Enviado em 30/01/2016 - 00:52h
Li este artigo http://www.clubedohardware.com.br/artigos/traffic-shaping-uma-afronta-a-neutralidade-da-rede/3201 no CDH e vi que a coisa complica.
Eu não consigo copiar o texto e colar. Talvez acessando o HTML mas isto não é importante.
----------------------------------------------------------------------------------------------------------------
http://24.media.tumblr.com/tumblr_m62bwpSi291qdlh1io1_250.gif
Eu não consigo copiar o texto e colar. Talvez acessando o HTML mas isto não é importante.
----------------------------------------------------------------------------------------------------------------
http://24.media.tumblr.com/tumblr_m62bwpSi291qdlh1io1_250.gif
# apt-get purge systemd
Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. — Edward Snowden
Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. — Edward Snowden