I wonder whether the Soundbytes stars actually look at these forums. Anyway,…..
For years and years, the Security Tango has been a wonderful and useful and generous gift to all of computerdom.
For years and years, it has been called a Tango because the steps are intended to be done in correct sequence.
And for years and years, the sequence of actions in Step Four has been different from the sequence of actions in Step Five, which purports to be a repetition of the above.
And you’re going to reply, “It doesn’t matter”, which prompts the question: If the whole idea of doing this is to do it in the correct sequence, and it doesn’t matter what the correct sequence is, then what’s the point?
Some things are not dependent on the others. If they could be done efficiently in parallel, they probably could be. The authors had to pick an order to list them, and if they say it doesn’t matter, I suppose it could have been written in the other order.
Saturday 12-2 PM Eastern585-966-5299 or 1-800-790-0415Or text us at 585-209-9010And listen live on Jazz 90.1!or watch us on our very own YouTube channel!
Or, of course:
Hey, Google Play Jazz 90.1
Alexa play Jazz 90.1
Enjoy Sound Bytes? Please help keep this site alive!