Finally, an Ad Campaign Aimed At Monkeys
Probably would improve the ad campaign.
McAfee CSO Issues Warning On the 'New Cold War'
No, that's really how patients work.
Most people, when told by their doctor, "You need to lose weight or you'll get diabetes," do what? That's right nothing. "You should be exercising for 30 min. 4 times a week," and yet most people don't change their habits. "You should have a biannual checkup, and get a colonoscopy every 5 years, a mammogram or prostate exam...."
Yes there are some things that doctors must take from a reactionary standpoint. But since we don't have magic pills yet, the only proactive thing a doctor can do is give advice, which frequently gets ignored.
You wouldn't blame the architect who told you to keep your house painted when your paneling start rotting through. Don't blame doctors who tell you how to maintain your body, or the security experts who tell you to choose strong passwords.(or how to write secure software) Their advice is good, but all to frequently ignored.
Verizon Customers: Say So Long To Unlimited Data
56000 kbps / 8 bpB * 60 s/min * 60 min/hr * 24 hr/day * 30 day/month =
18 144 000 000 bytes per month == 18 GB/month
$25.34 for phone plus $11.60 for dial-up =
$36.94 for 18 GB per month
Yeah, so thats at continuous use, but it wouldn't be cheaper than land lines. (offer not valid in all places, local rules and restrictions may apply)
And about your sig, may I direct you to: The FAQ.
i = 257 & 0x0F;
c = "0123456789ABCDEF"[i];
I'm actually a little confused by this... maybe it's just a typo?
257d == 100000001b
257 & 0x0F == 0000 0001b == 1d == 0x01
Which I assume is the wrong result. (I'm pretty sure we are trying to get a pointer to the character 'F' in the string.
Also, I'm guessing the reason why this is supposed to be 'safer' is because had you used 255 instead of 257, you would guarantee that i would only be a byte long. Except that with a 16 character string, any values of i larger than 15 (00001111b) are invalid, so in order to prevent c from pointing someplace beyond the end of the string, which is what I think your goal was, the code should be:
i=15 & 0x0F;
But maybe I misinterpreted what you were trying to do.
Electrical Problem Pushes Back Endeavour Launch
2.360M / 450M * 100 = 524.44%
Yeah, I agree, we are WAY over spending on renewable energy.
XXX Goes Live In the Root Servers
and are tech savvy enough to work around government internet filters.
If they are tech savvy enough to work around government filters, why can't they work around a domain name filter?
The Case Against GUIs, Revisited
I'm curious, how is a gui better for the handless? I know some people use computers with sticks that are attached to a headband, but that seems like it would be easier to use with a keyboard rather than a mouse.
The only thing I'm coming up with is some sort of eye-tracking program, but I don't see why that couldn't be used with an actual keyboard, if not a virtual one. I'm not going to guess at whether or not it's faster, but I imagine errors from faster "typing" could be corrected in much the same way that swype corrects typing on touchscreens.
Gmail Accidentally Resets 150,000 Accounts
not everyone has outlook,
So use Thunderbird or Mutt or Mulberry or Evolution or Alpine or hell how about any of the others in this list under freeware or open source.
Email is based on open standards. There are hundreds of email clients if you are willing to take the time to look for them, and all of them (arguably) are better than Outlook.
HarperCollins Wants Library EBooks to Self-Destruct After 26 Loans
I knew this was the case in Canada, but not in the US.
In case anyone else didn't know about what the parent is talking about
Google x86 Native Browser Client Maybe Not So Crazy After All
Yeah I got that from reading the comments, but there wasn't any mention of any limitations as to what the applications could do in the article, just a limitation on how you could run them. In reality, the applications are sandboxed, so they aren't running in full user mode. If they can break out of the sandbox however, all of the possibilities in my above comment are available.
Google x86 Native Browser Client Maybe Not So Crazy After All
Wait, Windows 7 is an OS right? Sweet I'm safe from viruses! Let me just uninstal my anti-virus....
Win7: Would you like to run "Please_send_my_passwords_to_hackers_in_Russia.exe"?
Me: Sure why not, my OS wouldn't let a native binary do anything unsafe...
Google x86 Native Browser Client Maybe Not So Crazy After All
I can still cause plenty of trouble in user mode. I can delete user files (which are usually the ones that can't be replaced, so you have to revert to your las backup), access the network, change the $PATH or user startup scripts, and potentially screw with any of the other applications running in the same user session. If I knew what I was doing, I could download a hacked sudo binary, and change the $PATH to include it. The next time the user doesn't use the full path to sudo to get elevated privileges, I can store the password, and can now gain elevated privileges at any time I choose.
This will only work if the account can sudo, but I expect most home users are working with an account that can do so, and I can do the same for su, which doesn't have that problem. If the user never elevates their privileges, I just wasted my time, but I expect the process would be automated, and it only has to work once on each machine.
So yeah, I'm only running in user mode, but for most purposes, user mode is 'good enough'.
Comment Profanity by Language
Or maybe you underestimate the intelligence of the typical /.er.
Ok, I'm sorry, I couldn't even get to the preview button with a straight face.
High Severity BIND Vulnerability Advisory Issued
He could be referring to the lack of DNSSEC. I understand DJB's position on DNSSEC, and he is welcome to not implement it, but since DNSSEC is being adopted as the secure dns system, those of us wishing to use it are no longer able to use djbdns.
Security is more than just preventing privileged escalation and taking control of dns systems. There is risk of spoofing and cache poisoning, (which djbdns has a good record with) which DNSSEC aims to correct, DOS (both as described in this article and DDOS) as well as other attacks.
