Comment Re:Shame on them (Score 1) 181
"It was their dollars that created almost all of the encryption algorithms. "
Theirs, and a lot of Belgian Euros belonging to Vincent Rijmen. But other than that, yes. US Dollars.
"It was their dollars that created almost all of the encryption algorithms. "
Theirs, and a lot of Belgian Euros belonging to Vincent Rijmen. But other than that, yes. US Dollars.
I think you should step away from your terminal and stop using the Internet. After all, it was developed by DARPA. And DARPA also developes weapons. Go on. Be principled.
Not necessarily: to come to this point, you need two things: development quality, and auditing quality. The first to create, the second to discover, the bugs. The second is what you get plenty of, in the open source world, presumably. But you assume that an open source developer is just as good as a closed source developer. That might not necessarily be true.
I dread to think: what's the IRL equivalent of a shadow-ban?
He was just testing out to see if slashdot has started transmogrifying posts through filters yet.
You're absolutely right. s/functional/declarative/g; However, you're also wrong: SQL definitly *is* a declarative language.
HTML is a functional, not an imperative, language. Perhaps the reason that you don't recognize this, is that you never knew there is such a thing as a functional computer language. Both types of computer languages tell a computer what to do, but they do it each on their own level. Functional languages don't care how a problem is solved, as long as it is solved. Another example of a functional language is SQL, another example of an imperative language that renders graphics as its core business, is postscript.
1) It's beautiful hardware. 2) I don't want to run an OS that the NSA can simply summon the passwords of.
With IPv6 the IETF has shown that they're on a long path toward oblivion. Too many cooks in the kitchen.
Governments need to make their jobs cushy, because a) they are already fraught with risk, b) they couldn't afford the salaries if they weren't this cushy. Protection from being fired is part of the job.
Article seems like a bunch of selective quoting in order to make someone look bad. An anecdote by a speaker, a confused musing by some scientist, and all of a sudden we have faux science created by unabashed nationalism. Right.
Huh - DDoS traffic looks like a virus signature now?! An IDS filters traffic based on (pre-distributed) rules. They look for virusses. DDoS traffic is legit traffic, but just too much of it. I don't see how you could stop a DDoS on a router by turning it into an IDS.
I'm not saying it's the begin-all, end-all solution. I'm just saying that until you have an AI algorithm that can discriminate legit traffic from illegit traffic, you're forced to use something that will, in effect, transfer your firewall rules upstream. It would have to be combined with other measures (monitoring point-of-origin networks, anycast, ISP application specific logic (eg. TCP traffic shaping of ISP client hosts' SMTP traffic)).
Send some sort of ICMP message upstream that indicates your maximum capacity for handling traffic. It's a DOS vector in itself, but you could minimize it.
There are two ways to write error-free programs; only the third one works.