Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Ask Slashdot: IT Personnel As Ostriches?

KevMar Re:I've been in your position (246 comments)

In IT we have access to everything and that means that our trust and integrity means everything. We will see things that are very personal, we will know things that are very sensitive, and people will trust us.

If they question our integrity, our trust worthiness, or even our respect for authority then we lose our value to the organization. Once they start to question that, then you won't be able to get it back.

But if you maintain high standards in IT and gain absolute trust from your coworkers and administration, then you can do some amazing things.

about 6 months ago

Researchers Disarm Microsoft's EMET

KevMar Re:Let's face it ... (33 comments)

Your missing the point. If you have administrator rights, why even bother disabling EMET. Just uninstall it. Here is a quick exploit code for that:

Get-WmiObject Win32_Product | Where-Object{$_.Name -match "EMET"} | ForEach-Object{$_.Uninstall()}

If the attacker has admin rights then game over. Any other exploit after that is just smoke and mirrors.

about 7 months ago

Has the Ethanol Threat Manifested In the US?

KevMar Re:Comment from a Chemist (432 comments)

I think people look at millage and make the wrong comparison. It's not about how many miles you get per gallon, it should be about how many dollars you spend per mile. My millage is not better, but I am spending less for the same amount of driving.

about 8 months ago

Emory University SCCM Server Accidentally Reformats All Computers Campus-wide

KevMar Re:Sounds like IT incompetence (564 comments)

SCCM is a big package and there is a lot to configuring it. My guess is someone created a new collection that started with the "All Systems" group and screwed up the filter. The mistake they made was not checking the collection before they deployed.

about 8 months ago

Emory University SCCM Server Accidentally Reformats All Computers Campus-wide

KevMar Re:Cool (564 comments)

I know you are joking, but it would not be a bad idea.

Lets say you add application virtualization, redirect files to the network, and roam user settings. It would be possible to reimage at will. Change our first question from "did you turn it off and back on again?" to "Did you redeploy the operating system yet?". If only it was that easy.

about 8 months ago

Ask Slashdot: Mitigating DoS Attacks On Home Network?

KevMar The modem (319 comments)

If I had to guess, the modem is holding onto the same IP address regardless of what you do with your router. Take a weekend trip and unplug your modem in hopes that it will pull a new address when you return. You could go upstream to your ISP with the issue and suggest the tech release your IP and assign you a new one.

If the attack continues, then you have something inside your network leaking information to the attacker. And you will have to clean that up before you can resolve the problem.

about a year ago

What Are the Genuinely Useful Ideas In Programming?

KevMar Input validation (598 comments)

I think he was missing input validation from his list. The idea that you can never trust user input and you must validate it. The idea that you should white list what you want instead of black list the things you don't want. Ideas that consider the security of the system and not just the working condition of it.

about a year ago

Come Try Out Slashdot's New Design (In Beta)

KevMar Less adds but feels like more? (1191 comments)

The ads stand out way too much on the beta site. I tried it out and my first impression was that it was a site that I would not trust for the news. I thought it was all the ads on the site.

BUT then I went back to the main site and discovered that it was showing me more ads than the beta site. The main top ad was smaller on the beta site. I am not sure what to think. I don't like it because it feels like it is a ad driven site. Before it felt like it was about the content (it just so happened to have ads). Leaves a different impression.

about a year ago

Somebody Stole 7 Milliseconds From the Federal Reserve

KevMar Another Idea (740 comments)

If someone was expecting one of two outcomes, they could have done the math on both of them. If I make this trade what can I win. They placed the trade not knowing the outcome. But they had a cancel order (or reverse order) ready to go. If the news was not what they expected, they could have canceled it with minimal losses. Buying a lot of gold and the market doing nothing on the FED's news would mean that they could sell it back without much market shift.

I know this is what happened because I did stay at a Holiday Inn Express last night.

about a year ago

RIAA: Google Failing To Demote Pirate Websites

KevMar Re:Good for Google (165 comments)

If people are looking for pirating sites, I would expect them to show up at the top of the rankings. Because if I was searching for [artist] [track] download, I am not looking for amazon.com.

What Google has done is reduced when these sites would show up when you were looking for legitimate sites. Just like they reduced the adult content you see unless you are looking for adult content. It's not Google's job to police what people search for, just to make sure they find what they are looking for.

about 2 years ago

Should Microsoft Put Office On the iPad?

KevMar great opprotunity (402 comments)

While I don't see MS porting full office to apple/android, I do see them building a very slick VDI client. Office on a tablet will end up as a vdi session to a private cloud server. It may sound crazy, but its the smart thing to do. It allows Microsoft to leverage all the existing tablets that everyone already has entering the corporate environment. They can support more devices quicker and extend the life of older tablets. The tablets 3 years from now will blow away today's tablets, but if its a VDI client then that wont matter.

Tablets are too personalized and a nightmare for IT security. But what if you could connect to a work desktop and get all your work apps in a way that makes IT feels good about it. Yet, allow the individual to keep personalized apps. I think this is why Windows 8 has such a tablet feel to it. Windows 7 already does a good job under VDI, and I expect Win8 to do so much better.

This would definitely be a corporate IT strategy that is in sync with the MS push of VDI and Private cloud that we see MS timing with the Win8 release. Home users are another story.

more than 2 years ago

Stealing Laptops For Class Credit

KevMar Re:Security without security? (138 comments)

I would find that is a perfect opportunity for security to practice protocol. Do everything except report it to the authorities. Even do the data loss analysis.

In the case where the doors were locked, hunt everyone down that had a key and question them. Track each breach down.

I would love to attempt stuff like this at work.

more than 2 years ago

Stealing Laptops For Class Credit

KevMar Re:Security without security? (138 comments)

I think its just the opposite. They didn't tell them to let the students steal the laptops, they let them know in advance that if they catch someone taking the laptop that it may be legit. Just by mentioning this would have made it harder because laptop theft would be on the security teams mind making it easier to spot.

more than 2 years ago

US Judge Rules Defendant Can Be Forced To Decrypt Hard Drive

KevMar Yellow sticky note (1047 comments)

I will gladly type the password if they provide me with the yellow sticky note that I wrote it down on. I have too many passwords to remember, why should this one be any different. Like anyone can actually remember a password.

about 3 years ago

Y Combinator Wants To Kill Hollywood

KevMar Re:Cue the lawsuits (424 comments)

Why, Why are laws a thing you can buy?

about 3 years ago

Ask Slashdot: Writing Hardened Web Applications?

KevMar Re:Be paranoid (trustno1) (333 comments)

Above all, trust nothing.

That's the most important rule of thumb. Don't even trust your own client code.

Make definite security boundaries. Draw a circle, label it data. Draw a circle around that circle, label it prepared statements. Keep drawing circle adding layers for each security boundary so you have something like this.

Data-> prepared statements -> firewall -> web server -> business logic -> user state management -> browser -> client side code -> user input

Each layer needs to validate everything. Let each layer assume that the protected layer in front of it is missing. It just does not exists. One common issue is having only the client side code validate the user input. I love to modify client side code to bypass validation just to see what breaks. If its HTML, there are so many ways to do that.

about 3 years ago

Ask Slashdot: Writing Hardened Web Applications?

KevMar Re:Web Applications aren't different (333 comments)

There is a huge difference though. It is true that you should not trust any clients. But many people make incorrect assumptions.

They think that when you are working internally, there is a very small number of clients that can possible connect to it. The odds of a hacker getting onto your network are small. So of course it's secure, it's on a server behind a firewall. Opening an application to the internet strips those security blankets away.

To be honest, I think we all do a little of that too. We do what we can to write secure code internally. But we hesitate a little every time we think it may end up open to the wile. I see it as a scary door to open. We can't be 100% confident that we thought of everything, just like we can't be 100% confident that its bug free. It never is. A good student in the art of code should always seek to find more ways to secure public facing applications.

about 3 years ago

Ask Slashdot: Changing Passwords For the New Year?

KevMar Re:Divorced (339 comments)

Pick long words that are easy for you to remember.

Pick your state or town, full work phone, and favorite monopoly property(or first pet, author, or street).

That phone number will feel a little awkward to type at first, but try using the number pad. Before you know it, you fingers will type it faster than you can say it. That number adds 10 extra characters that you can remember with out thinking about.

more than 3 years ago

Ask Slashdot: Changing Passwords For the New Year?

