Young Davros was born into a privileged life with flat floors everywhere. No wonder that he never considered that casters might not be the most practical means of locomotion in a battle droid.
1932 posts • joined 8 Nov 2007
Slick could hardly believe it. The shimmering face in the picture tube was really speaking to him. From Nigeria! And a prince, no less!
The "tea cannon alarm clock" prototype. Not a good idea then, and it's still not, despite what IoT vendors tell you.
Boy, those schmoes at Sony, Microsoft and Nintendo are gonna be mincemeat when my lawyers get through with them. Nobody gets to use my joystick patent unless I say they can!
The proton beam safety shaver worked perfectly. Well, apart from not being able to distinguish between beards and users' braces. Still, good enough for indiegogo.
"Say, doll, you got some pretty nice flange action goin' on there. How's about interfacing with me sometime?"
--Cyberdating in the 1920s
So you're a Dalek here to exterminate me, eh? Well I am Devo and I'm gonna have your plunger for a hat, see.
My face is down here!
Laptops these days ... they'll even make you one with the Internet.
Right, that's step one for curing hiccups done. Damn. Now I can't read step 2. *hic* :(
Are you "lumbared" with a crappy aspect ratio? You're not the only one!
No, Margery, Yoga is just an effin brand name.
Siri, search webmd for "piles".
After splashing out on a new Apple laptop, Sarah was determined not to "hold it wrong".
Setting up a transparent proxy to send all traffic through www.upsidedowntext.com: always good for a laugh.
One of the new Facebook status icons: it's complicated.
After deleting the last of the last of her German friends' contacts from her address book, Alice finally reached nirvana: Hans-free computing.
Have you tried turning it off and on again?
I find your lack of furniture ... disturbing. And yet strangely arousing.
Woooo... I'm LEVITATING my LAPTOP.
Boffins dubbed this new, rare form of dyslexia "8ƐƖƖXH⊥"
To understand computer programming, first you have to understand that they are really dumb. In order to code, have to bring yourself down to their level.
You wouldn't believe the lengths that SwastikaGirl69 (real name Claire Godwin) went to to find her other half on Internet dating sites.
This gesture unlock business is getting ridiculous.
How real fans listen to Coldplay's "A rush of blood to the head"
Finally, a way to use the webcam that banishes embarrassing nostril hair from the shot!
VMWare used to offer a VM with Firefox installed a number of years back. Seems like a pretty good idea since for most people, the web browser is going to be the main point of entry for nasties. The link to follow seems to be this one, though it points to an external site (http://browser.shell.tor.hu/) that I'd never heard of before.
Still, most readers here probably don't need for someone else to package up things for them. It's easy to install a minimal OS and browser in a free VM systems (eg, VirtualBox) or do the same with Docker. Most malware won't be aware that it's running in a virtualised environment, and even if it is, it probably won't have any exploits to allow it to escape.
There is no continent called 'America'.
There's a first. A geography lesson from a septic. I wonder why all the downvotes ...
"Doc, I'm putting the band back together"
"What, 'Enchantment under the sea?'. Good for you"
Yes, it's a special blend I put together from Ethiopian coffee beans and willow bark. It's highly salicey, aye.
Reg Readers: amazingly primitive people who think that a digital watch as a prize is a pretty neat idea.
<product-placement>If you're not drinking Folgers coffee, you're probably drinking yak piss</product-placement>
Spengler: Don't cross the streams, Marty.
Marty: You mean like th-- KRRRZTHP!
Think, goddam you, Marty, think. You must remember what the winning caption contest entry was. Otherwise how are we gonna get that flux capacitor (watch)?
It was immediately obvious to Doc Brown that this visitor was no alien due to the keen interest he was taking in his digital watches.
"This Doc Brown"is a real two-tie fruity", thought Marty. "Wop bop a loo bop a lop bom boom!"
An awkward silence filled the air, but both men knew better than to fill it with observations about fashion sense. Not after what happened the last time.
So it's your birthday, eh? I'd sing you our special birthday song only now that we've lost the copyright on it, it's hardly "special" any more.
Do you like bisgetti?
Oh no, us Time Wombles hate to see old stuff thrown out. Take these "cups" for example. Found them in a milking parlour.
Sorry for the colour. The toaster got infected last week and I think it spread to the coffee maker.
but Microsoft has ported some of it to CentOS, Debian GNU/Linux, Oracle Linux, Red Hat Enterprise Linux, SUSE Linux Enterprise Server, and Ubuntu Server
But they're all just "Linux". I don't see the point in saying that they ported to this distro and that one when they're all essentially the same target assuming they use standard tools like autoconf.
Re: Hard coded primes?
I can't believe that we'd leave such an obvious vulnerability
The thing is, it wasn't obvious. Lots of talented people have looked at the algorithm since it was first published and it was believed that the choice of prime didn't adversely impact the security of the algorithm in a way that was practical enough to exploit. Kind of like how HMAC constructions are believed to be secure even with slightly dodgy/insecure hash functions as the building block.
This is a good result. It doesn't mean that the DH key exchange protocol is fundamentally broken, I think. It will definitely need some tweaks to eliminate this vulnerability completely, and in the meanwhile I expect that we'll see a flurry of papers with people proposing different approaches to mitigating the weakness in short order.
It's also great to know what the "bad guys" (the guys with the most CPU power and storage space) are up to, since up until this point we didn't really know how they might be approaching the problem.
You may still feel that it's wrong that the vulnerability was there in the first place, but maths and cryptography is an uncertain business. Things take time to crack, then we understand why, and only then can we try to fix those faults. Nothing can ever be guaranteed to be completely secure and future-proof (except maybe quantum crypto). We just have to use the best tools available to us at any given time and balance it against the risk of future (or unknown present) attacks.
Yoda standing on the sideline
now right scheming surely is.
Re: big words not always better
but wasn't it "of the visual"?
I think so. That's why I put a * in front of "aural" (to point out my misquote/mistake). Works with all the senses.
(Actually, just checked and it's "visible", so I should really have said "audible")