Forgot your password?
typodupeerror

Comment: Re:Whats the poing of hunting as a sport? (Score 1) 397

by Wrath0fb0b (#46565033) Attached to: Drone-Assisted Hunting To Be Illegal In Alaska

How is shooting something from hundreds of feet away with a high powered rifle any kind of sport? And now drones? FFS , why not just nuke the whole fucking forest then Billy Bob Smalldick can claim he's killed everything and act the hero to all the toothless hags that inhabit the trailers in the area!

Well we killed off all the damned wolves so now we have to control the herbivore population or they will boom/bust and starve to death -- a fate much worse than being shot.

Anyway, it's an enjoyable activity and actually rather zen given that you often spend hours perched away with nothing but your thoughts ...

Comment: Re:Do something about your hoarding problem (Score 2) 983

by Wrath0fb0b (#46464485) Attached to: How Do You Backup 20TB of Data?

You don't have to cull it down, you just need to organize it into logically distinct groups and assign them priorities. Hoarding isn't the problem, the problem is assigning too high a priority to the hoarded pr0n as compared to the really important stuff.

  • Group #0:

Contents: Documents, source control repositories, user preferences, email archives
Maximum Size: 10GB
Protection: 3-way Mirror + Snapshots + Offsite
Total Space Required (way upper bound): 150GB
Total Cost: $3 a month for Crashplan

  • Group #1:

Contents: Personal photos, music collection, other people's #0 backups, /home
Maximum Size: 1TB
Protection: 2-way Mirror + Offsite
Total Space Required: 2TB
Total cost $3 a month for Crashplan

  • Group #2

Contents: Everything else, media, pr0n,
Maximum Size: âz
Protection: Diskpool, maybe integrity if you like zfs/btrfs

Comment: Re:You keep using that word (Score 1) 479

by Wrath0fb0b (#46448855) Attached to: Author Says It's Time To Stop Glorifying Hackers

(1) Password managers. One strong password, infinite storage. Maybe one for work and one for home.

(2) DropBox. One file, infinite number of distributed copies. Also available to sync on your mobile device of choice :-)

(3) Discipline. Every password is in the vault, no exceptions. Every change is updated and synced to DB.

Problem Solved.

Comment: Re:Cramming a data plan onto a voice SIM (Score 1) 205

by Wrath0fb0b (#46440585) Attached to: Firefox OS Will Become the Mobile OS To Beat

Again, that sentence is unparseable by people in the real world.

Maybe tech workers have spent too much time in the tech world and forgot that terms like "SIP" and "POTS" are not really part of the language. Moreover, the mental model of understanding used to conceptualize the various bits of the phone system and how they interact is itself part of a specialized skill set. You can't get very far when you are, quite literally, thinking about it wrong.

And it's not just the idiots (although they certainly qualify), I've met tons of research academics, medical professionals, authors, historians whose make fundamental errors in how information systems work and are organized. They ask questions that I just have to answer with, "the fact that you ask this question means you have the wrong picture in your head already".

As an example, I once had a surgeon explain to me that his computer was not likely to be hacked because he always put it to sleep when he wasn't using it. I asked him what about the times it was awake, and he said that "well it can't be hacked because I'm using it at the time and only one person can be on the computer at once". Suffice it to say, I had to go down a few levels to explain things.

Or think of it this way -- he knows as much about computers and information systems as you know about orthopaedic surgery and the organization of the connective tissue in the body. :-)

Comment: Re:Cramming a data plan onto a voice SIM (Score 1) 205

by Wrath0fb0b (#46432879) Attached to: Firefox OS Will Become the Mobile OS To Beat

If you're doing wifi-only, get yourself a static IP, run asterisk, use any old cellphone with SIP support and wifi and skip AT&T, as they are fuckers of the highest degree. Their prices are beyond fucking ridiculous. They want $50/mo for a land line. I got SIP for about ten bucks a month. My Xperia Play is now our cordless phone, and it's also a neato clock. My server is a $20 pogoplug, but in fairness I bought two of them so I could do HA.

You forgot to account for the time of a competent admin that can set up asterisk and is around to troubleshoot it.

