[16:59] <nullboy> social small talk is useless, from my introverted point of view it only exists out of customary procedure
[16:59] <andarius> lol
[16:59] <deoks> Yes.
[16:59] <deoks> Some do see people as programs :)
[17:00] <systemloc> nullboy: It's what we call 'building rapport'
[17:00] <systemloc> nullboy: Think of it as logging in and establishing permissions :D
[17:00] <nullboy> lol
[17:00] Action: andarius simply asks for those :P
[17:01] <systemloc> nullboy: If you do it well, you can even get a privledge escallation on some ppl
[17:01] <systemloc> sp?
[17:02] <andarius> permission regression :o
[17:02] <Anarkhi> why is it so hard to find material on a nonflashable prism wifi card? can anyone please help me with this issue.
[17:03] <systemloc> JKWood: eh?
[17:03] <nullboy> if you manage privilege escalation in the real world you might get a chance to probe some open ports without a filter
[17:04] <phrag> lol
[17:04] <andarius> but that can lead to child processes ....
[17:04] Agiofws (n=agiofws@85.72.134.152) joined ##slackware.
[17:04] <phrag> haha
[17:04] <nullboy> hahaha
[17:04] <andarius> then you are stuck with responsibility to the system :(
[17:04] <andarius> admin for life you are
[17:04] <nullboy> lmao
[17:05] <nullboy> oh man this proves i'm not fit for human consumption
[17:05] <andarius> lol
[17:05] <systemloc> andarius: some ppl kill those off as they begin to spawn, but before they fork from the mother process
[17:05] <andarius> ahh yes
[17:05] <systemloc> this is, of course, very controversial
[17:06] <andarius> some also remove the ability of the code to replicate completely. then port probing is considered safe
[17:06] <phrag> think of the malware!
[17:06] <systemloc> At what point does a process begin to execute code, and when does it have the right to run to it's natural completion?
[17:06] <andarius> as null bits are used for firing
[17:07] <phrag> noobfarm ^