Talk:Entity 303/@comment-25933686-20141228114606/@comment-209.195.102.24-20141228171319

Aidannerd, you're kidding me. Source code, is plural by default, since it's something like water, it can't be counted. Same reason you don't say two waters, you don't say source codes. Also, Laborinjo, computers do not try to protect themselves. They do not have intelligence. Computers cannot be "weak" or strong, they do not fight like life forms. Hacking is more like trying to pick up a egg with chopsticks than dueling with virtual swords. How could some virus or hacker be renaming files into 303? A lot of the files is probably in use by some software. You can't rename a file without its file pointer, and when the file is in use another program has the pointer. Unless you close that program, you can't rename it. Some of the files are in use by the system, if you close the system you shutdown the computer. Unless the hacker or whatever wrote a program that does not even use the standard library, it will get shut down in the process too. What do you mean by you can't access your computer? Does it not turn on? I suppose you had quite a few computers then? How could you be on this page when your computer doesn't even work? If the hacker could rename files on your computer, why could he not do it to whatever device you're using right now? As for your claim to be a hacker/programmer, let me ask you, do you know what anonymous function means?