Forgot your password?
typodupeerror
User Journal

Journal: 140925 (background)

Journal by mapfortu

140925. video games.

Today homeless mentioned an idea for a video game or a movie. Let him work on the movie with the entertainment department. A few of the other court members and I were wondering how the video game would be any different than a typical game of the Sims, or similar, with a script pack for all of the workers and their households and the associated social community structure around them. We began working out a game scenario.

User Journal

Journal: 140618 (j2p)

Journal by mapfortu

140618. Jail Porn.

Mapfortu
Foo' Moe-D

A short discussion on the similarities between modern day stay in jail and modern day viewing of digital pr0n, how both are designed to assist in the methodology to break you down and ship you to hell.

User Journal

Journal: 140612 (nerve agent)

Journal by mapfortu

140612. Material updates.

Mapfortu
Foo Moe' D

The Reader's Guide to the Sphinx (http://mapfortu.wikidot.com/) is fairly complete in its presentation. Many people may not have sufficiently digested the material to be familiar with the carnival timeline. You are not real men, those are not real women, those sure as hell are not real dogs, this is a farm, everything with wings is below us.

User Journal

Journal: 140118 (ads)

Journal by mapfortu

140118. Advertising.

No system notice, just me with some advertising for you. We run the largest dark fibre network in the world. Keep laying it. We claim it before you turn it on. We have a ball of about six hundred scripts, exploits, overflows, insertions, virus, and worms which we use as a conglomerate cloud network to keep the dark fibre to ourselves. We hit the open network with whatever ipv4/v6 and MAC address we like, and we don't need anybody else's cloud computing softwar

User Journal

Journal: 140117 (seco-upd)

Journal by mapfortu

140117. Security Alert.

Silverspur Goldmane
Senor Pedro Marco Agapito Jose Juan Martinez
Prime MInister Lewis Hairpinblue
Revenerable Foo' Moe-D

User Journal

Journal: 140117 (seco)

Journal by mapfortu

140117. Security Alert.

Senor Pedro Marco Agapito Jose Juan Martinez
Prime MInister Lewis Hairpinblue
Revenerable Foo' Moe-D

User Journal

Journal: 140108 (vids)

Journal by mapfortu

140108. Video.

As homeless mentioned today, there is a small sample available in the music world. I have earlier mentioned a youtube clip for Release Yo Delf from Method Man. The youtube clip I recall was released from, perhaps, Radio To

User Journal

Journal: 131107 (glyphs)

Journal by mapfortu

131107. System Notice.

Silverspur's Stronghold would like to introduce a marked improvement in service to subscribers and offer incentive for new users to sign up immediately. The necromancer's seal from the printforge has been solved. The interior dome of St. Mark's in Venice, discovered in recent research, is

User Journal

Journal: 130917 (cycle)

Journal by mapfortu

130917. DTSS tuning.

I have yet been working with Foo' Moe-D to re-enable system broadcast messages from the stronghold. There yet continues to be too much noise on the receiving end for broadcast messages to be a security conscious practice. Subscribers continue to receive system notices upon establishing their connection.

Comment: Re:Chrome? (Score -1) 223

by mapfortu (#44777267) Attached to: Epic: A Privacy-Focused Web Browser

User targeted network secure applications are, realistically, hardly more than an inside joke. As if the common end user has any chance of knowing more about the construction of network traffic than the people that built the system. Most favorably such pursuits as security conscious browsing pits you in a thermometer race; your countermeasures vs. the various levels of people attempting to harvest and exploit network traffic and the information it contains.

For example. Consider PPPoE. A very old component of modern day kernels. PPPoE is one of those security conscious technologies because PPP is actually underneath ethernet, way underneath. The people working on implementing, using, and securing PPPoE are committing themselves to somewhat of a joke, or the most easily accessible route to a desired functionality. The ethernet layer runs on tcp/ip protocol stacks. TCP/IP protocol stacks work because the chipset on the cards is designed to interpret protocols underneath even IP. Underneath even IP, another three or four protocol stacks down, are indeed the same circuit logic gates which, at one time, performed PPP functionality. Those in the 90s which enabled a PPP stack that they could use client-server programs at the shell prompts were, again, adding another layer of PPP on top of circuit paths which already handled PPP. The circuit paths for PPP were used to provide for dialup and, later, shell. The software PPP was necessary to handle the client side of large applications; most commonly for windowing applications. The server side of the software could have produced the same result using hardware capabilities with a significant blow to network traffic.

So, really, if you think you are using a network security conscious application, recall that there is a host of individuals and technologies which could do everything of ethernet with, say, a standard dialup modem. Even today, if you fabricated a dongle to adjust the wire current voltages, you could go ahead and plug your ethernet into your standard dialup modem (with an connection adapter) and you could indeed use the open internet with a standard dialup modem. As your modem chipset is designed to expect PPP type transactions and timings it would be necessary for you to write your own code. Estimate taking the first three months to write PPP level loops and structures to perform so much as an HTTP GET request and another six months to sort out the returning bitstream and feed that to a modern web browser. After that you could probably check your e-mail sometime before the following Christmas.

The fact remains, though, what would take a new pursuit near a year to check e-mail has already been done, is well known, and is thoroughly documented by those engineers and techs that have worked on it. Postulating network security from the point of view of a web browser is cherishably naive because, a few layers below IP, it is all looks like swiss cheese and works only because the extra bits and paths have become deprecated and unused but not sealed off and removed. Factoring and securing a hardware breadboard is a ridiculously expensive and impossible task. Security by obscurity really is the business profit solution.

User Journal

Journal: 120605 (prop) 2

Journal by mapfortu

120605. Properties.

I was remembering a common physics classroom model in which a hot incandescent light drives a pinwheel inside of a vacuum chamber. Miniaturizing the vacuum chamber and reducing the pinwheel to a chip should allow for a quick connect between copper and fiberoptic. The pulse frequency should be the same to the number of blades in the pinwheel or whatever model the reduced chip works on. Perhaps the fiberoptic cable is not normally used for the resulting spectral ra

User Journal

Journal: 130611 (upgrade)

Journal by mapfortu

130611. System Notice.

Increased security demands. Please update your software. General methodology: analyze the code. Find available queus and buffers. Add the following four tests. 1. Is this queue full of crap? 2. If so, how much crap? 3. What kind of crap is it? 4. How to flush and clean the queue?

Optimization hinders evolution.

Working...