Comment Buffon's needle (Score 2) 311
Another method :
http://en.wikipedia.org/wiki/B...
Another method :
http://en.wikipedia.org/wiki/B...
Because if boobs were brains, she'd have three Nobel medecine prizes.
I totally agree with both of you.
But the questions he answers isn't : "My toy isn't working as expected. Who wrote this shit?" but "This 'bug' very much looks like an intentional backdoor. Does git blame returns joe@nsa.gov?"
Implementing SPF can also do the same thing, the issue is that mailing lists don't rewrite the from headers so despite having been forwarded through the mailing list server the original sender is still shown in the headers, only the mailing list server isnt really supposed to be sending mail *from* other people's addresses...
So either you allow mail to come from anywhere with any sender address, which lets mailing lists and email forwarding work fine but also makes spoofed spam very easy...
Or you don't, and break the above...
Really legit mailing lists should be rewriting the sender headers to reflect that the mail has been redelivered by the mailing list, the only difficulty this would cause is when users try to reply directly to messages rather than forwarding their replies to the list itself.
"I'm working on a new independent project. It will soon become the new Facebook, and I'll be billionaire next quarter. The only problem is that I don't know which luxury yacht to buy with all this money. I've been looking at Lady Moura, Christina O, Pelorus, Venus and others. What do you recommend? What problems have you run into with the ones you've tried?"
+1
In French Guiana, isolated tribes saw white men coming at them, and basically telling them :
"Congrats, you're now officialy unemployed French citizens. You don't know what money is, but you'll receive XXX Francs per month from the government. You can go visit the next town, and discover what rum and hookers are. Not much else to do though. kthxbye!"
Also makes the code more difficult to debug, more difficult to fix, and increases the chances of exploitable bugs existing in the first place...
How many times have security holes resulted from trying to over complicate the code?
PARSE ERROR:
"Michael S. Rosenwald was so disgusted with myself.'
The brain was not designed for reading Andrew Dillon."
Wait, what??? Could you please write shorter paragraphs?
+1. Very insightful and fun answers.
So, who is backporting security patches to linux 2.0, or KDE 3.0?
Anyone who is still using such devices..
There will be embedded devices out there still running ancient versions of linux, and still receiving manufacturer updates. In many cases the OS will have been minimalized to decrease the amount of effort required to update it, which is another advantage linux offers.
The fact that very few people still use such old linux devices is another matter, there is far less reason *not* to upgrade your linux devices - support for existing hardware is rarely dropped, memory requirements rarely go up, there are no huge costs involved etc.
FYI i still maintain several old linux boxes...
One running a 2.4.x kernel, because it's used to control an SGI machine that requires a proprietary kernel module..
Another running a 2.2.x kernel because i use a third party encryption program that was never ported to newer kernels.
Both of these systems despite having old kernels, have relatively up to date userlands and the services exposed to the network are also kept updated.
In the case of XP, clearly the up front costs have long ago been recovered many thousands of times over.
Well that's the whole point, you don't need to provide support indefinitely you only need to provide the code to arbitrary third parties and they can continue providing support if you choose not to.
Look at all the embedded devices out there still running linux 2.4.x (or even older), and still being actively supported by the device maker. If there's a market for something and people have the code - someone will step up to provide support.
From TFA: "At the start of each round an independent judge flips a fair coin and tells your opponent the result but does not tell you. If the coin came up heads your opponent must play rock."
The opponent isn't forced to get at least 50% rock after any number of plays.
PROTIP: None of us has any chance of surviving, wherever we end up.
Humans are interesting animals.
We are still 80% dependent on fossil fuels for our energy needs and have no clue what we could use at this scale when they're depleted.
But let's worry about what could happen to the sun in 5 billion years!
If you want to put yourself on the map, publish your own map.