Comment Re:Hobbit (Score 1) 278
Fine. Once a week, you get to hold your breath, go through the airlock, and stand on the surface of the planet - naked - for five minutes. That should solve your vitamin D problem.
Fine. Once a week, you get to hold your breath, go through the airlock, and stand on the surface of the planet - naked - for five minutes. That should solve your vitamin D problem.
You're at sea. Doesn't sticking the whole thing under water help?
Bollocks. In China maybe. Not in the Western world. And even here, most addicts were, as usual, alcohol addicts.
"Nobody uses C or C++ because they love the language."
I take issue with that. I absolutely love C. I also abhor any movement to 'prettify' algol-like languages (python, java), which I consider useless.
People who say 'C/C++' are likely to know neither language.
Per-connection MTU's are a pain. You shouldn't be making that point if you think that routers having a PNAT table is a hack - having state is awful. And IPv6 has other flaws too: some headers fields are unprotected from bit-errors in transit. There is no specification as to how many extension headers I'm allowed to use. Higher layer fragments are completely unrecognisable to stateless concentrators (more so than in IPv4). UDP- and TCP-checksums are not allowed to be all zeroes (which was neat when you provided a better checksum yourself over, you know, fragments, which got ripped out).
No there's plenty rotten in the state of IPv6. And it's not just because 'interests' ripped things out.
No, we certainly are not all targets of nation states. But there are more potential targets of nation states than that currently actually have proper IT security measures in place. I'm talking about you, waterworks / electricalworks / etc. To say you can 'predict' an attack is to say that you can 'predict' Putin's next move. You can only anticipate statistically. And how do you do that? By using security products to fill in a security plan.
What is that Assange guy doing?
? It's quite common to perform a hash in a loop, if only to make checking algorithms slower. But also to prevent rainbow-tabeling. I don't think that the bankruptcy of your former company had anything to do with their password treatment policies...
WFTAmIReading.jpg.
The cat is out of the bag. Crypto and its application is an academic subject now, with plenty of companies and open-source projects using the fruit of the work. That is to say, for another ten-fifteen years or so. Then, quantum will start taking it all apart. The amateurs will not have the resources to follow there.
In America, cooperations do this.
I see someone dusted off this old boondoggle again.
This is not about a workplace situation. This is a about doing volunteer work. You know, the environment that requires a little begging from the person who initiates it. Something about making sure you're not excluding somebody who might otherwise turn in great work. Because you're not *paying* them, you're kindly asking them if they want to do something for you in their spare time.
Well, one of the reasons of cybermageddon could be two gangs having at each other.
It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption.