For 130,000€, I'll go over there right now and clean them all myself. Only 170 boxes so even if it takes a month, not really a problem eh.
April fools i know but, The Speed of Light is simply that, a recognised speed. If I was travelling 10 light seconds at twice the SOL, I would get there in around 5 secs depending on massive magnetic interference. Something could not arrive b4 it's sent, a tiny fraction over 0 yes. I don't believe travelling at the SOL slows time, mearly presents a huge issue where hitting a tiny particle would be a disaster xD the forces involved would be insane. I could also be wrong but prove it!
How 2 piss your users off, do something stupid. This better be back 2 normal tmoz. I read slashdot daily as an awesome news feed. April fools or not, I'm not amused. Will go somewhere else if not sorted.
I disable cookies and ONLY allow the sites I want. I use Firefox and ABP (Ad Block Plus). They can have my IP but that's all they will get. I hate the advertising companies as on some sites, especially when downloading, they swamp the whole page with "Download" buttons which look like the download buttons from the actual website they are advertising on. Total nightmare!
I'm no expert with regards to symmetric encryption granted, but I do know a lot about it. It makes RC4 look like plain-text in comparison. I disagree with regards to using a larger key as it means there is a lot more overlap when rotating the key, why have key(x) when you can have key(x, y)? It's technically as easy hence the speed is only just slightly slower, a fraction. The problem with keys that are 256 is the rotation. I came to the conclusion that there wasn't enough scope to randomize it enough hence the 64K key. I did numerous custom tests with a 256 key and I wasn't satisfied. It doesn't waste any computation and also I found it very good at securing large files. I still can't believe that RC4 is still used with the likes of WEP, SSL. In the end, it'll never get used and just be my own personal symmetric encryption algo
I run tests on RC4 years ago, run it thru a plain text file full of the same char repeated and then run through RC4, guess what? Oh the password is showing every 256 chars, hence the "weak" key. I developed a newer version of RC4 called RC64, uses a 64K (65536 or 256 ^ 2) key. The randomisation process is very complex and the algo was only just slightly slower than RC4, which is very fast anyway. A graphical representation of the 64K key visualized pure white-noise when the key was viewed in grey-scale. They need to start using mine me thinks
:) Oh, and in a 50MB file full of the same repeated char, the password was not even hinted at and no 4 bytes were the same.
Bender for sure so kiss my shiny metal ass
It wont make any difference, the 2 main ways viruses etc get into a machine is: 1). Browser 2). Email. The router acts as a natural firewall so it's all down to the browser, anti-virus and the user being a bit savv and looking out for anything that's not right. Security nightmare my arse! We already have a security nightmare and it's the users fault mainly for not watching out.
Seriously, I've had some proper brain-storms when having a dump, nothing else to do while on there and it does get u away from the computer for a few minutes which I think helps.
Funny you should be in this situation as I starting working from home 2 years ago and I've been ok. I travel to our main office 270 miles away every 4-6 weeks but travel expenses are paid for. I have a room with an office setup in my house and do try and keep the door closed. I do miss the office atmosphere but in all, I have no problems and work like I would from the office, (OK sometimes I get distracted!).
I've read numerous forums ages ago on ppl agreeing how sh!t Adobe Reader is. Use another one like PDFXChange or something. An why is the Adobe Reader install so large? PDFXChange is tiny in comparison.
Hotmail Mobile Exchange Server: m.hotmail.com Enable SSL User Pass Done.
The reason Hotmail, Gmail, Yahoo and Facebook accounts get hacked is because of the shitty third party websites like those little small "gameing" sites, they get hacked and guess what? Oh! the user has used the SAME password for for their main email accounts. If people used just 2 passwords, this would stop their primary email accounts getting compromised. 1 main password for main account, and another for the shitty freebee websites which will probably get hacked. Simple!
http://hashcat.net/oclhashcat/ runs numerous tools for this and with some users GPU rigs going totally insane: 4 x ATI Radeon 6990 throwing MD5 hashes out @ 45.7 Billion/sec, that's mixalpha-numeric password of length 8 in 1 hr 20 mins and then we can start on the dictionaries / hybrib-dictionaries / case-mutations / etc. The way passwords are used / stored is becoming broken by design.