jiggie2g
Jul 12, 04:34 PM
In A Word NO. There is nothing complicated about understanding Intel's Processor line. Only lazy consumers unwilling to read anything.
Yes Mulitmedia these are the same morons with too much money and too little sense , These are the same people who are saying ..ohhh why can't Conroe go into an iMac , but i want a Woodcrest , hey I don't care if Merom is Pin compatible can't they go with Conroe for it's better perfromance ..lol
What a bunch of whiny daddy's boys , no sense at all they just obey the all mighty Stevie Jobs when he lies about how the new MacPro is THE FASTEST PEECEE IN THE WORRRRLD:p
Yes Mulitmedia these are the same morons with too much money and too little sense , These are the same people who are saying ..ohhh why can't Conroe go into an iMac , but i want a Woodcrest , hey I don't care if Merom is Pin compatible can't they go with Conroe for it's better perfromance ..lol
What a bunch of whiny daddy's boys , no sense at all they just obey the all mighty Stevie Jobs when he lies about how the new MacPro is THE FASTEST PEECEE IN THE WORRRRLD:p
Mac'nCheese
Apr 24, 10:04 AM
I figured I'd use this wonderful Easter Sunday (a day spent celebrating the beginning of Spring and absolutely nothing else), to pose a question that I have.... What's the deal with religious people? After many a spirited thread about religion, I still can't wrap my head around what keeps people in the faith nowadays. I'm not talking about those people in third world nations, who have lived their entire lives under religion and know of nothing else. I'm talking about your Americans (North and South), your Europeans, the people who have access to any information they want to get (and some they don't) who should know better by now. And yet, in thread after thread, these people still swear that their way is the only way. No matter what logic you use, they can twist the words from their holy books and change the meaning of things to, in their minds, completely back up their point of view. Is it stubbornness, the inability to admit that you were wrong about something so important for so long? Is it fear? If I admit this is BS, I go to hell? Simple ignorance? Please remember, I'm not talking about just believing in a higher power, I mean those who believe in religion, Jews, Christian, etc.
wtfk
Aug 29, 02:36 PM
As soon as you mention Greenpeace, morons seem to go on auto-pilot and once they do that you can't stop them.
Do you think Greenpeace's behavior might have something to do with that?
Do you think Greenpeace's behavior might have something to do with that?
SactoGuy18
Mar 14, 07:47 AM
My opinion: it's time to end the age of light-water cooled pressurized uranium-fueled reactors. There's so many drawbacks to this design it's not funny.
Meanwhile, the new liquid fluoride thorium reactor (LFTR) is a vastly superior design that offers these advantages:
1) It uses thorium 232, which is 200 times more abundant than fuel-quality uranium.
2) The thorium fuel doesn't need to be made into fuel pellets like you need with uranium-235, substantially cutting the cost of fuel production.
3) The design of LFTR makes it effectively meltdown proof.
4) LFTR reactors don't need big cooling towers or access to a large body of water like uranium-fueled reactors do, substantially cutting construction costs.
5) You can use spent uranium fuel rods as part of the fuel for an LFTR.
6) The radioactive waste from an LFTR generated is a tiny fraction of what you get from a uranium reactor and the half-life of the waste is only a couple of hundred years, not tens of thousands of years. This means waste disposal costs will be a tiny fraction of disposing waste from a uranium reactor (just dump it into a disused salt mine).
So what are we waiting for?
Meanwhile, the new liquid fluoride thorium reactor (LFTR) is a vastly superior design that offers these advantages:
1) It uses thorium 232, which is 200 times more abundant than fuel-quality uranium.
2) The thorium fuel doesn't need to be made into fuel pellets like you need with uranium-235, substantially cutting the cost of fuel production.
3) The design of LFTR makes it effectively meltdown proof.
4) LFTR reactors don't need big cooling towers or access to a large body of water like uranium-fueled reactors do, substantially cutting construction costs.
5) You can use spent uranium fuel rods as part of the fuel for an LFTR.
6) The radioactive waste from an LFTR generated is a tiny fraction of what you get from a uranium reactor and the half-life of the waste is only a couple of hundred years, not tens of thousands of years. This means waste disposal costs will be a tiny fraction of disposing waste from a uranium reactor (just dump it into a disused salt mine).
So what are we waiting for?
Liquorpuki
Mar 13, 06:41 PM
I love when people don't read threads....
this was already posted, way to go...
http://www.scientificamerican.com/article.cfm?id=how-to-use-solar-energy-at-night
Did you even read the article you posted? The stored solar energy is drained after 8 hours. Which means if you have a day where the sun is obstructed, your city will black out.
this was already posted, way to go...
http://www.scientificamerican.com/article.cfm?id=how-to-use-solar-energy-at-night
Did you even read the article you posted? The stored solar energy is drained after 8 hours. Which means if you have a day where the sun is obstructed, your city will black out.
KnightWRX
May 2, 05:51 PM
Until Vista and Win 7, it was effectively impossible to run a Windows NT system as anything but Administrator. To the point that other than locked-down corporate sites where an IT Professional was required to install the Corporate Approved version of any software you need to do your job, I never knew anyone running XP (or 2k, or for that matter NT 3.x) who in a day-to-day fashion used a Standard user account.
Of course, I don't know of any Linux distribution that doesn't require root to install system wide software either. Kind of negates your point there...
In contrast, an "Administrator" account on OS X was in reality a limited user account, just with some system-level privileges like being able to install apps that other people could run. A "Standard" user account was far more usable on OS X than the equivalent on Windows, because "Standard" users could install software into their user sandbox, etc. Still, most people I know run OS X as Administrator.
You could do the same as far back as Windows NT 3.1 in 1993. The fact that most software vendors wrote their applications for the non-secure DOS based versions of Windows is moot, that is not a problem of the OS's security model, it is a problem of the Application. This is not "Unix security" being better, it's "Software vendors for Windows" being dumber.
It's no different than if instead of writing my preferences to $HOME/.myapp/ I'd write a software that required writing everything to /usr/share/myapp/username/. That would require root in any decent Unix installation, or it would require me to set permissions on that folder to 775 and make all users of myapp part of the owning group. Or I could just go the lazy route, make the binary 4755 and set mount opts to suid on the filesystem where this binary resides... (ugh...).
This is no different on Windows NT based architectures. If you were so inclined, with tools like Filemon and Regmon, you could granularly set permissions in a way to install these misbehaving software so that they would work for regular users.
I know I did many times in a past life (back when I was sort of forced to do Windows systems administration... ugh... Windows NT 4.0 Terminal Server edition... what a wreck...).
Let's face it, Windows NT and Unix systems have very similar security models (in fact, Windows NT has superior ACL support out of the box, akin to Novell's close to perfect ACLs, Unix is far more limited with it's read/write/execute permission scheme, even with Posix ACLs in place). It's the hoops that software vendors outside the control of Microsoft made you go through that forced lazy users to run as Administrator all the time and gave Microsoft such headaches.
As far back as I remember (when I did some Windows systems programming), Microsoft was already advising to use the user's home folder/the user's registry hive for preferences and to never write to system locations.
The real differenc, though, is that an NT Administrator was really equivalent to the Unix root account. An OS X Administrator was a Unix non-root user with 'admin' group access. You could not start up the UI as the 'root' user (and the 'root' account was disabled by default).
Actually, the Administrator account (much less a standard user in the Administrators group) is not a root level account at all.
Notice how a root account on Unix can do everything, just by virtue of its 0 uid. It can write/delete/read files from filesystems it does not even have permissions on. It can kill any system process, no matter the owner.
Administrator on Windows NT is far more limited. Don't ever break your ACLs or don't try to kill processes owned by "System". SysInternals provided tools that let you do it, but Microsoft did not.
All that having been said, UAC has really evened the bar for Windows Vista and 7 (moreso in 7 after the usability tweaks Microsoft put in to stop people from disabling it). I see no functional security difference between the OS X authorization scheme and the Windows UAC scheme.
UAC is simply a gui front-end to the runas command. Heck, shift-right-click already had the "Run As" option. It's a glorified sudo. It uses RDP (since Vista, user sessions are really local RDP sessions) to prevent being able to "fake it", by showing up on the "console" session while the user's display resides on a RDP session.
There, you did it, you made me go on a defensive rant for Microsoft. I hate you now.
My response, why bother worrying about this when the attacker can do the same thing via shellcode generated in the background by exploiting a running process so the the user is unaware that code is being executed on the system
Because this required no particular exploit or vulnerability. A simple Javascript auto-download and Safari auto-opening an archive and running code.
Why bother, you're not "getting it". The only reason the user is aware of MACDefender is because it runs a GUI based installer. If the executable had had 0 GUI code and just run stuff in the background, you would have never known until you couldn't find your files or some chinese guy was buying goods with your CC info, fished right out of your "Bank stuff.xls" file.
