I'm glad we're telling them about the flaws in their cryptography. It reminds me of that press conference we had in 1943 when we told the Germans we'd broken Enigma.
36 posts • joined 21 Mar 2007
If you're writing for a living and don't know what 'intransitive' or 'gerund' mean then you should probably have your thumbs broken, to stop you writing sub-literate gibberish.
It doesn't work on Linux without a lot of grunting and squealing so it's de facto broken. Dropbox works like a charm.
Re: So "known" primes could be invalidated?
Lots of tests. Miller-Rabin, Lucas-Lehmer (for Mersenne primes), ECPP (which is deterministic) etc.
This is a generalised Fermat prime, which is a prime of the form a^n + 1. Fairly obviously, a has to be even for this to be a prime. Less obvious is that n has to be a power of two. There are probably an infinite number of GFPs, but only a finite number for each base a.
That pseudocode's got a buffer overflow error in it.
Yes, that's a pretty tragic arithmetic fail on the Reg's part. f(t) = (9/5) 2^((t - 2011)/2)
Sounds like a fairly standard Kuang Grade Mk 11 penetration program.
IT is boring and full of spods and no-one should ever work in it
Right, now we've got that out of the way: why would I want a bunch of people coming into my profession and diluting my appeal to employers? If everyone could do what I do, then I wouldn't get paid as much. The ideal situation would be where my skill-set was so rare I could basically name my price.
NASA is a silly fable all by itself
NASA has been essentially a fictional organisation since about 1973, so sponsoring sci-fi is really some sort of grim epistemic closure.
I was a few weeks away from birth when the first man set foot on the moon. I was three when the last one did. It angers me that now I have grey hairs and wrinkles and no other bugger's been back. It's not like it even costs that much, compared to the fire-hose of cash spent on welfare.
Errm, no, not necessarily
URL session tracking is fine, as long as a robust set of login criteria including remote IP address are tracked, it's blinded with a nonce value, it's hashed and it's compared every page view with the value stored in the DB. You should also use a cookie in tandem with it, which since it's for authentication isn't covered by this (admittedly braindead) legislation.
Wouldn't it be easier to put Morales in an actual box? I always think that if these sinister capitalists are half as evil as the Lefties paint them then there should be a lot more Hugo Chavez's suddenly exploding than there actually are. It's almost like they act within the law or something. But that's clearly absurd.
Paranoia is the answer
I taped a little square of cardboard cut from a cereal box over the the lens of the camera on my MacBook. If the combined legions of Bill Jobs and the surveillance state can defeat that to see me surfing with no pants on, then good luck to 'em.
This seems a bit James Bond-y
Wouldn't a 340 kT B61 Mod 7 nuke in laydown mode be a safer bet? What am I missing?
Oh God, not the old 'back in the good old days' crap
Arr, when Oi were a lad, you'm didn't need none of yer fancy graphical user interfaces to calculate the powers of two. Aye, yer could do it in nine instructions. Now it's millions! Bloomin' madness, Oi tells yer.
Well that's us whippersnappers told then. Sure the machine might have weighed as much as a bus and cost half a million bucks, but you you could...drum roll...do the sort of wanky thing you learn how to do in first year Microprocessors Lab with a Z80 and a breadboard. Of course code was more efficient. The hardware was shite. To say you need hundreds of thousands of instructions to calculate the powers of two is ignoring the fact that those hundreds of thousands of instructions can also be used to display the results from computations that aren't so ball-achingly pointless.
You're not meant to know how Google ranks sites
Widespread knowledge of exactly how Google ranks things would be a gift to those charlatans who list 'SEO' on their CVs. What we do know is it has roots in spectral graph theory but with a substantial number of knobs on. If you can find me a schoolkid in Britain who knows what a graph eigenspectrum is then you win a lollipop.
We can rule out a terrorist organisation doing this, but the threat of a State actor deploying an EMP weapon is not an empty one. It might not be top of the list of threats, but Fractional Orbital Bombardment Systems (FOBS) have been known about for a long time. These have a strong deniability component and are also very difficult to counter. Civilian infrastructure would be very badly impacted. For example, food distribution is heavily reliant on just-in-time delivery and refrigeration, both of which would be badly hit by a significant EMP event. You don't need a multi-megaton weapon to cause a non-negligible EMP. In fact fission weapons give you more bang for your buck if you want to take out electronic infrastructure like telecomms and computer equipment. A big thermonuke will be better for knocking out power distribution systems. Both are hard to safeguard against.
It's easy just to dismiss this as lobbyists angling for cash, but it's a real problem.
Rorke's Drift a Pyrrhic (note spelling) victory? Not hardly. 17 killed out of 139. The idea that the braver side always wins is rubbish. Who were braver at Omdurman, Kitchener's army or the Dervishes? Who were braver on Iwo Jima, the Marines or the Japanese defenders? Courage is a very important factor, but technology can produce lopsided results irrespective of the relative bravery of the combatants. It took just as much courage to fly a bomber over Germany in 1941 as in 1945, but in 1941 crews were lucky to deliver their bombload within five miles of the target (frequently they bombed the wrong country, never mind the wrong city). By war's end average targeting error was down to 300 yards, with some specialist units achieving as little as 80 yards. The difference in combat effectiveness was profound, and it was almost wholly due to technology.
I'm also a bit fed up with the assertion that US troops are mindless undeducated automatons given to panicking and shooting indiscriminately. Nothing could be further from the truth. Their NCOs, in particular, are absolutely excellent, and it is not uncommon to find, say, a SSG with a Bachelor's or even Master's degree.
You can do 90% of that bollocks in emacs if you know what you're doing.
I'd be tempted to call bollocks but...
...one of our guys has a six month old 64-bit AMD machine with 2G of RAM and simply task switching from, say, Photoshop to Zend Studio can take up to 30 seconds a time. I'd be a gibbering homicidal maniac after an hour or so of that nonsense. His machine is, no kidding, about a tenth the speed of the box I'm writing this on, which is a five year old 1500 MHz PIV with a gig of RAM. But then I'm running Ubuntu Dapper. I still use Mandrake 9.2 at work on an identical box and it's a sight faster. At least 25 seconds of the boot cycle is firing up the Adaptec Ultra160 SCSI card. A pure ATA configuration is POST to XDM login in 45 seconds.
Abstract vs. concrete
Amen DZ-Jay. The Relational Model is just that: a model. But it's still important. If you don't grok why 3NF is, under a not-unreasonable set of circumstances, a good structure for your DB to have then you probably shouldn't be let loose on the world of actual data. Yes, you can deviate from the model, and in the corporeal world, far from Messrs. Boyce and Codd, you probably will. But without an understanding of why the relational model was developed, diversions from it are an appeal to magic. At the very least, no new paradigm that does not incorporate the 'C' in ACID is broken.
Yeah, it's a bad idea to give external devices truly direct access to memory. So map it through virtual memory. Or you can disable the OHCI hardware mapping, albeit with an efficiency penalty. Of course if you're close enough to a machine to be plugging things into it, security is somewhat moot (unless someone cons you into hooking up a trojan device, but that's a bit too Mission Impossible to be plausible).
The real problem with USB vs 1394 is that USB is master/slave and 1394 is P2P. Unless that's going away, and I can't see how it would, real world 1394 performance is always going to exceed USB at a given nominal data rate. What does USB 2.0 really give you? Around 40-45% of nominal bandwidth in my experience. Firewire pledges to give you 97%. 45% of 4800 Mbits/s is less than 97% of 3200 Mbits/s.
You didn't get 'sent home' in a body bag or a coffin or a bit of blotting paper in an envelope. You were buried in theatre. The second largest US military cemetery outside Arlington, VA, is in the Philippines.
No good deed goes unpunished
Way back in the Middle Triassic Era (1985 or so) we discovered that the sysadmin password on the school's Econet fileserver could be obtained by hitting BREAK and peeking at a few bytes in low memory. We told the IT staff this: their response was to get very shirty and move the machine to a cupboard to which they supposedly had the only key (you could have picked the lock with your thumbnail). Needless to say this slowed us down for about five minutes until one enterprising lad wrote a nifty bit of 6502 assembler that switched the Econet card in a machine into promiscuous mode and sniffed the (unencrypted) username/password packets right off the wire. This we did not report.
The intent of intellectual property rights law is to render a non-rivalrous good (such as an image of an audio CD, or a copy of a digital photograph) excludable. Non-rivalrous goods are those for which possession by one person does not prevent possession by another (rivalrous goods tend to be tangible, e.g. a car or a hamburger). Non-excludable goods are those by which there is no mechanism to prevent those who have not paid for them enjoying them. Non-rivalrous, non-excludable goods (AKA public goods) tend to be things like a beautiful sunset or a free concert in a park (the park itself is non-rivalrous and non-excludable, up to a point). The purpose of IPR is to assign a more-or-less temporary monopoly on a non-rivalrous good in an attempt to make it worthwhile for content providers to continue making new content.
If the artefact in the RPG was non-rivalrous, then (other than the assault and battery) the perpetrators would have been guilty of copyright infringement, which is usually treated as a tort (although in some jurisdictions it is liable to criminal sanction). But since the original owner relinquished his ownership of the artefact and could not subsequently enjoy it, it was rivalrous, and thus the perpetrators' actions constituted theft with violence, i.e. robbery.
It's all Greek to me
Hippopotamus means 'horse of the river', so the plural should probably be something like hippoipotamos, 'horses of the river'.
And the plural of octopus is octopodes; rhinoceros, rhinocerotes.
I am reaching for my anorak.
FMA? In 2012?
It's pretty pathetic that they've waited this long to add FMA to the architecture. The PowerPC 604e in my old PowerMac 8500 had that back in the mid 90's. I wrote some bitching matrix multiplication code in assembler that used it.
Why do you need some fancy IDE for PHP development...
...when you have emacs?
If you try to buck the market...
...the market will buck you.
Saturating my relatively thin cable connection works out to about 2/3 TB per month. That's unrealistic, but I usually run through a tenth of that at least, or 60Gb/month. Someone has to pay for that infrastructure, and that investment has to return at a rate that makes it viable. This is really quite simple: no-one in their right mind is going to invest umpty-squillion simoleons in something if it exceeds the present value of the revenue stream they rationally expect to derive from it. It's all very well crying about the fat cats capping your bandwidth, but the money has to come from somewhere. Trunk bandwidth is relatively easy to scale, but deploying fibre-to-the-kerb is very, very expensive (i.e. on the order of $100 per metre to dig the road up, lay cable, and reconstitute the surface). Switching hardware is not cheap either, and it's a constant battle of Moore's Law lowering of hardware costs vs. Parkinson's Law of ever-increasing bandwidth demand. There isn't a magic bandwidth fairy that pays for all this. Either it's paid for through government subsidy (taxes) or directly via the consumer (higher bandwidth costs) or the bandwidth you're quoted is not available (caps/contention). I fully agree that the terms of service should be as explicit as possible in detailing what the customer will receive. Having said that, the dominant driver in lower price-per-gigabyte is a strongly (and truly) competitive telecoms market, and that is one area where the US is well and truly shafted. You really want cheap broadband? Abolish the FCC.
My policy was zero tolerance
As a doctoral student, I used to supplement my meagre income by working as a lab assistant. There was good dosh to be made marking lab books. I took enormous pleasure in marking the idle little toads down for every spelling and grammatical error they made. There were howls of protest, naturally, but I prevailed. The fact that this was in an electronic engineering department rather than law school was neither here nor there: correct orthography and grammar are an aid to clarity and a courtesy to one's readers.
xjy: you're talking bollocks. Insisting on correct spelling and grammar is not a fetish. Allowing 'variant' spelling, punctuation etc. breaks the standard. When Microsoft do that everyone screams like a banshee. It's not that one set of spellings is inherently more logical or superior to another. It's that it's (semi-)fixed, and everyone can read the RFC (AKA OED).
Hoist the black flag and start slitting the throats of the illiterates!
Nukes are problematical
Nuclear power has to be of the breeder type otherwise there's not enough fuel to last. Uranium is a genuinely limited resource in the way that coal, say, is not (we've enough coal for centuries of consumption).
As for Chernobyl, it was pretty bad for the first responders who had to dump bags of sand on the exposed core, but subsequent deaths over a wider area are almost statistically undetectable. And that accident is the only one of its type ever to have occurred.
The Green fascists are among the most repellent people on the planet. If tomorrow a non-polluting, abundant energy source was discovered, they'd be horrified. At heart they just don't like people very much.
Burn it! Burn it all!
If the technology providers are compensated (which they probably should be as they have been acting in good faith, no matter the perniciousness of the ID card scheme in general), then part of the deal must be the surrender of all documentation, electronic and paper, that the providers have gathered and created. This means every memo, every private note, every back of the envelope sketch, every design document, every CD, every backup tape, every hard drive in every computer that has been used to work on the project. Once all this has been obtained, it must be securely destroyed (papers shredded and burnt, hard drives disassembled and the platters smelted down to slag etc.). This way the hurdle to reimposing the scheme when Labour eventually get back in will be as large as it is this time, thereby postponing its implementation until they steer the country into the ditch again and get voted out.
Fire hazard icon for the lovely bonfire we need to make of this Stasi-like proposal.
Call me when they build this round a FEL
Meh. It's a chemical laser. Those things can only go a few shots before the reactants are used up, and they create a load of really, really toxic waste products. I can certainly see the attraction of frying a truckload of Jihadis completely silently from 20 clicks away - if for nothing more than psychological reasons.
What we really need is a free electron laser capable of MW power output and low cycle time. That really would be a deathray worthy of the name.
Fire hazard icon for the pyrotechnic hijinks possible with your laser-armed gunship.
This is a potential security hole
Admittedly, if someone has admin access to your box, you're in all sorts of trouble. But one possible security hole due to this exploit does spring to mind: if the random number generator has been used to generate, say, information used in a cryptographic application, manipulation and/or knowledge of internal state might possibly permit a replay attack against data secured before the attacker elevated himself to admin level. It's a reach, I admit.
As John von Neumann said, "Anyone who considers arithmetic methods of producing random digits is, of course, in a state of sin." One nice way of getting real random bits is back-biasing a CMOS junction into avalanche and then feeding TTL-level edges to pin 10 (NACK) on the parallel port. Count the time between edges and you get a damn good source of truly random data.
Oh, wonderful. So now the DRM cretins have hijacked the ACID acronym. When I saw the headline, I wondered how the MPAA had managed to compromise the ideals of atomicity, consistency, isolation and durabilty.
If you have two independent orthogonal Gaussian distributions around the aim point (in this case left-right and up-down), then the joint probability distribution describing the distance of the dart from the aim point is a Rayleigh distribution, not a Gaussian. The angle about the aim point is a uniform distribution in [0, 2 Pi]. The probability of actually hitting the aim point is zero. The mode of the PDF is the standard deviation.