Comment "will rebooted": it is self-aware! (Score 2) 65
If this computer can decide to reboot itself, it must have now reached self-awareness!
If this computer can decide to reboot itself, it must have now reached self-awareness!
My favorite is the Apple ][ disk controller, most notably the read synchronization and decoding achieving 5, then ultimately 6 useful data bits per raw 8 bits, using little discrete logic and a small (P)ROM.
Recently had this situation.
Nirsoft's free "SearchMyFiles" http://www.nirsoft.net/utils/search_my_files.html has a straightforward Find Duplicates mode which helped a lot. It is easy (the most "complex" is designating the base locations for searches as e.g. K:\;L:\;P:\;Q:\), fast, never crashed on me, and had only cosmetic issues ("del" key not working). I recommend running it with administrative privileges so that it does not miss files.
AMD just clarified that Bulldozer does have 2 billion transistors after all, but only 1.2 billion work.
Link please?
http://dl.acm.org/citation.cfm?id=2046756
"..we describe a practical attack on XML Encryption, which allows to decrypt a ciphertext by sending related ciphertexts to a Web Service and evaluating the server response. We show that an adversary can decrypt a ciphertext by performing only 14 requests per plaintext byte on average."
Impressive!
I now see your point: a CAs does not guarantee against MITM in the same way a safe does not guarantee against robbery.
CA does not guarantee that there is no MITM either
Can you please explain, preferably with a link to a reference?
Common wisdom is that good CA + SSL should protect against MITM, including if the DNS service is comprimized.
This is *NOT* related to the recent crypto break, as demonstrated by the release note stating
Supported hardware:Sony Playstation 3 Fat, firmware version 3.21
Francois Grieu
It's easy enough to slipstream (lots of) extra drivers and periodically update a master install
Any pointer to (or hint) for some "Slipstream for novices?" Explaining in particular how do you deal with
- disparate versions of serial-number protected things (MSO and Windows XP Pro/Home, or worse vendor-customized Vistas/7)
- machines where XP needs extra drivers to boot a SATA device
- drivers that seem to only come as an interractive installer (ATI)
- patch tuesday routine
This one seems to work
http://dl.free.fr/oTyRx6Wfi
> What options do you have to protect your self from Van eck phreaking?
One option to consider seriously is: paper ballot inserted, in a voting booth protected by opaque curtain, into an opaque paper envelope, which is then publicly dropped into a transparent urn, which is left under public view during the voting, and publicly shaked before the counting process.
That's how 90% of the votes are cast in France for decades [the "transparent" bit was added some 45 years ago]. Not only is it secure against Van Eck phreaking before its invention, it has great resilience against many kinds of fraud, and most voters are able to understand and check the process.
You still have to guard against quite a few things, including
* unsuitably opaque envelopes;
* bulletins printed on paper of different color/size/material [even if the envelope is opaque, it is usually not sealed, and sometime some portion of the bulletin (hopefully the back side, if the bulletin is folded) may be glanced at thru the opening; also the weight/stiffness of the bulletin may be revealing]
* hidden cameras in the voting booth; including those built into cellphones held by the voter [because the voter could be trying to prove what (s)he voted [in order to sell her/his vote or avoid retaliation if s/he did not vote as instructed].
Actually, in some locations much closer to you than half the circumference of planet earth, it may happen that voters are threatened to be beaten/killed is they do not vote as instructed; and maybe, on election day, a few of those who voted could be beaten publicly (often: regardless of what they actually voted, or based on their perceived opinion), in order to make the threat credible to those who did not vote yet. In these circumstances, the voters must be able to really trust the secrecy of their vote.
François Grieu
According to numerous online sources, raw numbers are:
51 out of 8187 found infected in the vaccinated group;
74 out of 8198 found infected in the control group.
The most basic course of statistics tells how to proceed from here: test if the null hypothesis (vaccine has no effect) remains plausible despite this evidence. Conditions are ideal for the chi-squared test.
We get Observed values 51, 74, 8147, 8123; Expected values 62.504, 62.496, 8135.5, 8134.5; then sum((O-E)^2/E) = 4.267, with two degrees of freedom.
Conclusion: the null hypohesis is rejected with only 88% confidence level.
This is not enough to confortably say that the vaccine has any benefit. Odds of the contrary are about 1/17.
This is much less reason to trust that the vaccine reduce infection rate by 31.1%, as reported in some press articles. Odds are 1/2 that it is less efficient than this.
Francois Grieu
The moon is made of green cheese. -- John Heywood