give it to transocean..they need a disk to record their "BOP safety feature operational checklist procedures log" then use that disk to plug a "very large leak"
Martin ______________________________________________ Verzicht und Vertraulichkeitanmerkung/Note de déni et de confidentialité Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger sein, so bitten wir hoeflich um eine Mitteilung. Jede unbefugte Weiterleitung oder Fertigung einer Kopie ist unzulaessig. Diese Nachricht dient lediglich dem Austausch von Informationen und entfaltet keine rechtliche Bindungswirkung. Aufgrund der leichten Manipulierbarkeit von E-Mails koennen wir keine Haftung fuer den Inhalt uebernehmen. Ce message est confidentiel et peut être privilégié. Si vous n'êtes pas le destinataire prévu, nous te demandons avec bonté que pour satisfaire informez l'expéditeur. N'importe quelle diffusion non autorisée ou la copie de ceci est interdite. Ce message sert à l'information seulement et n'aura pas n'importe quel effet légalement obligatoire. Étant donné que les email peuvent facilement être sujets à la manipulation, nous ne pouvons accepter aucune responsabilité pour le contenu fourni. > Date: Mon, 17 May 2010 14:43:17 -0400 > From: dcker...@verizon.net > To: users@tomcat.apache.org > Subject: Re: Misunderstanding deployOnStartup actions > > On 5/17/2010 2:19 PM, peter_f...@blm.gov wrote: > > "Caldarale, Charles R"<chuck.caldar...@unisys.com> wrote on 05/17/2010 > > 12:14:21 PM: > > > >>> From: Jeffrey Janner [mailto:jeffrey.jan...@polydyne.com] > >>> Subject: RE: Misunderstanding deployOnStartup actions > >>> > >>> The only 100% secure system is one that is turned off. > >> > >> Not sure even that is sufficient... > >> > >> - Chuck > > > > You could seal the hard drive in concrete then sink it in the Challenger > > Deep... and there's still the chance that some Dr. Evil wannabe would > > develop a sub to locate and retrieve it... > > I prefer wiping the drive eleven times with cryptographically-sound > random data, then grinding the entire computer to a fine talcum-powder > consistency, mixing it thoroughly with twenty pounds of dry powdered > cement, then stir in the water and gravel to make concrete. When it > starts to get thick, start stirring in the ten pounds of small > rare-earth magnets, one at a time. Let it set, then dip it repeatedly in > molten steel. Finally, use a high-powered electromagnet to lift and drop > the resulting brick into the hot part of an active volcano, then push > the planet it's on into the nearest star. > > I suppose an attacker *might* not be able to recover the data if you > skipped the last step, but why take chances? > > :-D > > (I wish I had come up with this one, but can't claim it...) > > --------------------------------------------------------------------- > To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org > For additional commands, e-mail: users-h...@tomcat.apache.org > _________________________________________________________________ Hotmail is redefining busy with tools for the New Busy. Get more from your inbox. http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_2