Comment Re:Darmok and Jalad at Tenagra (Score 1) 512
Lucy in the sky with diamonds
Colonel Mustard in the ballroom with the lead pipe.
Lucy in the sky with diamonds
Colonel Mustard in the ballroom with the lead pipe.
and has found the accelerator...which is usually non-functional because I'm out of gear.
It's not non-functional. It makes you sound awesome!
(The Soviets saw Star Wars as a complete joke.)
Not true. Gorbachev was scared shitless over SDI, and it was really the only big sticking point in negotiations that could have reduced nuclear weapon stockpiles far more drastically in the 1980s than what actually happened. The Soviets responded to the threat of SDI by ramping up production of ICBMs and nuclear warheads, on the theory that it would be cheaper to overwhelm SDI with ridiculous numbers of targets than to try to devise a technological countermeasure or to produce an SDI of their own.
For reference, I highly recommend this book.
Also, none of the movies were particularly good. The series is, full stop, better than star trek; But the movies were meh at best.
Are you kidding? B5: In the Beginning was amazing, to the point where I'm torn when introducing someone new to the series whether to show them ITB first or just start with the Season 1 pilot.
That said, Legend of the Rangers, with its Tae-Bo based human interface scheme, was horrible.
I would totally buy its brains out. I'm warming up my Kickstarter account as we speak.
As I recall it, Saddam said the UN inspectors were welcome, as long as there were no American inspectors there, because he was convinced they were CIA spies.
No, Saddam didn't want the inspectors there because he didn't want actual evidence to get out that he didn't have WMDs. He was more afraid of Iran than he was the US, and he said as much after he was captured and before he was executed.
The capital is on its sixth day of an 'orange' smog alert â" the second-highest on the scale â" with the air tasting gritty and visibility down to a few hundred meters.
You mean it can get worse?!
The solution it comes up with is correct (it includes/excludes the links you mentioned), but for some reason it's drawing the graph incorrectly.
OMFG, Timothy, did you really just copy and paste that paragraph without bothering to edit it? You didn't even bother to cut out the stock quotes from the middle of it.
Vulnerable devices are any device that is running a version earlier than 4.2 (in which the vulnerability was patched) which is a staggeringly large amount of the market.
The vulnerability is in Android itself rather than the proprietary GMS application platform that sits atop the base operating system so it is not easily patched by Google.
But apparently not so difficult as to make it impossible? Is there something I don't understand here, or was this summary just horribly written?
I still have a collection of really tiny Tabasco bottles. One with every meal, you know.
An old Army Special Forces sergeant once explained to me that before an op, they would take a bunch of MREs apart and toss out all the extra things they didn't need, like duplicate silverware and such, and pack the rest up to take with them. But they always made sure to take some Tabasco, because with a little bit of that, "you could eat the crotch out of a dead camel."
It's not just the exchanges that have to have confidence behind them. The exchange (or, at least, some Bitcoin owner out there) has to have confidence in the short seller as well. This is because the short seller borrows BTC to sell on the exchange. The short seller is then expected at some point to pay back the lender in BTC to cover the loan. Because of the additional routes for anonymity that Bitcoin provides, the short seller could abscond with the non-BTC currency as long as they can launder it, leaving the lender high and dry.
As you noted, regulations, law enforcement, and substantial recordkeeping on the part of brokerages keep this from being particularly successful in normal equities trading. If nothing else, a brokerage might require a short seller to keep cash on hand sufficient to cover the short sale, and then call in the debt if it looks like their cash on hand is coming close to being insufficient to cover. (Some brokerages let you use a margin account for this as well, if you have good credit.) The short seller would then be unable to run off with the cash because the brokerage would not release the funds until the short sale is covered. This is a solution that some Bitcoin exchanges might have problems with, because they would be keeping government-issued cash on hand in a customer account as well as BTC, which opens up several other cans of worms.
Filtering ingress packets with RFC1918 source IPs may be useful in some circumstances, but it doesn't help in amplified attacks.
The source in these cases will always be a legitimate uninfected machine that is just doing its job (such as a DNS or NTP server). The source IP will be whatever IP the requester expects to see, such as the destination IP of the initial request.
In amplified attacks, the forgery occurs in the initial request packets, all of which have the source IP of the DoS target, which must always be an actual external IP. This is where egress filtering is useful, because none of these requests should have an IP outside of the subnet serviced by the egress filter.
Are you telling me that I might have a shot at a 5-digit user ID?
Sign me up, dude!
(But seriously, sign me up.)
The USGS says that daily overall water use in the US is 410 billion gallons.
Basically, if this report wanted to have meaningful statistics, they would have focused on small watersheds and communities currently stricken by drought, to look at the water usage of the community as a whole and of the fracking taking place in that area.
Also, beta sucks.
Living on Earth may be expensive, but it includes an annual free trip around the Sun.