#21
|
||||
|
||||
Get that token so we can see pics!
Is it a token of gratitude? Well, I’m grateful you had this, therefore, gratitude is now yours so pics should post now! Cheers Dave |
#22
|
|||
|
|||
Lol, leme try it again. You guys sure are tight lipped on these pic tokens. oops, the mustang got up twice, I don’t see how to take it down. What if I accidentally put up porn, how would I remove it. Loll.
Here’s the list, CHRYSLER Imperial - Land Yacht Chrysler New Yorker w/ new Hemisphere Bentley Mustang 77 Corvette 1978 Trans Am Hard Top 1980 Trans Am w455 1978 Y88 Trans Am Mini Cooper Chrysler Fury Rag Top MG no top 1970 base Camaro, 6 cyl. Cool car Lotus Track Car 95 Q45 Last edited by Burd; 07-10-2020 at 04:48 PM. |
#23
|
|||
|
|||
A few got left out, thanks to a member here for selling me a bag of nOS tokens, assembly line tokens too, lol
Note the 2 morons with masks on out for a bike ride. Lmao. I just saw that. Last edited by Burd; 07-10-2020 at 02:48 PM. |
The Following User Says Thank You to Burd For This Useful Post: | ||
markinnaples (07-10-2020) |
#24
|
|||
|
|||
Does anyone else ever get the error of security tokens?
|
#25
|
|||
|
|||
One guy also brought me a honeycomb trim ring for a buddy in PA, I never compared rally and honey comb side day side. Big diff
Last edited by Burd; 07-10-2020 at 02:58 PM. |
#26
|
|||
|
|||
Great job! The donuts were great!!
|
#27
|
|||
|
|||
Those were from Avon Donuts, it’s rite across from M1 complex on Woodward. They have the best donuts.
Bloody Mary’s were good. Lol Last edited by Burd; 07-10-2020 at 06:06 PM. |
#28
|
|||
|
|||
Quote:
Security token- A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to or in place of a password. It acts like an electronic key to access something. Examples include a wireless keycard opening a locked door, or in the case of a customer trying to access their bank account online, the use of a bank-provided token can prove that the customer is who they claim to be. Some tokens may store cryptographic keys that may be used to generate a digital signature, or biometric data, such as fingerprint details. Some may also store passwords.[1] Some designs incorporate tamper resistant packaging, while others may include small keypads to allow entry of a PIN or a simple button to start a generating routine with some display capability to show a generated key number. Connected tokens utilize a variety of interfaces including USB, near-field communication (NFC), radio-frequency identification (RFID), or Bluetooth. Some tokens have an audio capability designed for vision-impaired people. Contents 1 Password types 1.1 One-time passwords 2 Physical types 2.1 Disconnected tokens 2.2 Connected tokens 2.2.1 Smart cards 2.3 Contactless tokens 2.3.1 Bluetooth tokens 2.3.2 NFC tokens 2.4 Single sign-on software tokens 2.5 Programmable tokens 3 Vulnerabilities 3.1 Loss and theft 3.2 Attacking 3.3 Breach of codes 4 Digital signature 5 See also 6 References 7 External links |
#29
|
|||
|
|||
Awesome pictures! Thanks for uploading them.
|
#30
|
|||
|
|||
Im Kidding about the security tokens, but I do get that error, this time I posted one at a time. Sometimes a screen shot is too large of a file and sometimes not.
|
|
|