KevMar My method (339 comments)

My method has slowly evolved over the years. I grew up on a crappy dial up connection out in the country. Our ISP gave us a generated strong password. Our connection would constantly drop and I would have to enter that password in several times a night. I kept that password and slowly morphed it over time. It kept getting stronger and stronger with every evolution. I did this with 2 passwords. One for secure stuff and one for everything else.

Then not too long ago, I discovered rainbow tables. Pre-generated LM password hashes. My passwords were not in the free tables, but they would be in one of the more detailed collections. Then I started doubling my short passwords by typing them twice. Instant 16 char passwords that were easy to remember and type. Sometimes I would mix it up and use 2 of my old 8 char passwords together. I would think password1 then password2 and type them just as fast.

More recently with smartphones and now tablets, my passwords were just a monster to enter in. One password was lnnLllnnlnnLllnn where l = lower, n = number, L = upper. A total pain when you also have to swap from numbers to letter on the key pad. My current passwords are much simpler, very fast and easy to enter, and even longer than before.

One of the passwords that I just cycled out contained 2 swype-able (dictionary) words and a full 10 digit phone number. My short one was 19 character, easy to remember, and super fast to type on my computer and moble device. Entering the password is much more natural. I can swype on my moble and bounce over to the number pad on my desktop. I work in IT constantly get comments of shock from users when they see me enter my long passwords on systems.

I do reuse passwords on sites more often then I would like to admit. I treat my email as the master password. With that, all other accounts can be reset. I have my financial password, my work password, my social password, and then everything else password. That everything else password is used on all accounts that I don't care about or don't impact me financially. The everything else password never gets changed. I will usually take 3 guesses at a password on a site. If its not my current one, previous one, or the everything password. I then request a password reset and set it to the everything password.

I never know what to put for a password hint on the sites that ask.

more than 3 years ago

Ask Slashdot: Changing Passwords For the New Year?

KevMar Re:There is extremely little value in changing. (339 comments)

Identify what accounts you need to keep secure or protected. Bank accounts, services where your credit card is available for one click purchases, and your email account. use your good passwords on them and rotate them like you are.

Then use one password for all your worthless accounts that truly don't matter. You don't even need to change this one. Still make it a good password though. So if someone hacks slashdot.org, they will get access to my evernote, flicker, and twitter accounts. But I have what 12 followers on twitter and 10 pictures on flicker. Those accounts will not impact me much if someone else got into them. Yes, someone could give me bad karma on slashdot, but do i really care?

I do stress that your email password is your most important one. Most people use the same email to sign up for everything including financial accounts. So anyone that has access to your email can do a password reset request and get in anyway.

more than 3 years ago



Failure to patch flaw exposes data on 60,000

KevMar KevMar writes  |  more than 6 years ago

KevMar writes "Serving as the latest reminder of that fact is Antioch University in Yellow Springs, Ohio, which recently disclosed that Social Security numbers and other personal data belonging to more than 60,000 students, former students and employees may have been compromised by multiple intrusions into its main ERP server. The break-ins were discovered Feb. 13 and involved a Sun Solaris server that had not been patched against a previously disclosed FTP vulnerability, even though a fix was available for the flaw at the time of the breach, university CIO William Marshall said today."
Link to Original Source



Year of the Hack

KevMar KevMar writes  |  more than 3 years ago

I get the feeling that this whole year will be filled with high profile hacks. It's like the dogs have been unleashed and they are out for blood. I know lots of hacks happen all the time, but this feels different.


Can the FCC stop the RIAA?

KevMar KevMar writes  |  more than 7 years ago

With the RIAA pushing its political powers to force colleges to stop student access to P2P services, isn't it time to get the FCC involved. The FCC has already made a big deal about ISP's blocking the trafic. Why dont they protect college networks the same way. I sugest we send an email to fccinfo@fcc.gov and explain to them whats going on and ask them for help.


This is not news, its the way it is.

KevMar KevMar writes  |  more than 9 years ago

It is sad that the internet has become so hostile. At work I connected one of our servers to a connection on the outside of our firewall for some remote support (didn't have the VPN papers signed yet). The moment that I enabled the nic, the server informed me that the RPC Service has failed and the computer will shut down.

I was foolish for not checking the patch levels. I assumed that someone else was on top of that. A mistake I will not make again. But home users have problems of their own. They don't know they have to keep it up patched. If I had my grandma running Linux, I would be the one patching it. What about converting all my friends and family to Linux. I would be so overwhelmed keeping each one current.

As it stands, I format, install XP /w SP2, change their user accounts to limited access, install spyware detection, antivirus, leave the firewall and automatic updates on, and finally put firefox on the desktop.

At the same time, I have to explain why XP is better than the 98 or ME that came with the computer, what SP2 is and why it takes so long, what a firewall is, what firefox is, why I created a special admin account for them to install stuff with and why the should never surf the web while logged into admin with the red background.

And if you are a slashdot regular, I am not telling you anything new. I should release this as a news story, but as we all know, this is not news. Its just the way it is.

Kevin Marquette



KevMar KevMar writes  |  more than 9 years ago

antispyware is a hot topic. I just started a weblog and as I see new antispyware related information, I just post it. I hope that by linking to important information, I will raise its visibility.

My personal blog is also starting to grow. I am trying to keep the antispyware blog to just refferences to content, and any actual comments or thought will go to my personal page. I do this so that my personal page gets some content and it might develop a personality. Only time will tell.



KevMar KevMar writes  |  more than 9 years ago

I decided to create a few new blogs. One is a colleciton of articles on spyware related information. I might add my own content, but at the moment I am just clipping other articles and linking to them.

Another topic that is popular at the moment is the North Korea Nuclear incident that every one has on their mind.



KevMar KevMar writes  |  more than 10 years ago

Wow, What a play by Microsoft. Halo 2 gets leaked a month early and everybody is talking about it. It happens all the time. Doom 3 was floating around in early alpha. I played Warcraft III the week before it was released and I still walked into a store and bought it when it released. Once a game gets out, little can be done to keep it underground.

Microsoft is different, Halo 2 is different. Because it is a month from release, A lot of buzz already surrounding Halo 2. Not to mention the ILoveBees marketing campaign that has attracted a lot of attention. And to top it off, Microsoft says yes it was leaked and do not download it. Then every media outlet covers the story. Now everyone is blogging about it and some suspect Microsoft of releasing it. What they say doesn't matter, as long as they don't link to the download or DVD 5 conversion kits, it becomes harder and harder to find. What has happened is a flood of references to the Halo 2 leak talking about it while the actual leaked files get lost in the mess.

Only Microsoft could pull this off. Every thing they do becomes news, good or bad. I have already preordered my copy of halo 2 so I don't care if I play it early or not. I am just doing my part to keep the chatter going.

I am done writing, any further reference to halo 2 download and to the dvd9 to dvd5 conversion kits or the negative buffer inverter or the French PAL version is mentioned to up the listing in search engines. Bungie did an excellent job with Halo. Halo 2 DVD9 PAL XBOXDVD DiFFUSiON, trust no one.



solid rock gymnastics

KevMar KevMar writes  |  more than 10 years ago

About Solid Rock Gymnastics Classes in Lincoln Ne
"Quality Gymnastics in a Positive Environment"
The Solid Rock Gymnastics Coaching Philosophy believes in attaining a balance of four components.

Our coaches focus on SAFETY. Our instructors are required to become safety certified by USA Gymnastics. We employ the safest training tools available and strive to use proper skill progression and development to ensure skill readiness.

Our classes are FUN. We believe children should enjoy class and always go home with a smile. We believe in promoting a positive, healthy lifestyle.

Our coaches are POSITIVE. Our coaching staff believes in positive reinforcement. We strive to praise and encourage our participants and reward their effort. Each gymnast is treated with respect and we do not believe in yelling at or intentionally demeaning a student. We strive to be positive role models and we use incentive type programs to encourage participation and progression. All of our instructors were gymnasts themselves and have excellent knowledge of the sport, but best of all, our instructors love kids.

Our classes are PRODUCTIVE. We believe it is important to be able to see progress at all skill levels, in all classes. In addition to being fun, our classes are designed to help gymnasts reach their full potential. Each level focuses on teaching proper basic skills and progressions that lead to the next level. This is why we take great care to see that each class fits the age and skill level of the participants.



KevMar KevMar writes  |  more than 10 years ago Kevin Marquette I am working on creating a new online handle. KevMar. I started a blog on blogger.com and I am working on getting into the top 10 search results on google.

At the time of this writting, I do appear on the second page.



KevMar KevMar writes  |  more than 10 years ago I purchased a domain and set up a website for a little over a month. I added a link to syntache in my profile. The server has not been running for several months. When I search google for that domain, my slashdot posts show up.

Not that I am surprised. syntache kevin marquette

I eventualy want to write dental software and link it back to here (syntache.com)

Why did I pick the term Syntache? I dont recall where I got the name, but when I google it, i would only get 28 results for it. If anyone is ever looking for syntache, they will find my site. ADA


office voice dictation software

KevMar KevMar writes  |  more than 10 years ago

So, I was playing with onenote today and started experimenting with their recording features. I thought about setting up the web cam but its been back in the box for so long, i dont know where to find it. the cool feature that I was playing with was I started recording a memo and typing various nodes at different places throughout the notebook and when you play back the recording, it synchronizes your various notes with where at in the recording you're speaking.

The tester that I am, I had an interesting idea I just had to try. I turned offices voice dictation on and started recording a memo. As I was dictating I would select different places so might notes would be at various places on the page. I initially didn't think I'd be able to do the voice dictation while I was recording a memo at the same time. It actually worked a lot better than I thought it would. When I replayed the memo it would highlight all the text I had dictated as they got to that point in the memo so that It actually followed my written notes along with my voice.

I am now somewhat impressed with how well this voice dictation works. in fact, I wrote this entire journal with my voice dictation. I did have to make minor corrections, but I'd never RE type any of the words.


One Man's Quest

KevMar KevMar writes  |  more than 10 years ago

How much crap in my inbox do I have to put up with? Paris Hilton, Fw;Re;Fw, reduce debt, porn, and enlargement crap. Any change to the email system will have to be universial.

Micropayments sound like a good idea, but I don't pay for email now and I don't like the idea of paying for somwthing that should be fundementaly free. And what about the posibility of mistakes or large mailing lists? what about a victom of a email worm? One way to shoot down a micropayment movement would be to unleash a worm that just kept sending messages and make charges add up.

Processing micropayments are another slight change in the idea. create a small puzzle and make the sender solve it. a spammer that sends a high volume of messages could collect and gather solutions over time or have enought partial solutions to give the puzzles no processing value, It then becomes a database lookup.

No mater what the solution is, we will have to make universial changes for it to work. As we transition into the new system, we will either remain backwards compatible or segment the market.

And if this is the case, should we look at starting from scratch?


Change is in the wind

KevMar KevMar writes  |  about 11 years ago

How much trust should you give a spammer?

This one spammer sends me to a page that is a form requesting name, address, phone, and email information from me. I made a little script that fills the form with real looking random data and submits it. When the results page loads, I do it again, and again, and ... . I think I saw 2 links go off line in the past few days that I have been doing it.

Well today I get another spam and as I test the page before loading it into my script and I see a remove email address option.

Now I see this and ponder what just happened. Did I just make a spammer place a do not email me link on his site?

all I realy want is for the spam to stop. Can I trust that this spammer has suffered enough abuse and is willing to not send spam to those that do not want it? or is this just a new method for him to collect email addresses?

I have stopped my script for now and "unsubscribed" a new hotmail account that I just created. Lets see how quickly it gets hit.


More Spam

KevMar KevMar writes  |  about 11 years ago

So it does little good to attack the sender of spam. all the informatin is fake. replying to the abuse or postmaster accounts of fake domains just bounces.

But, the spammer is spamming you for a reason. they are either selling, scamming, or harvisting you email address. several repeat spammers do very little to change their messages, but it is their links that truly give them away. Links to addresses that have the same url structure or same query parameters. Little keys they use to validate your address once you click the link.

I like to explore the link patterns that I find in my mail box. if i see a url with ?email=my@address.com I like to see if the same link will show up for different email values. I might send random addresses for a week and i reaalize that every email address value gives me the same page. It took me 100,000 tries to figure that out.

I also see addresses like this:

I tried this structure with random numbers and 100,000 tries latter, every page was the same. hmm,... go figure



KevMar KevMar writes  |  more than 11 years ago <rant>
Several People Anonymously Mailing
Stuff People Are Mailing
Stop Pissing Around Me
Stupid People Are Morons
Sly Posting Anonymously Mailed
Shit and Porn Accumulating in my Mailbox
nuf' said


A Code sample I want to save

KevMar KevMar writes  |  more than 11 years ago > Hi, I just would like to know if it s possible
> to have *any* code (C#, VB.NET, Jscript.NET ...)
> compiled to a DLL/COM/OCX ?
> and after that, is it possible to expose this compiled code
> to use it in WSH ?


