People actually solve real-world problems, outside of academia, using LISP?
Perhaps the research could help over time those distinctions exist and pair like-minded people together.
I thought most modern games already had systems to at least try and match players with similar skill levels.
Why not let abuse take place online in virtual environments?
Because it sucks and leads to much more offline abusive behavior by otherwise good people after they have been repeatedly harassed.
Instead, this psychology of banning and throttling likely leads to more offline abusive real-life suffering.
The opposite is true. Because the natural abuser is inclined to fight through any system thrown at them, throttling and other attempts drain their energy more than simply letting them post would, leading to more relaxed (or at least less) behavior offline.
Not to mention, we all know that trolls online are probably losers who would never in a billion years have the nerve to say or do anything offensive offline...
Managed languages (like Java and C#) give you a "secure-by-default" memory and execution model that's a lot harder to accidentally mess up.
If you think managed languages will prevent you from leaving security vulnerabilities, you are either not writing significant server software, or your software has vulnerabilities.
The hardest security problems to solve aren't the overflows, it's the features given to users. Think of VB macro viruses, that spread wildly in a managed language. Wordpress is another example of software written in a managed language with tons of exploits.
There are so many examples of exploits in managed systems that it's a display of ignorance to claim otherwise.
Yeah, like anyone can actually read and understand OpenSSL. Perhaps it would get studied more if someone entered it into next year's IOCCC.
It was in the low 50's (about 11C) outside on game day.
The balls were found at 10.5 psi, and the minimum Regulation pressure was 12.5 psi.
So, 84% of regulation pressure means (since pressure is proportional to temp, all other things being equal) that the balls would've had to be inflated in a 338K environment. Which is 150F.
I suppose the Pats could've inflated the balls in a sauna, but it's rather unlikely that the Refs would've failed to notice that the balls were hot enough to burn them when they checked the temps before the game.
In other words, no, the Pats cheated. Did their cheating matter in the end? Nope, the Colts sucked so much that day that the Pats could've played fair and won.
Alas, playing fair isn't something they're all that familiar with.
Don't they now? Web, ssh, FTP, IRC, plenty of servers call gethostby functions as part of standard operation.
You read incorrectly, I'll quote it again: "Most servers don't do a dns lookup of a remotely supplied address.
One of the examples they used was ping. Of course ping does a DNS lookup of the address supplied by the user, but unless you have inetd in a really weird configuration it won't be started remotely. If ping crashes, or even executes arbitrary commands because of a specially crafted command-line, it's not a security vulnerability.
At most sizeof(char *) bytes can be overwritten (ie, 4 bytes on 32-bit machines, and 8 bytes on 64-bit machines). Bytes can be overwritten only with digits ('0'...'9'), dots ('.'), and a terminating null character ('\0').
With only being able to overwrite 4 bytes max, you would think not much could be done, and indeed, mostly they were only able to make things crash. Most servers don't do dns lookup of a remotely supplied address, but mail-servers can, to verify the sender is correct.
Astonishingly, even without being able to write assembly shell-code, they were able to get the Exim mail server to execute arbitrary remote commands. That is the only vulnerability found so far.
Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"