If this could be done with absolutely no user intervention (i.e. if the only thing missing is the right hardware), perhaps we could come up with something like [EMAIL PROTECTED] and [EMAIL PROTECTED]
Or, simpler, a program that the user starts manually and just leaves running (while not using the computer, so as to avoid dataloss in the event of a cock-up) — the program sets about attacking the hardware as it sees fit and stops when the user tells it to (or when it crashes the system). -- Ubuntu-devel-discuss mailing list Ubuntu-devel-discuss@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss