Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Well done (Score 4, Interesting) 95

Sixpack for the win :) Nope, I didn't see the pacman machine, though I have heard about it. When I obtained an Atari from somewhere, I was inspired by the story and put it in the hallway with a copy of Xenon 2 permanently plugged in. Good times were had, until the machine broke. A bit later we got a PC next to the living room TV to watch all the creative-commons-licensed movies shared around the campus on (*cough*) and we played Puzzle Bobble completely to death. So yeah, the game , if anything, was an inspiration for more gaming :)

The PC connected to the TV still runs a menu on top of X that's written by me. I also automated the beer-list to a LCD+touchscreen thing, and while it's made out of bad soldering joints and gaffer tape, somehow that contraption still manages to survive.

Comment Not sure if that'd work... (Score 4, Interesting) 145

From what I know of flash, the 'bad bits' aren't repeatedly bad. The bad-sector-swap-out-routine in most flash drives and USB sticks will actually swap out a sector after a single read that can't be ECC-corrected, but that doesn't mean all the bits in the sector can't be written correctly ever again.

For example, in this article (IEEExplore, so paywalled for you, sorry) a generic NAND flash chip has been tested for bit-error-rates. In the 5K write cycles after an average bit has failed, it only failed to be written correctly 4 times more. That would mean that a single erase-rewrite cycle would write the complete sector without any bit errors 99% of the time: to find 'most' of the bad bits, the sector would have to be rewritten 1000s of times every time the software would want to check the fingerprint.

Not only would that take a fair amount of time, it would also introduce new failed bits. That would mean the ID of the flash chip can only be checked so many times beffore the complete sector goes bad.

Comment Re:score tables (Score 2, Interesting) 153

It indeed is packed BCD. Some processors of that time have special instructions for that kind of notation, which makes calculating with them not much more difficult than normal binary. (Dunno if the 6502c has these kinds of opcodes, though; the Z80 for example does.) The advantage is that it makes blitting to screen really easy: instead of constantly dividing by 10, which is a processor-intensive task, you could just bitshift the number, which is much easier.

Comment Some fun stuff... (Score 5, Interesting) 153

* From the devkit readmes:

2600/7800 DEVELOPMENT KIT<br>
CARE AND FEEDING INSTRUCTIONS<br>
[...]
Feel free to telephone John Feagans at Atari (U.S.) at area  code
(408)  745-xxxx  any  time you have a question  about  using  the
software.   He  wrote the download program and the  transfer  rom
code.   He's the one who did not write any support  documentation
to go with his software.

* From the base sw:
CPX     #1               ;HACK: WE STOP AT 1
BEQ     SELRTS
INX                     ;BIGGER HACK: PUSH X INTO RANGE.
LDA     ZHACKMOD+2,X     ;BIGGEST HACK: TABLE LOOKUP NEXT MODE.

* Ofcourse, we have explicit words:
CMP     #$FF                   ;SEE IF ANY INPUT
BEQ     FUCKYOU
JMP     GOTOSEL                ;GO TO SELECT MODE
FUCKYOU   BIT     INPT4                  ;LOOK AT FIRE BUTTON INPUT
BMI     ATIT4

LDA     #0                     ;ENOUGH TIME HAS ELAPSED TO ALLOW CAPS
STA     $1                     ;TO DISCHARGE SO CONTINUE FUCKING WITH
LDA     #$14                   ;IO HARDWARE

STA     AUDC0,X         ;GO POUND SAND IN YOUR ASS

* Citizen Kane anyone?
LDA     INPT0,Y                ;THESE FOUR LINES MUST BE INCLUDED IN
                                         ;THE FINAL VERSION
AND     INPT1,Y                ;REMEMBER
BMI     FUCKBAR                ;REMEMBER,. . ., ROSEBUD

* In Galaga, at 'a boss hit':
JSR    ABOSSHIT               ; HOW YOU PRONOUNCE IT IS YOUR OWN
       ;BUSINESS

* Liek wtf?
* GROUND TARGET SECRET CODES (SSHHHH!)
*         0       regular dome           logram
*         1       regular pyramid        barra
*         2       detector dome          zolbak (and your mama, too)

*And finally, an original comment which couldn't be more to the point in 2009:
*PROGRAMMERS BEWARE: THIS CODE IS OLD AND VERY UGLY! TAMPER AT YOUR OWN RISK

It looks like Hattrick is written mostly in Forth btw. I personally didn't know they wrote games in that language!
Social Networks

Submission + - The Cultures of Texting In Europe and America

Ponca City, We Love You writes: "The cultures of text messaging are very different in Europe and North America and economics drive the differences says "internet sociologist" Danah Boyd. Americans and Canadians have historically paid to receive text messages creating a stilted social dynamic whereby a friend forces you to pay $.10 simply by deciding to send you something. But now "all-you-can-eat" plans are changing everything. Rather than having to mentally calculate the number of texts sent and received, a floodgate of opportunities is suddenly opened. The weights are lifted and freedom reigns. The result? Zero to a thousand text messages in under a month! All-you-can-eat plans are still relatively rare in Europe. When a European youth runs out of texts and can't afford to top up, they simply don't text. But they can still receive texts without cost so they aren't actually kept out of the loop. What you see in Europe is a muffled fluidity of communication, comfortable but not excessive. Back in America, older users are less inclined to be prolific texters, maybe because they are more accustomed to the onerous plans and never really developed a fluid texting practice while younger."
Security

Submission + - Hardware-secured USB-HDs secure? Well... no. (spritesmods.com)

Sprite_tm writes: "In this review, two hard disk enclosures with integrated encryption, which is said to securely store your data away from prying eyes, are reviewed: one which uses password-based authentication, the other using fingerprint recognition. Are they as secure as the manufacturers want us to believe, or are they as much snake-oil as some other products? Let's just say it might not be a good idea to uninstall TrueCrypt yet..."
Security

Submission + - Biometrical USB-sticks: Not necessarily secure

Sprite_tm writes: "After hacking the SecuStick, a story which got covered on Slashdot too, I received a pair of fingerprint-secured USB-sticks from USB-Secured.com. They were reviewed for usability, looks, and most important: security. They both are advertized to use fingerprints and AES-256 encryption to protect your precious data from falling into the wrong hands. Does that mean that a criminal would need to chop off the fingers of the rightfull owner to get to the data on the stick? Well.... no."

Slashdot Top Deals

Never test for an error condition you don't know how to handle. -- Steinbach

Working...