and incorporating better processors. This is more of that "Market White Wash" I had mentioned in an earlier post. You see, if you hold back the market, tell the population that it is the best you've got and can get, then you can corner the market for a decade or more on crap technology.
Originally posted by spaznational
It's same kind of mentality that causes one to spray graffiti. Graffiti is also functionally useless (except for gangs perhaps) but it nonetheless widespread.
Originally posted by WISHADOW
GOOD BYE COMPUTERS!! BYE BYE!!
D i s a l l o w e d C S o f t w a r e w i l l n o t r u n , r e g a r d l e s s o f t h e a c c e s s r i g h t s o f t h e u s e r . U n t r u s t e d ³ A l l o w s p r o g r a m s t o e x e c u t e w i t h o n l y a c c e s s t o r e s o u r c e s g r a n t e d t o o p e n w e l l - k n o w n g r o u p s , b l o c k i n g a c c e s s A d m i n i s t r a t o r a n d P o w e r U s e r p r i v i l e g e s , a n d p e r s o n a l l y g r a n t e d r i g h t s .
R e s t r i c t e d ‚ S o f t w a r e c a n n o t a c c e s s c e r t a i n r e s o u r c e s , s u c h a s c r y p t o g r a p h i c k e y s a n d c r e d e n t i a l s , r e g a r d l e s s o f t h e a c c e s s r i g h t s o f t h e u s e r .
B a s i c U s e r œ A l l o w s p r o g r a m s t o e x e c u t e a s a u s e r t h a t d o e s n o t h a v e A d m i n i s t r a t o r o r P o w e r U s e r a c c e s s r i g h t s , b u t c a n s t i l l a c c e s s r e s o u c e s a c c e s s i b l e b y n o r m a l u s e r s . U n r e s t r i c t e d G S o f t w a r e a c c e s s r i g h t s a r e d e t e r m i n e d b y t h e a c c e s s r i g h t s o f t h e u s e r .
I_ScIsSecurityProcess I_ScPnPGetServiceName I_ScSendTSMessage I_ScSetServiceBitsA I_ScSetServiceBitsW IdentifyCodeAuthzLevelW ImpersonateAnonymousToken ImpersonateLoggedOnUser ImpersonateNamedPipeClient ImpersonateSelf InitializeAcl InitializeSecurityDescriptor InitializeSid InitiateSystemShutdownA InitiateSystemShutdownExA InitiateSystemShutdownExW InitiateSystemShutdownW InstallApplication IsTextUnicode IsTokenRestricted IsTokenUntrusted IsValidAcl IsValidSecurityDescriptor IsValidSid IsWellKnownSid LockServiceDatabase LogonUserA LogonUserExA LogonUserExW LogonUserW LookupAccountNameA LookupAccountNameW LookupAccountSidA LookupAccountSidW LookupPrivilegeDisplayNameA LookupPrivilegeDisplayNameW LookupPrivilegeNameA LookupPrivilegeNameW LookupPrivilegeValueA LookupPrivilegeValueW LookupSecurityDescriptorPartsA LookupSecurityDescriptorPartsW LsaAddAccountRights LsaAddPrivilegesToAccount LsaClearAuditLog LsaClose LsaCreateAccount LsaCreateSecret LsaCreateTrustedDomain LsaCreateTrustedDomainEx LsaDelete LsaDeleteTrustedDomain LsaEnumerateAccountRights LsaEnumerateAccounts LsaEnumerateAccountsWithUserRight LsaEnumeratePrivileges LsaEnumeratePrivilegesOfAccount LsaEnumerateTrustedDomains LsaEnumerateTrustedDomainsEx LsaFreeMemory LsaGetQuotasForAccount LsaGetRemoteUserName LsaGetSystemAccessAccount LsaGetUserName LsaICLookupNames LsaICLookupNamesWithCreds LsaICLookupSids LsaICLookupSidsWithCreds LsaLookupNames LsaLookupNames2 LsaLookupPrivilegeDisplayName LsaLookupPrivilegeName LsaLookupPrivilegeValue LsaLookupSids LsaNtStatusToWinError LsaOpenAccount LsaOpenPolicy LsaOpenPolicySce LsaOpenSecret LsaOpenTrustedDomain LsaOpenTrustedDomainByName LsaQueryDomainInformationPolicy LsaQueryForestTrustInformation LsaQueryInfoTrustedDomain LsaQueryInformationPolicy LsaQuerySecret LsaQuerySecurityObject LsaQueryTrustedDomainInfo LsaQueryTrustedDomainInfoByName LsaRemoveAccountRights LsaRemovePrivilegesFromAccount LsaRetrievePrivateData LsaSetDomainInformationPolicy LsaSetForestTrustInformation LsaSetInformationPolicy LsaSetInformationTrustedDomain LsaSetQuotasForAccount LsaSetSecret LsaSetSecurityObject LsaSetSystemAccessAccount LsaSetTrustedDomainInfoByName LsaSetTrustedDomainInformation LsaStorePrivateData MD4Final MD4Init MD4Update MD5Final MD5Init MD5Update MSChapSrvChangePassword MSChapSrvChangePassword2 MakeAbsoluteSD MakeAbsoluteSD2 MakeSelfRelativeSD MapGenericMask NotifyBootConfigStatus NotifyChangeEventLog ObjectCloseAuditAlarmA ObjectCloseAuditAlarmW ObjectDeleteAuditAlarmA ObjectDeleteAuditAlarmW ObjectOpenAuditAlarmA ObjectOpenAuditAlarmW ObjectPrivilegeAuditAlarmA ObjectPrivilegeAuditAlarmW OpenBackupEventLogA OpenBackupEventLogW OpenEncryptedFileRawA OpenEncryptedFileRawW OpenEventLogA OpenEventLogW OpenProcessToken OpenSCManagerA OpenSCManagerW OpenServiceA OpenServiceW OpenThreadToken OpenTraceA OpenTraceW PrivilegeCheck PrivilegedServiceAuditAlarmA PrivilegedServiceAuditAlarmW ProcessIdleTasks ProcessTrace QueryAllTracesA QueryAllTracesW QueryRecoveryAgentsOnEncryptedFile QueryServiceConfig2A QueryServiceConfig2W QueryServiceConfigA QueryServiceConfigW QueryServiceLockStatusA QueryServiceLockStatusW QueryServiceObjectSecurity QueryServiceStatus QueryServiceStatusEx QueryTraceA QueryTraceW QueryUsersOnEncryptedFile QueryWindows31FilesMigration ReadEncryptedFileRaw ReadEventLogA ReadEventLogW RegCloseKey RegConnectRegistryA RegConnectRegistryW RegCreateKeyA RegCreateKeyExA RegCreateKeyExW RegCreateKeyW RegDeleteKeyA RegDeleteKeyW RegDeleteValueA RegDeleteValueW RegDisablePredefinedCache RegEnumKeyA RegEnumKeyExA RegEnumKeyExW RegEnumKeyW RegEnumValueA RegEnumValueW RegFlushKey RegGetKeySecurity RegLoadKeyA RegLoadKeyW RegNotifyChangeKeyValue RegOpenCurrentUser RegOpenKeyA RegOpenKeyExA RegOpenKeyExW RegOpenKeyW RegOpenUserClassesRoot RegOverridePredefKey RegQueryInfoKeyA RegQueryInfoKeyW RegQueryMultipleValuesA RegQueryMultipleValuesW RegQueryValueA RegQueryValueExA RegQueryValueExW RegQueryValueW RegReplaceKeyA RegReplaceKeyW RegRestoreKeyA RegRestoreKeyW RegSaveKeyA RegSaveKeyExA RegSaveKeyExW RegSaveKeyW RegSetKeySecurity RegSetValueA RegSetValueExA RegSetValueExW RegSetValueW RegUnLoadKeyA RegUnLoadKeyW RegisterEventSourceA RegisterEventSourceW RegisterIdleTask RegisterServiceCtrlHandlerA RegisterServiceCtrlHandlerExA RegisterServiceCtrlHandlerExW RegisterServiceCtrlHandlerW RegisterTraceGuidsA RegisterTraceGuidsW RemoveTraceCallback RemoveUsersFromEncryptedFile ReportEventA ReportEventW RevertToSelf SaferCloseLevel SaferComputeTokenFromLevel SaferCreateLevel SaferGetLevelInformation SaferGetPolicyInformation SaferIdentifyLevel SaferRecordEventLogEntry SaferSetLevelInformation SaferSetPolicyInformation SaferiChangeRegistryScope SaferiCompareTokenLevels SaferiIsExecutableFileType SaferiPopulateDefaultsInRegistry SaferiRecordEventLogEntry
Originally posted by Skyfloating
Actually, PCs are a thing of the past...although most dont realize it yet.
There will be no more harddrive, it will all be webbased. You will only buy a monitor that hooks up to the web.
Originally posted by verylowfrequency
I think once a better voice & visual interface is made computers will be worn like a watch or in the pocket like a phone. With a better voice command there will be little need for the large keyboard and with a holographic projection display there wont be a use for the big bulky screen to lug around.
Originally posted by Peepers
Another thought from the realm of Peepers. If you love your windows, get a copy of Norton Ghost like 2003 or if you have vista, get ghost 12 or 14.
Than, do a clean install of the OS, install all your clean virus free softwares and than ghost it to DVD. Peepers thinks that maybe you could be a little mentally traumatized from the infestation experience and can offer this suggestion, set the hard drive you just re-imaged with ghost to slave, than plug it into another clean PC with anti virus and run a sweep. Than your mind will be relieved and you can get on with your life.
Next time you infest your PC from visiting porn sites and DL warez, you can ghost image the old to new and by by infestations.
No matter what you read here today, use precautionary measures and get a firewall & anti virus. Right now I recommend ZoneAlarm suite 2008.
Unless you know how the internet works and the dark forces that live within, keep your PC and your vital information safe.
Originally posted by Skyfloating
Actually, PCs are a thing of the past...although most dont realize it yet.
There will be no more harddrive, it will all be webbased. You will only buy a monitor that hooks up to the web.