Sure you can do this. The two steps you need to take are to run RegAsm on
the .NET assembly, and to copy the dll into the WinNT\System32 directory.

// sample.js
package MyLibrary
    class MyObject
        function SayHello()

c:> jsc /t:library sample.js
c:> regasm sample.dll
c:> copy sample.dll %systemroot%\system32

// useit.js
var ob = new ActiveXObject("MyLibrary.MyObject")

c:> useit.js




IP, Ideas, Patents, and Work

KevMar KevMar writes  |  more than 11 years ago

So, i have this idea. but what to do about it.

I was looking ahead at a future problem that I would have to solve in order to do something the way I want to do it.

The Idea
I am trying to make something work in a way that it was not designed. the solutions offered on the web could work, but dont offer much flexibility or the dynamics that I want. The solution is fundamentaly simple and can be very usefull. I saw the question widespread, but not the solution.

The question the now comes to mind is how to collect on it. It is almost too simple to patent and the very mentioning of it will reveal its secrets. the solution will become the way to do it. my fear is that the only way i will profit is from sueing those that use it because people won't realize that it is patented. and that is not me. I would compare it to the amazon oneClick checkout suits or the eBay auction suit.

The second question results in ownership of the idea. I work at a University in a departments IS department. I was hardware support, but now do internal data oganization tools. This idea is inresponce to a question that I asked myself while looking ahead at possible future needs and accessing my skills against them with the technologies that I like. The only thing that would give work a claim to it is the fact that it was the enviroment I was in to trigger the initial thoughts. The actual solution came in my own time at home.

The advantage I do have in this situation is that I work for a university. If I patent this myself, the costs would start at $1000 or more. I should pay a lawer to protect it corectly and pay for suits (not that I want to do that). I would also have to market and sell it myself. Working for the University is an advantage because they pay royalties and handle all the legal and patent costs. I would collect 15-30% by surendering my rights to them, rights that could questionable because I work for them.

Final Notes
The cost is a problem for me, excluding my car, computer, and what I owe on Credit Cards, $1000 is more than all my belonging.

I wish I could provide more details, but I am sure you understand.


New Domain Names - www.syntache.com

KevMar KevMar writes  |  more than 11 years ago

It is hard to fund good domain names. I wanted to post this last time, but quickly got off subject and went into a history lesson.

I spent a good week looking, hunting, and searching. Looking up random terms and words. in lititure and RPG games. religion, worlds, gods, stars, countries, seas. Looking for the simple and unique word. I found several possible and only a few that would work. I spent a lot of time looking at this list and speaking the word. three jumped out at me.

The one I realy wanted that I thought was available turns out to be one of those domain for sale website and I have not heard back form them. I registered the other two. www.syntache.com and www.omean.com.

So why was I looking for a new domain? and why did I want atleast two of them?

I am building something. something that needs it own unique title. a name that people will share and remember and is unique.

The other domain will be the name of the company that releases that product.

sites are not up yet. still configureing dns and webserver. test server is currently up.


Domain Name List

KevMar KevMar writes  |  more than 11 years ago

It is so hard to find a good .com domain. I already had a few, but havent done anything with them.

www.truedesign.org was my first. As a highschool student doing web design, that worked out fairly well.

www.northplatteonline.com, www.mynorthplatte.com, www.northplatte.cc was going to be a directory for the closest town. I was watching for www.northplatte.com to open up because it was dead and about to expire, but they renewed it.

www.lincolnadds.com was going to be the place to post and brows adds for the local city.
www.matzinwinsinlandslide.com was the adds site addapted for trading books for college students to help a friend with student elections.

www.talentfinder.net was an online application survey that was realy a personality test to bettter understand potental applicants for a small office.

www.kevinmarquette.com my personal website, borring, simple, empty. I just put something up.

all of them have been lost. college student buying temporary server space and then decides he doesn't need it any more and just lets the sites die. haha, die, they never had any users. all were proof of concept sites.

Slashdot Login

Need an Account?

Forgot your password?