13 posts • joined Thursday 8th February 2007 21:35 GMT
Scott Lowe's article, bad link
The link under 'Scott Lowe' doesn't work: I had to go to the page source and copy the underlying URL.
This may be because my browser doesnt know what to do with 'herf': should that be 'href'? :-)
Re: Not quite old enough.
I should have corrected you in my reply: the existence of WinME means, of course, that they maintined 2 lines until XP., not until Win2K.
Re: Not quite old enough.
IIRC the issue was games. They had great difficulty creating an environment under NT that would support DOS/WIN Win9x games adequately, or at all. This was not really sorted till WinXP, so while many business machines moved to Win2K, MS introduced WinME as a (horrible) stopgap for home computing until XP was ready.
Re: LOHAN ideas..
You know how distended the balloon can get before it is at risk of bursting, so that's what you aim for, not for a specific altitude. A couple of overlapping conductors, such as aluminium foil, can be attached so that at a certain point of distension they are no longer in contact. Cover them with an elastic membrane to keep them flat and in contact in the wind and you're done: before the balloon bursts, a circuit breaks and you're done: simple.
As some people have almost suggested, convex screens help the user to handle glare, since reflected light appears as a line (single axis curvature) or a point (two axis curvature). In either case a slight tilt will reveal whatever is under the reflected light.
There is a joke here about fanbois rapidly rotating their wrists back and forth, the completion of which I leave as a problem for the reader.
Industry standard not so secure
Noticeably absent from Sony's update was the status of passwords used to log in to the PlayStation Network. Industry practices dictate they should never be stored in clear text, but rather should be run through a one-way cryptographic hash algorithm, which converts each string in plaintext to a unique set of characters that can never be reversed.
In practice, a lot of them can be reversed by offline brute force. If one restricted oneself to trying to crack weaker passwords: lower case, 8 characters or less (which is a significant subset of normal users), and assuming a 20 byte hash value (sha1 for instance, expressed as an integer rather than a string). A quick back-of-an-envelope calculation tells me you can build a look up table of hashes of all possible combinations of this on slightly over 6TB of disk space, which can be had easily for ~£250.
Lower case and digits, 8 chars, needs about 82 GB, which if you're able to access other people's servers, is also attainable, and in a few years can be expected to become financially viable on your local machine.
From the point of view of users, the conventional wisdom of 'choose a password that even someone who knows you couldn't guess', is superseded by 'choose a long password, that you can remember, because threat comes from people who don't know you'. Your friends might guess that your password is mrmugginsthecat, but a lower case look up table for up to 15 characters would require 6.28E22 bytes, which will not be viable for the forseeable future.
How the mighty have fallen
Apple used to make good, reliable, products. Sadly, this has changed. Today their QA is rubbish. Apple won't get better while they continue to be their own biggest fanbois, since this makes them incapable of recognising that they, not their customers, are the problem.