Of course not! And your response was the precise response that I wanted.
In the hack world of IT, you can attack a vulnerable system that allows buffer overruns. My list of things is like that attack. I wanted to throw so much at it that at least 50% of it hits home.
Then I'll gear up for my next attack.
I got a lotta livin' to do before I die, and I ain't got time to waste.
In short I am asking questions to determine axactly what you are saying.