Forgot your password?
typodupeerror

Comment: Re:Drill a hole, relieve the pressure? (Score 1) 269

by Stray7Xi (#41293525) Attached to: Mt. Fuji May Be Close To Erupting

I'm not a vulcanologist but here's what I think. Imagine a balloon and trying to release the pressure by poking a hole. 16MPa with a 1 square meter hole is nearly 18000 tons of force. I would think the hole would tear apart and basically be an eruption. If it didn't tear open, it'd still release all the gasses and the area would have to be evacuated.

Comment: Re:Waiting for the hypocrisy to start (Score 2) 397

by Stray7Xi (#39902279) Attached to: Panetta Labels Climate Change a National Security Threat

Scientists do research, policy makers act on it. Is your argument that policymakers should completely ignore science? Panetta is not a scientist, and it appears he's not talking on science but the policy that stems from it.

This is pure political games that Panetta doing giving speeches to environmental groups. But he's also right, it's his job to consider possible threats. DoD plans for things that aren't a certainty all the time. What if China invades Taiwan? What if strait of Hormuz gets blockaded? and a thousand more things that are far less likely then climate change. The pentagon is massive and basically all it does planning for different contigencies.

Comment: Re:Wrong approach. (Score 1) 470

by Stray7Xi (#38656320) Attached to: Are Programmers Ruining the Design of eBooks?

I don't want specific media for ebooks. I want an ebook device that accurately displays the printed page.
Where's my A4 300+DPI E-ink tablet that's been promised 'just around the corner' for years now.

Pages are obsolete in a digital world. It would be nearly twice the size of current tablets. It doesn't face technology obstacles, it faces market obstacles. As in, is there a market to buy a product that:

*doesn't fit conveniently in a purse.
*Is no longer one-handed but should be set on desk or propped up.
*Can't display images well (either no color or low color depth). So still can't display PDF/Figures/Charts

The problem isn't e-readers poor rendering of PDF's. The problem is PDF standard has a primary objective of defining exactly how something should be printed. It is not a standard that should be used for anything that isn't meant to be printed out. We need to be using a standard that provides markup that the e-readers decide how best to render.

Comment: Re:You'd think... (Score 1) 448

by Stray7Xi (#38349580) Attached to: The Mexican Cartel's Hi-Tech Drug Tunnels

You'd think that they could detect the activity required to build a tunnel.

I'd think it'd be easier to detect the use of tunnel based on it's endpoints. 200 feet isn't far and both ends would need a lot of traffic. With satellites, it wouldn't be a hard algorithm to identify twin hot spots of activity. Also being so short, they could just run a pneumatic tube and have a very tiny tunnel.

Comment: Re:PCI standards (Score 1) 434

by Stray7Xi (#38026510) Attached to: Valve Announces Massive Steam Server Intrusion

If you have the salt you can use a rainbow table to figure out the hash.

No you can't. 1-8character alphanumeric SHA1 rainbow table takes up 160GB. Add even 12bit salt and that becomes 640TB. You know what used a 12bit salt, legacy unix systems. Modern salts are effectively immune to rainbow tables. I'd wager the salt has more entropy then most peoples passwords.

I design software that stores password hashes. It uses the same cryptographic hash functions to store passwords (SHA1 probably).

SHA1 is unsuitable for storing passwords, use bcrypt. SHA1 is designed to be a fast algorithm and is vulnerable to moore's law. Fast hashing algorithms are a weakness for password databases because it makes bruteforce cracking faster. A modern laptop can churn out more then 100k sha1 hashes per a second. Bcrypt is designed with a cost parameter that you can tweak how difficult the hash operation is. As computers get faster, you raise the cost and then the next time person logs in you store the more secure hash.

Just because you're writing security software doesn't mean you're doing it right. I refer you to Schneier's Law:
Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break.

Comment: Re:cyber command (Score 2) 161

by Stray7Xi (#37686492) Attached to: Air Force Network Admins Found Out About Drone Virus Through News Story

If this is the best the most elite hackers our military can muster, then I think my wife should try and apply. She knows how to use Excel pretty well.

In fact that is exactly how military works. They hire mostly people with high school education and train them into career fields. Cyber command started just over a year ago. Apparently you think the military should be able to train up people in 1 year for what takes colleges 4 years to do.

I prefer to think of them as CS college sophomores... they're still thinking about switching majors because "math is hard."

Comment: Re:What market does this target? (Score 1) 212

by Stray7Xi (#37253616) Attached to: New USB 3.0 Flash Drive Has 2 TB of Storage

One use would be to store media libraries. It could eliminate the need to decide which dvd's to bring because it could bring them all. Could bundle with a media player and even put an autorun frontend to select show. The kids go to grandmothers and have every movie/tv show they want.

How often do you end up somewhere and decide to watch a movie where it turns into find something on netflix.

We are Microsoft. Unix is irrelevant. Openness is futile. Prepare to be assimilated.

Working...