Comment Re:High School for Girls Academy (Score 2) 283
Windows or Linux fanboi, both agree Win8 set us up the bomb.
Windows or Linux fanboi, both agree Win8 set us up the bomb.
sign your own key. Use PSK with whomever you are communicating with.
-nbr
oblig: as long as the cores don't have a BSOD...
That would be bad.
But in all honesty, I do like that his efforts are being spent on something like this, where the benefit to humanity is great.
I'll go with load them on a plane to fly them back to US soil for trial, plane accidentally goes down in the ocean.
-nb
Only if my insanity matches their insanity, else they will attempt to bury me. (Or burn me at the stake).
Yes, but the union also had in the contract that breads had to be shipped separately than cakes, thus you had to send two trucks to a store to stock it.
It's not all the union's fault, and it's not all management's fault. They were both culpable.
I'm an ADHD Aspie (yeah, interesting life) and I think that's not too far off actually...
Curious about your opinion behind that statement.
Yup.
Wall St is the epitome of "If it ain't broke don't fix it"
Lol, no, I don't think so. I took a job that pays $20K/yr less because there weren't assholes in the office. Having actually worked somewhere that was devastatingly dehumanizing* I realized the value of happiness.
-nbr
You know it's time to quit when you're in the dentist office, getting a root canal, not numbed because it's infected so badly the *caine's don't work, and that is preferable to being in the office. Moment of clarity.
nah, we're using it to prove to your lady that we are you, despite what we look like.
My bank has it.
Something I have, something I know.
If I am on a trusted computer I can store the something I have portion and only need to provide the something I know.
If I am at an untrusted computer (or just got a new computer I want to trust) I get a PIN texted to my phone (trusted) that I can enter along with my normal passphrase. the PIN is from a OTP, so is useless after one use or 5 min, whichever comes first.
If I lose my phone I can notify the bank (same as lost card) and both the phone number and stored token are invalidated.
To validate a new phone I take it to the bank.
Actually I think that the first 2 years of high school should focus on things you will need to survive: money management, how financing works and why revolving credit is not a good thing; reading and writing.
The second 2 years should allow either continued academic *or* tradescraft. fo you go the tradescraft route you'll get two years focused on only the stuff you need for a particular field. Plumbing: math and geometry (drain slopes), chemistry (solvents and glues, interaction with metals), and of course hands on.
-nbr
Ah, but this *could* be a good one to many broadcast of information. Have a botnet receive C&C directives this way?
You could even post the QR code in a corner of the video, or embed it in the video data as an alpha channel.
There is a crypto system for that. Schneier explained it in Applied Crypto.
Basically the trick is that of 7 keyholders you need at least 5 (or some other number) that will all enter their key to sign or authenticate data. This can be extended to the signature applied to null (or any other chosen value) being used as the key for an encrypted volume.
It is the system we use at my work to sign software. There are M keyholders with a minimum number of N required to sign the software.
I've got some pizza.
Numeric stability is probably not all that important when you're guessing.