$50/mo for a landline is stupid, but make a fair comparison -- you can't rate a system that requires a /.er to design and set up against one that a person with an IQ of room temperature can use.

Comment: Performance consistency versus peaks (Score 5, Interesting) 111

by Wrath0fb0b (#46365075) Attached to: Intel's New Desktop SSD Is an Overclocked Server Drive

For many (but certainly not all) applications, especially when it comes to UI, what matters is 95% worst performance, not peak throughput. From the Anandtech review, that's where this drive really shines.

Different tradeoffs have to be made for different workloads -- it can't be boiled down to a single (or even a set of) number(s). Some applications are far more tolerant of worst-case performance than others.

Comment: Re:Risk? (Score 5, Insightful) 232

by Wrath0fb0b (#46347393) Attached to: Mt. Gox Shuts Down: Collapse Should Come As No Surprise

You are right to be sarcastic but you are dead wrong in conflating volatility risk with counterparty risk. The two are actually completely orthogonal -- you can have very little risk of volatility but high counterparty risk, or high/low (and high/high low/low for that matter).

The key is to distinguish from the risk inherent in the fulfillment of the contract and the risk that the contract will not be carried out.

Comment: Re:Programming is not about rote memorization (Score 1) 627

by Wrath0fb0b (#46330749) Attached to: Does Relying On an IDE Make You a Bad Programmer?

Look, it's nice when you are well versed enough in a language to not have to lookup method/function names, nor their arguments. But let's face it, it's hardly the mark of an amazing programmer to have a photographic memory.

On the other hand, a guy that says "oh yeah, I should use one of those STL things that let's you look up values by keys" and has to go fishing for std::map doesn't inspire one with confidence. Repeated exposure to (and use) of a language (and/or framework API) naturally causes considerable memorization to happen even without trying to memorize everything. It's an indicia of experience.

Of course, experience isn't skill and so forth. But having a decent working recall of how to get around seems to me a necessary but not sufficient condition of being an "amazing programmer".

[ Full disclosure: I do, in fact, use an IDE for most C/C++ development. ]

Comment: "Native" mobile apps using HTML, CSS, and J... (Score 1) 47

by Wrath0fb0b (#46100701) Attached to: Google Launches Cordova Powered Chrome Apps For Android and iOS

FTFY.

Until the boffins at Intel or ARM create a processor whose machine code is JavaScript, you need bullshit quotes around that 'native' claim.

If you want to make the argument that you don't need native code, that's your prerogative. Depending on the use case and requirements, you will no doubt be correct in a large number of cases -- I don't need a native slashdot app, the HTML version is quite sufficient.

But why in God's name do you need to make a preposterous claim like that? What does that buy you?

Comment: Because the Titanic really wrecked ocean travel .. (Score 1) 186

by Wrath0fb0b (#46033235) Attached to: Regulations Could Delay or Prevent Space Tourism

"They don't want to endanger the space-farers or the public, and they can't let the industry get started and then have a Titanic-like scenario that puts an end to it all in the eyes of the public."

Puts and end to all of what? Did we stop ocean-faring after Titanic sunk? What is this guy talking about?

Comment: Reminds me of TRESOR (Score 1) 222

by Wrath0fb0b (#45972803) Attached to: TrueCrypt Master Key Extraction and Volume Identification

No affiliation, but this sounds like a good reason to move to TRESOR-like implementation in which the AES key is kept in hardware registers that are cleared when you go to S3 and on each reset. It's still vulnerable to anyone that gets root access to your OS, but a cold-reboot attack or a DMA attack on the RAM are not going to work -- so that's some forward progress.

Anyone want to take a stab at porting it to TrueCrypt?

Comment: Re:Islam (Score 1) 169

by Wrath0fb0b (#45709439) Attached to: France Broadens Surveillance Powers; Wider Scope Than NSA

Yeah, why should we trust judges when they explain the law? And what's with these pesky biologists trying to explain biology. And don't get me started on mathematicians telling me that I'm doing matrix multiplication wrong! And historians! Talking about history!

Anti-intellectualism at its finest.

Those who can, do; those who can't, simulate.

Working...