They say this is an open system, which has the advantage of putting
the user in control. Why would it not also put the hacker in control?
Ed
On Jul 8, 2009, at 12:49 PM, OrionWorks wrote:
I've labeled this thread "OT" because the subject would seem to be
unrelated to the issues concerning the occasionally scrappy process of
developing alternative energy strategies.
But then... maybe it does bare some semblance:
http://www.cnn.com/2009/TECH/07/08/google.chrome.os/index.html
Regards
Steven Vincent Johnson
www.OrionWorks.com
www.zazzle.com/orionworks