That's the thing, infecting a computer at the system level is fine if you want to build a DoS botnet or something (and even then, you don't really need privilege escalation for that, just set login items for the current user, and run off a non-privilege port, root privileges are not required for ICMP access, only raw sockets).
These days, malware authors and users are much more interested in your data than your system. That's where the money is. Identity theft, phishing, they mean big bucks.
Of course, I don't know of any Linux distribution that doesn't require root to install system wide software either. Kind of negates your point there...
In contrast, an "Administrator" account on OS X was in reality a limited user account, just with some system-level privileges like being able to install apps that other people could run. A "Standard" user account was far more usable on OS X than the equivalent on Windows, because "Standard" users could install software into their user sandbox, etc. Still, most people I know run OS X as Administrator.
You could do the same as far back as Windows NT 3.1 in 1993. The fact that most software vendors wrote their applications for the non-secure DOS based versions of Windows is moot, that is not a problem of the OS's security model, it is a problem of the Application. This is not "Unix security" being better, it's "Software vendors for Windows" being dumber.
It's no different than if instead of writing my preferences to $HOME/.myapp/ I'd write a software that required writing everything to /usr/share/myapp/username/. That would require root in any decent Unix installation, or it would require me to set permissions on that folder to 775 and make all users of myapp part of the owning group. Or I could just go the lazy route, make the binary 4755 and set mount opts to suid on the filesystem where this binary resides... (ugh...).
This is no different on Windows NT based architectures. If you were so inclined, with tools like Filemon and Regmon, you could granularly set permissions in a way to install these misbehaving software so that they would work for regular users.
I know I did many times in a past life (back when I was sort of forced to do Windows systems administration... ugh... Windows NT 4.0 Terminal Server edition... what a wreck...).
Let's face it, Windows NT and Unix systems have very similar security models (in fact, Windows NT has superior ACL support out of the box, akin to Novell's close to perfect ACLs, Unix is far more limited with it's read/write/execute permission scheme, even with Posix ACLs in place). It's the hoops that software vendors outside the control of Microsoft made you go through that forced lazy users to run as Administrator all the time and gave Microsoft such headaches.
As far back as I remember (when I did some Windows systems programming), Microsoft was already advising to use the user's home folder/the user's registry hive for preferences and to never write to system locations.
The real differenc, though, is that an NT Administrator was really equivalent to the Unix root account. An OS X Administrator was a Unix non-root user with 'admin' group access. You could not start up the UI as the 'root' user (and the 'root' account was disabled by default).
Actually, the Administrator account (much less a standard user in the Administrators group) is not a root level account at all.
Notice how a root account on Unix can do everything, just by virtue of its 0 uid. It can write/delete/read files from filesystems it does not even have permissions on. It can kill any system process, no matter the owner.
Administrator on Windows NT is far more limited. Don't ever break your ACLs or don't try to kill processes owned by "System". SysInternals provided tools that let you do it, but Microsoft did not.
All that having been said, UAC has really evened the bar for Windows Vista and 7 (moreso in 7 after the usability tweaks Microsoft put in to stop people from disabling it). I see no functional security difference between the OS X authorization scheme and the Windows UAC scheme.
UAC is simply a gui front-end to the runas command. Heck, shift-right-click already had the "Run As" option. It's a glorified sudo. It uses RDP (since Vista, user sessions are really local RDP sessions) to prevent being able to "fake it", by showing up on the "console" session while the user's display resides on a RDP session.
There, you did it, you made me go on a defensive rant for Microsoft. I hate you now.
My response, why bother worrying about this when the attacker can do the same thing via shellcode generated in the background by exploiting a running process so the the user is unaware that code is being executed on the system
Because this required no particular exploit or vulnerability. A simple Javascript auto-download and Safari auto-opening an archive and running code.
Why bother, you're not "getting it". The only reason the user is aware of MACDefender is because it runs a GUI based installer. If the executable had had 0 GUI code and just run stuff in the background, you would have never known until you couldn't find your files or some chinese guy was buying goods with your CC info, fished right out of your "Bank stuff.xls" file.
That's the thing, infecting a computer at the system level is fine if you want to build a DoS botnet or something (and even then, you don't really need privilege escalation for that, just set login items for the current user, and run off a non-privilege port, root privileges are not required for ICMP access, only raw sockets).
These days, malware authors and users are much more interested in your data than your system. That's where the money is. Identity theft, phishing, they mean big bucks.
handsome pete
Apr 12, 11:05 PM
Obviously I know a lot more about it than you. Of course, there are multiple industries that use editing software... but that doesn't matter. You're just puffing out your chest and being snotty.
No, your ignorance of Adobe's stance in the professional broadcast industry comes off as snotty.
No, your ignorance of Adobe's stance in the professional broadcast industry comes off as snotty.
ATD
Sep 26, 04:33 PM
This coming year is going to be great. A MacPro with 8 cores along with UB versions of the software packages I use daily. What more could a peep like me ask for... Well, Pixar could offer mult-threading support for Renderman Maya plug-in, that would be nice. :o
Good things come to those who wait. :)
<]=)
I didn't know the Renderman Maya plug-in was not mult-threaded. I was thinking of getting it, are you saying it's only a one cpu renderer?
Good things come to those who wait. :)
<]=)
I didn't know the Renderman Maya plug-in was not mult-threaded. I was thinking of getting it, are you saying it's only a one cpu renderer?
miles01110
Apr 28, 07:22 AM
Surprise. The major enterprise players take the top three spots.
sinsin07
Apr 9, 07:43 AM
Apple should be courting game developers, not their execs. These execs usually don't know much games other than to milk franchises until they're useless while the gameplay suffers.
JOSE MOURINHO 2008 Calendar
Jose Mourinho directs his
Jose Mourinho
José Jr. Mourinho
Jose Mourinho
Jose Mourinho
Jose Mourinho - Jose Mourinho
Jose Mourinho Inter Milan
Why I miss Jose Mourinho
R.Perez
Mar 13, 03:57 PM
That's fine for soaking up occasional peak demand (I linked to 'vehicle to grid' techology a few posts back), but not providing energy for a full night... unless you have a link that says otherwise?
Well here is a solution to your "problem" at least.
http://www.scientificamerican.com/article.cfm?id=how-to-use-solar-energy-at-night
The biggest limiting factor is cost, but when you factor in the cost of the environmental impact, it becomes cheap in comparison.
Well here is a solution to your "problem" at least.
http://www.scientificamerican.com/article.cfm?id=how-to-use-solar-energy-at-night
The biggest limiting factor is cost, but when you factor in the cost of the environmental impact, it becomes cheap in comparison.
munkery
May 2, 04:56 PM
Again, look, if you're not interested in the mechanics, that's fine. Stop replying to me.
My post is inquiring about the mechanics. For the past hour, I've been trying to find how this thing ticks by searching around for in-depth articles (none to find, everyone just points to Intego's brief overview that is seriously lacking in details) or for the archive itself.
If you don't want to take this discussion to the technical level I am trying to take it, just don't participate.
The Javascript exploit injected code into the Safari process to cause the download of a payload. That payload was the installer. (EDIT: the Javascript code did not exploit a vulnerability in Safari).
The installer is marked as safe to auto-execute if "open safe files after downloading" is turned on.
An installer is used to trick users to authenticate because the malware does not include privilege escalation via exploitation.
If you had any technical knowledge you could have figured that out yourself via the Intego article.
I don't know of any other Web browser (this is not a OS problem, it's a Safari problem) that automatically assumes executables are safe and thus should be auto-executed.
Installers being marked as safe really doesn't increase the likelihood of user level access as any client-side exploit provides user level access. I don't understand why you are hung up on this installer being able to auto-execute; it really makes no difference in terms of user level access. The attacker could have deleted your files with just an exploit that provides user level access.
What does Webkit2 have anything to do with running an installer on the OS after downloading it ? That happens outside the rendering engine's sandbox. You're not quite understanding what this sandbox does if you think this protects you against these types of attacks.
Webkit2 will prevent user level access via an exploit. Preventing these types of attacks is the intended purpose of sandboxing.
My post is inquiring about the mechanics. For the past hour, I've been trying to find how this thing ticks by searching around for in-depth articles (none to find, everyone just points to Intego's brief overview that is seriously lacking in details) or for the archive itself.
If you don't want to take this discussion to the technical level I am trying to take it, just don't participate.
The Javascript exploit injected code into the Safari process to cause the download of a payload. That payload was the installer. (EDIT: the Javascript code did not exploit a vulnerability in Safari).
The installer is marked as safe to auto-execute if "open safe files after downloading" is turned on.
An installer is used to trick users to authenticate because the malware does not include privilege escalation via exploitation.
If you had any technical knowledge you could have figured that out yourself via the Intego article.
I don't know of any other Web browser (this is not a OS problem, it's a Safari problem) that automatically assumes executables are safe and thus should be auto-executed.
Installers being marked as safe really doesn't increase the likelihood of user level access as any client-side exploit provides user level access. I don't understand why you are hung up on this installer being able to auto-execute; it really makes no difference in terms of user level access. The attacker could have deleted your files with just an exploit that provides user level access.
What does Webkit2 have anything to do with running an installer on the OS after downloading it ? That happens outside the rendering engine's sandbox. You're not quite understanding what this sandbox does if you think this protects you against these types of attacks.
Webkit2 will prevent user level access via an exploit. Preventing these types of attacks is the intended purpose of sandboxing.
WestonHarvey1
Apr 15, 11:27 AM
Not what he said, but how he said it. But you already knew what I meant.
People tossing out random verses from the Pentateuch/Torah to defend or condemn religion is problematic and is above most people's pay grades. There are plenty of rabbis and other scholarly folks who can help people understand some of these harsh and difficult passages. Of course, it's easier and way more fun to remain ignorant of these books to play "gotcha!" with other people's religious beliefs.
The modern view of homosexual sex in all the orthodox Christian religions is so tame and simple it's almost boring. It's just premarital sex, which is considered sinful. It's not morally worse than heterosexual premarital sex. And yes, marriage is considered to be between a man and a woman in these religions, so yes, that does really suck for the orthodox gay Christian.
People tossing out random verses from the Pentateuch/Torah to defend or condemn religion is problematic and is above most people's pay grades. There are plenty of rabbis and other scholarly folks who can help people understand some of these harsh and difficult passages. Of course, it's easier and way more fun to remain ignorant of these books to play "gotcha!" with other people's religious beliefs.
The modern view of homosexual sex in all the orthodox Christian religions is so tame and simple it's almost boring. It's just premarital sex, which is considered sinful. It's not morally worse than heterosexual premarital sex. And yes, marriage is considered to be between a man and a woman in these religions, so yes, that does really suck for the orthodox gay Christian.
bpaluzzi
Apr 28, 08:43 AM
Exactly! Desktop shipments still outpace laptop shipments.
Miiiight want to check that out again. Laptops have been outselling desktops since 2008.
Miiiight want to check that out again. Laptops have been outselling desktops since 2008.
�algiris
Apr 28, 12:11 PM
They didn't delete the word "computer" from the Apple name for nothing.
I could use a good laugh. Please "deduce" this one.
I could use a good laugh. Please "deduce" this one.
skunk
Mar 27, 07:22 PM
What does "anti-gay" mean? Is it a vague synonym for "homophobic?"Nothing "vague" about it.
I agree: There's a place for that kind of therapy. I even know people who felt conflicted about their sexual orientation. Unfortunately, the conflict caused them some of the severest emotional pain I could imagine.In all probability made much worse by listening to people like you sermonising them with absolutely unfounded and hateful rubbish for the good of their benighted souls.
So skunk is talking about legal rights.Skunk is talking about equal treatment under the law.
I agree: There's a place for that kind of therapy. I even know people who felt conflicted about their sexual orientation. Unfortunately, the conflict caused them some of the severest emotional pain I could imagine.In all probability made much worse by listening to people like you sermonising them with absolutely unfounded and hateful rubbish for the good of their benighted souls.
So skunk is talking about legal rights.Skunk is talking about equal treatment under the law.
srxtr
Apr 20, 07:10 PM
Delving into this would drive the conversation in an entirely different direction, and I don't feel like going off topic. Pay for your music, it's your choice. I'll continue to illegally download mine and enjoy it just as much.
I'll also continue to pirate software. Cry about it.
Putting aside whether it's right or wrong to download songs for free, you do know iPhones can play free songs too?
FYI iPhone is basically an iPod except it's also a phone
I'll also continue to pirate software. Cry about it.
Putting aside whether it's right or wrong to download songs for free, you do know iPhones can play free songs too?
FYI iPhone is basically an iPod except it's also a phone
Apple OC
Apr 22, 09:19 PM
I would be willing to bet that if given time this thread will be a carbon copy of that one.
That thread should be stickied, because I can't really think of any issue(relevant to this topic) we didn't cover in it.
well let it be the Mods to merge them ... why tell someone to post in an old thread that died and tell them not to post in this thread?
