give it to transocean..they need a disk to record their "BOP safety feature 
operational checklist procedures log" then use that disk to plug a "very large 
leak"

Martin 
______________________________________________ 
Verzicht und Vertraulichkeitanmerkung/Note de déni et de confidentialité
 
Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger 
sein, so bitten wir hoeflich um eine Mitteilung. Jede unbefugte Weiterleitung 
oder Fertigung einer Kopie ist unzulaessig. Diese Nachricht dient lediglich dem 
Austausch von Informationen und entfaltet keine rechtliche Bindungswirkung. 
Aufgrund der leichten Manipulierbarkeit von E-Mails koennen wir keine Haftung 
fuer den Inhalt uebernehmen.
Ce message est confidentiel et peut être privilégié. Si vous n'êtes pas le 
destinataire prévu, nous te demandons avec bonté que pour satisfaire informez 
l'expéditeur. N'importe quelle diffusion non autorisée ou la copie de ceci est 
interdite. Ce message sert à l'information seulement et n'aura pas n'importe 
quel effet légalement obligatoire. Étant donné que les email peuvent facilement 
être sujets à la manipulation, nous ne pouvons accepter aucune responsabilité 
pour le contenu fourni.



 

> Date: Mon, 17 May 2010 14:43:17 -0400
> From: dcker...@verizon.net
> To: users@tomcat.apache.org
> Subject: Re: Misunderstanding deployOnStartup actions
> 
> On 5/17/2010 2:19 PM, peter_f...@blm.gov wrote:
> > "Caldarale, Charles R"<chuck.caldar...@unisys.com> wrote on 05/17/2010
> > 12:14:21 PM:
> >
> >>> From: Jeffrey Janner [mailto:jeffrey.jan...@polydyne.com]
> >>> Subject: RE: Misunderstanding deployOnStartup actions
> >>>
> >>> The only 100% secure system is one that is turned off.
> >>
> >> Not sure even that is sufficient...
> >>
> >> - Chuck
> >
> > You could seal the hard drive in concrete then sink it in the Challenger
> > Deep... and there's still the chance that some Dr. Evil wannabe would
> > develop a sub to locate and retrieve it...
> 
> I prefer wiping the drive eleven times with cryptographically-sound 
> random data, then grinding the entire computer to a fine talcum-powder 
> consistency, mixing it thoroughly with twenty pounds of dry powdered 
> cement, then stir in the water and gravel to make concrete. When it 
> starts to get thick, start stirring in the ten pounds of small 
> rare-earth magnets, one at a time. Let it set, then dip it repeatedly in 
> molten steel. Finally, use a high-powered electromagnet to lift and drop 
> the resulting brick into the hot part of an active volcano, then push 
> the planet it's on into the nearest star.
> 
> I suppose an attacker *might* not be able to recover the data if you 
> skipped the last step, but why take chances?
> 
> :-D
> 
> (I wish I had come up with this one, but can't claim it...)
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 
                                          
_________________________________________________________________
Hotmail is redefining busy with tools for the New Busy. Get more from your 
inbox.
http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_2

Reply via email to