If this could be done with absolutely no user intervention (i.e. if the 
only thing missing is the right hardware), perhaps we could come up with 
something like [EMAIL PROTECTED] and [EMAIL PROTECTED]

Or, simpler, a program that the user starts manually and just leaves 
running (while not using the computer, so as to avoid dataloss in the 
event of a cock-up) — the program sets about attacking the hardware as 
it sees fit and stops when the user tells it to (or when it crashes the 
system).


-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss

Reply via email to