Comment Re:America has jumped the shark (Score 2) 947
She truth, while painful, is good for you.
I remember when my girlfriend dropped a big she-truth on me. It took me a week to recover.
She truth, while painful, is good for you.
I remember when my girlfriend dropped a big she-truth on me. It took me a week to recover.
At last, Sony sees the error of their ways in choosing disks over cartridges!
More importantly to me, is whether or not these are implemented using open standards.
Car-to-Car communication isn't helpful when 10% of them use FORD wireless communications, 10% have GM brand Safety wireless etc. etc.
My Blackberry is set with an 8-character moderately complex password, but the key is to have a try limit. If you enter a bad password ten times, my Blackberry will nuke itself clean of all data.
This is definitely a good idea, as long as the data isn't too sensitive. You need to remember that a sufficiently equipped adversary won't be brute forcing your encryption on the Blackberry, but on their own system after they've extracted the encrypted data. Probably one of the best security measures you can have is a physical chip which contains the key, with a physical self destruct after too many attempts. I remember reading an article about a flash drive like this. This of course assumes that you can make this chip very hardened from an attacker extracting the key.
But I mean if it's only someone casual you're worrying about, and not the NSA you're probably fine.
Thanks. That was my misunderstanding.
Of course as we all know, the whole thing about prisoner's dilemma is that it falls apart in the long-term.
Wait, don't you have that backwards? The prisoner dilemma as I understand it is ONLY stable in the long-term. If you only perform one iteration of the prisoners dilemma, then the dominant strategy is to choose the "bad" move. However if you can account for there to be many iterations then the maximum profit is found in both parties performing the "good" move, which is easier for large corporations who only have a few rivals.
It's never a good idea to abuse hyperbole.
You might become overwhelmed by Glorious Leader's use of strength in html.
"Sir, are there three green lights on the modem?"
Yea. They're flashing.
i agree, it's little different from wifi, but i don't understand why it's better than wifi?
I don't claim to understand this system completely, but that sounds like a feature to me. Crowded apartment building? This gives an alternative to a saturated wifi network.
Just want to make a point here about a common fallacy when doing math in cell phone plans.
If you have a plan for $40 which gives you 450 minutes, it only costs you $40/450=8.9 cents per minute if you use exactly 450 minutes.
For example, If you use 300 minutes in a month, it costs you $40/300 = 13 cents per minute.
If you use 500 minutes in a month, assuming they charge 25 cents per minute overages (the actual number isn't important), then you pay ($40+50*$0.25)=$52.5/500 =11 cents per minute.
This is why tiered plans are deceptive.
I would also be cautious in assuming that since the average phone bill is $36/month that the phone companies are charging $36/month per phone. I would assume that someone as large as a government organization doesn't have to deal with tiered plans, and can just purchase minutes at a set rate. This means that assuming that the price of the phone is negligible (maybe not), the better deal for the organization is simply from whoever bills them a lower rate for the minutes (you or the phone provider).
Most likely though this is a better deal for both of you. You subsidize buying a phone and a plan for the government, and (assuming you would buy a phone anyway for personal use) since you were not using your entire 450 minutes anyway and did not have to increase your plan, you get some of your minutes partially refunded by your employer.
Neat fact:
Raising the partial pressure of CO2 exponentially results in a linear increase in the pH.
This is because the Concentration of CO2 in the water is determined using Henry's Law, a linear relationship between partial pressure in the gas and liquid concentration. At the relevant concentrations the concentration of H+ is linearly related to the concentration of CO2 in the water.
Autonomous Turrets? A Trifle. Just send wave after wave of your own men until they reach their preset kill limit.
That's boring, think of all the stuff you could do while...
hold on, I gotta change lanes...
If the cracker HAS the hashed password file then your security has already been breached. There's about three things on any system that need access to that file: the login system, the password change system and possibly the admin.
The general idea of hashing passwords is that even if an adversary gains access to the password file it can still be secure. This accounts for things that you might not have foreseen, such as intercepted communications. They don't have to access it in storage necessarily. Now you can always say that your users should be using encrypted connections to your server, but the point of the hash is to have a second line of defense, since a password is a very unique type of information where the data doesn't need to be accessed, simply matched. Even if you encrypt your communications, are you sure it is secure? Will it always be secure?
If all else fails, lower your standards.