That thread should be stickied, because I can't really think of any issue(relevant to this topic) we didn't cover in it.
well let it be the Mods to merge them ... why tell someone to post in an old thread that died and tell them not to post in this thread?
needthephone
Apr 21, 06:28 AM
Please explain to me how I am experiencing a "degraded" experience on my current Android phone?
I can do everything your iPhone can, plus tether at no additional cost and download any song I want for free.
Ease of use in Android is just as simple as an iPhone, with the ability to customize IF YOU SO PLEASE.
So if you would, cut the degraded experience crap.
So you can steal artists property. Tell me how you can justify that? Nothing to do with android or ios but please tell me how you can justify stealing. Its the same as going into a shop and taking something. Sure nothing will happen immediately but I guarantee you will pay for it.
I live in a country of excess. Excuse me if I don't weep at night because Kanye West or Lil Wayne are missing out on my $1+ for their songs.
If an artist isn't mainstream, I'll gladly pay for their music to support it. But since my musical tastes tend to gravitate towards major artists, I don't think twice when I torrent their albums.
Sorry that's like saying I only steal from big manufactures like Heinz or Kellogs.
YOU ARE STILL A THIEF.
I can do everything your iPhone can, plus tether at no additional cost and download any song I want for free.
Ease of use in Android is just as simple as an iPhone, with the ability to customize IF YOU SO PLEASE.
So if you would, cut the degraded experience crap.
So you can steal artists property. Tell me how you can justify that? Nothing to do with android or ios but please tell me how you can justify stealing. Its the same as going into a shop and taking something. Sure nothing will happen immediately but I guarantee you will pay for it.
I live in a country of excess. Excuse me if I don't weep at night because Kanye West or Lil Wayne are missing out on my $1+ for their songs.
If an artist isn't mainstream, I'll gladly pay for their music to support it. But since my musical tastes tend to gravitate towards major artists, I don't think twice when I torrent their albums.
Sorry that's like saying I only steal from big manufactures like Heinz or Kellogs.
YOU ARE STILL A THIEF.
emotion
Sep 20, 08:50 AM
I have one of these devices, it's excellent. Especially with the user community at http://toppy.org.uk/.
There's some good info on using one with a Mac here http://www.mtop.co.uk/intro.html
The stock EPG on the unit is a bit crufty but it's deffinetly improving. I'd recommend one to anyone looking for a decent PVR.
I'm glad I piped up about this now, thanks for that info tyr2.
There's some good info on using one with a Mac here http://www.mtop.co.uk/intro.html
The stock EPG on the unit is a bit crufty but it's deffinetly improving. I'd recommend one to anyone looking for a decent PVR.
I'm glad I piped up about this now, thanks for that info tyr2.
sectime
May 9, 03:07 PM
I don't understand why someone would stay with AT&T if they are having so many dropped calls. With Verizon offering phones like the Droid Incredible and Motorola Droid it is possible to switch to a more reliable carrier and still have an "iPhone like" experience. I don't see the iPhone coming to Verizon anytime soon. If you really want an iPhone then just get a Touch and get a Verizon Android phone to go with it.
Of course it is your money, but I would be upset if I was paying my phone bill every month and not getting reliable service.
That's what I did after getting my Ipad. Droid has great reception no more dropped and missed calls
Of course it is your money, but I would be upset if I was paying my phone bill every month and not getting reliable service.
That's what I did after getting my Ipad. Droid has great reception no more dropped and missed calls
CaoCao
Mar 26, 09:07 PM
there's no reason why the church can't continue for their believers if it learns to respect the rights of those who don't believe in its teachings
The Church wont bend on certain issues. This is one of those issues.
The Church wont bend on certain issues. This is one of those issues.
Macky-Mac
Apr 24, 11:15 AM
..... If he does exist one must assume that he intends the Bible to be read literally. If he didn't then why did he go through the whole bother of having it written by the disciples in the first place if people were just going to change and reinterpret it willy nilly based on whatever the current political or social ideals of the time are?
not at all......God is perfectly aware that people make mistakes. Indeed, they can't be trusted to get anything perfectly right, so if God wanted the Bible to have been taken literally, he have written it out himself and wouldn't have involved people in the project in the first place
not at all......God is perfectly aware that people make mistakes. Indeed, they can't be trusted to get anything perfectly right, so if God wanted the Bible to have been taken literally, he have written it out himself and wouldn't have involved people in the project in the first place
Spectrum
Aug 29, 10:46 PM
Not all organic foods are actually organic.
Care to enlighten us?
Care to enlighten us?
No comments:
Post a Comment