DJB will not pay out for DOS attacks, as per your link. He explains that the dns system is too fragile, (probably true) and that djbdns is less at risk than BIND. (almost certainly true) However, I have to wonder, if this article were about djbdns, would the finder be paid? There is most certainly a problem with the code, and while a DOS is not as serious as say a cache poisoning, it still has the possibility to be a major problem, and this DOS is not predicated on 'drowning' your target with traffic.
Teacher Suspended Over Blog About Students
I think you are to hard on the teachers. Many of them are trying their hardest, many on them succeeding in the face of great educational challenges. (See: Stand and Deliver) ; )
I'll admit a somewhat biased opinion, I was in the AP program and therefore had the better teachers of the school. However, I don't think the primary problem lies with the teachers, but with the school administrators, (ok, some of the teachers are a problem, but they get promoted to administration fairly quickly) and with some of the parents.
The thing slowing classrooms down isn't lazy teachers, but unruly and lazy students. They are the ones that lower the class average so that it becomes necessary to curve the scores so you don't have to hold back most of the students. Arguably the teachers could hold them back anyway, but the administration frowns on that. (I actually had one teacher that consistently flunked 30-50% of his class. It wasn't because he was a bad teacher, he had a 100% pass rate on the Chemistry AP exam 3 years in a row. He just didn't put up with any of the students who didn't do the work. The first year he was required to pass at a minimum percentage of students was the first year he didn't have a 100% AP pass rate. It was about 60% that year IIRC. He no longer works for the school district.) They are also the students who disrupt the students who are actually there to learn.
Teachers need to be given the ability to punish students in a meaningful way again. There are some parents who don't teach their kids good behavior anymore, and ultimately those students slow the rest of the class down. However, those same parents as well as the administration refuse to let teachers assign punishments that will get the students to shape up. The parents and administrators also need to back the teachers up. How many of the bad students do you remember from your school who were as afraid of their parents finding out about being assigned detention as you were of yours?
Chinese Written Language To Dominate Internet
It is doubtful that this phrase will ever reach equilibrium.
Yes, I know it repeated a set of 4. That's not equilibrium.
Chrome Does Have a Caps-Lock Key After All
You could swap tilde and esc, turning it into a "Linux" keyboard actually available for sell from Unicomp, although I've never seen anything about it being used historically. That would move esc closer, and would put it above the homerow, which is supposed to be easier to reach.
Hi-Tech Nativity Security
The key word here is tolerance. Everything the GP said could equally be applied to someone who was raised to be a "good person". (and in reality, religion has very little to do with it.) Most religions put a great deal of weight on being/raising your kids to be good people, and as a result there may be a higher average number of "good" people in religious communities.
As for your comments about religions condemning followers of other religions to hell, I think you have a skewed understanding of religion. While religions frequently say that nonbelievers will be punished, most religious people (and church leaders) believe that it is far more important to be be a good person than to be a member or the correct church. (Trust me, there are bad people in all religions, and most churchgoers wouldn't have any doubts as what will happen to those people) Antecedently, basically all of the protestant friends I have are of the opinion that since God is supposed to be forgiving, anyone who is trying to be a good person will be rewarded. Some Churches don't even believe in a "hell", but rather teach that you will be rewarded according to you actions in this life. (examples: Mormonism, Buddhism) My understanding of the Bahá'í religion is that they don't regard hell as a punishment. I don't know enough about Islam or Judaism to be willing to comment on their beliefs, but I'm willing to bet that the majority of their followers are likewise tolerant of other religions and may not automatically assume nonbelievers are doomed to hell.
Remember, most beliefs are not the polarized fields that some of the media (and frequently others) would have you believe. Most people's beliefs may align with a belief system, but they don't go to extremes. Not all Islamics are terrorists bent on destroying western culture, not all open-source users are anti-close-source, and not all feminists have hair on their legs. :P
The Odd Variations On 3G Per-Megabyte Pricing
parent didn't read/understand GP.
Intel Talks 1000-Core Processors
Slow down there. *Cache* comes with the extra overhead of load/store.
Example: I want to add two numbers
add $1,$1,$2 # Add reg $1 & $2 and store in $1
lw $1,0x8001 #Get the first memory location
lw $2,0x8002 #Get the second memory location
add $1,$1,$2 #Preform the addition
sw 0x8001,$1 #stro the result back into memory
As you can see, we have a gain of 3 instructions, and probably even more clock cycles, depending on cache read speed, and whether or not the memory of interest is even in the cache (cache miss).
As for your discussion about DMA, it *could* compare with the speed of registers on some implementations. That's a matter of engineering, And at an electrical engineer, I'm going t o make the guess that the highest performance will always come from registers, simple because they are located closer to the ALU. (cache can't be significantly closer because the cache is frequently bigger than the rest of the processor. It's a simple matter of weight^H^H^H^H^H^H geometry.) DMA has other advantages that make it useful, as as in your example about the ARM processor, but strcopy() on an ARM processor is executed by a dedicated hardwired circuit. (copying memory doesn't actually require preforming calculations on the data, so the ALU isn't needed and the data doesn't even really need to hit the processor at all.) For computational work, registers are still (currently) faster.
As I write this, it occurs to me that the above 1000-core processor with the cores distributed throughout the cache field might not allow all the processors to remain busy, but might allow for the paths from the processor to the cache to be short enough to make computation with DMA as fast as operating from the registers, but I don't know how clock skew across the processor might affect this idea.
Asm-Coder hasn't submitted any stories.
Asm-Coder has no journal entries.