Feeds

Serial commentard bitchslaps Reg hack

'Run away you little pansy, the databases are coming'

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

FoTW It's a well-known fact that flames are like number 13 buses - you wait ages for one and then a whole load turn up and once.

Yes indeed, following last week's truly exceptional outburst during which certain Reg readers found themselves on the receiving end of some particularly tasty abuse, we have one Aaron Kempf who rather took exception to Chris Williams' piece on counter-terror databases.

Now, we're not even sure that Kempf fully read the article, or even understood it. No matter, that's never been an impediment to an unholy turdspurt. Here's our analyst's first email:

when are you idiots going to discover that there's nothing wrong with a _DATABASE_?

Seriously-- you hippies need to stop smoking pole* and shivering at the though of _ANYONE_ building a database-- for _ANY_ reason.

No wonder Hitler kicked Englands ass in WW2.. until we had to bail you out. You kids are just a bunch of trippers, dude.

Friggin cry babies, oh, no-- the databases are coming, the databases are coming.

You know, I just built a database to keep track of theRegister using fear in order to prevent people from using a database.

I mean.. WTF Is wrong with you guys?

Data Mining is ineffective? THEY ARE NOT USING DATA MINING, THEY NEED SIMPLE REPORTING!!! Data Mining.. Do you even know what it is??

Before we had time to answer, Kempf discharged another email broadside:

Dude seriously-- you dipshits think that anyone building a couple of 'where clauses' in a database is data mining.

It is not.

Run away you little pansy, the databases are coming, the databases are coming!!!

No wonder you guys are no longer a super-power. Super-Powers aren't scared of a fucking database.

Grow some balls kid, and tell your country.. I'm personally tired of my country saving your country, maybe if you weren't scared of a fucking database-- and maybe if you knew what data mining _WAS_ then maybe you'd have a clue.

But building a database does not equate to data mining.

And databases never hurt nobody. Fucking pansy. 'Run away the databases are coming'.

-Aaron

Security for virtualized datacentres

Next page: Bootnote

More from The Register

next story
Are you a fat boy? Get to university NOW, you PENNILESS SLACKER
Rotund types paid nearly 20% less than people who didn't eat all the pies
Emma Watson should SHUT UP, all this abuse is HER OWN FAULT
... said an anon coward who we really wish hadn't posted on our website
Japan develops robot CHEERLEADERS which RIDE on BALLS
'Will put smiles on faces worldwide', predicts corporate PR chief
Bruges Booze tubes to pump LOVELY BEER underneath city
Belgian booze pumped from underground
Oz carrier Tiger Air takes terror alerts to new heights
Don't doodle, it might cost you your flight
Amazon: Wish in one hand, Twit in the other – see which one fills first
#AmazonWishList A year's supply of Arran scotch, ta
Let it go, Steve: Ballmer bans iPads from his LA Clippers b-ball team
Can you imagine the scene? 'Hey guys, it's your new owner – WTF is that on your desk?'
Oi, London thief. We KNOW what you're doing - our PRECRIME system warned us
Aye, shipmate, it be just like that Minority Report
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.