8,347
edits
No edit summary |
No edit summary |
||
Line 529:
** While acquiring Schlock some new eyes (after his were gouged out in a particularly brutal fight) the Toughs are continually faced with a more numerous but far less able enemy. Culminates in the enemy fleet attacking Petey in the belief that any '''ex'''-Tausennigan warship can't possibly have a working AI. They are "[http://www.schlockmercenary.com/2002-03-06 rather fatally mistaken]".
* ''[[Megatokyo]]'': It is not a good idea to [http://megatokyo.com/strip/125 try groping Erika].
* In ''[[Yet Another Fantasy Gamer Comic]]'', a foxwoman finds a young man going to visit his grandmother. She takes human form, lures him with the promise of random sex, and then shifts into her foxwoman form, making it look she's going to eat him. [http://yafgc.net/
** Later a variation when an adventuring party [http://yafgc.net/
* ''[[Blip]]''
** [http://www.blipcomic.com/276/ Done here.] The would-be victims are a vampire and a witch. A vampire, incidentally, who appears to have once been the Queen of Demons before she and Lucifer broke up.
Line 637:
* The infamous Sony CD manufacter-sponsored rootkit would probably have had a longer run out in the wild if one of the first computers it had infected [https://blogs.technet.microsoft.com/markrussinovich/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far/ hadn't belonged to Mark Russinovich] -- a senior Microsoft executive who invented most of the debugging, process monitoring, and system monitoring utilities for the Windows operating system, was a significant contributor to the Windows source code, and was one of the only human beings on Earth actually capable of doing the kernel-level debugging and audit of Windows XP necessary to find the rootkit in action.
** It gets better. He was also the developer of Windows' original RootkitRevealer utility.
* Some rather clumsy scammers were unlucky enough [http://www.theregister.co.uk/2016/08/17/tech_support_scam_takedown/ to catch parents of a computer security expert] with scareware. Hilarity (and irony of the "antivirus vendors" receiving a "photo of my credit card" infected with the hottest disk-encrypting malware at the time) ensues.
{{reflist}}
|