posted on 06/17/2013 12:59:31 PM PDT
(Apparently, Jimmy Carter DOES need a third term.)
To hit it with a WOL magic packet, you need to access the network with another system.
How may other systems on that subnet are compromised?
All of them?
posted on 06/17/2013 1:21:49 PM PDT
(As long as America's tolerence of failure is not overwhelmed by a desire to succeed, we will fail.)
posted on 06/17/2013 1:23:15 PM PDT
(To the faceless, jack-booted government bureaucrat who just scanned this post: SCREW YOU!)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson