They say this is an open system, which has the advantage of putting the user in control. Why would it not also put the hacker in control?

Ed
On Jul 8, 2009, at 12:49 PM, OrionWorks wrote:

I've labeled this thread "OT" because the subject would seem to be
unrelated to the issues concerning the occasionally scrappy process of
developing alternative energy strategies.

But then... maybe it does bare some semblance:

http://www.cnn.com/2009/TECH/07/08/google.chrome.os/index.html

Regards
Steven Vincent Johnson
www.OrionWorks.com
www.zazzle.com/orionworks


Reply via email to