And if you don't explain the Rayleigh effect properly (as you did) you actually don't explain why the sky is blue. In other words, your answer isn't explanatory/informative much because you "explained" the explanandum by introducing another one.
But why does the Rayleigh effect work? How is it that particles of matter can diffuse electromagnetic radiation? Indeed, the modern parent is essentially useless without an accurate version of the Grand Unified Theory, as well as the philosophical and theological foundations to establish, to an acceptable standard of proof, the existence of the universe.
It's imperfect, but I don't see another way, unless you're willing to abrogate moral responsibility to the pronouncements of an imaginary deity, which really means "a bunch of guys who wrote moral pronouncements and then claimed they came from god". I happen to prefer the consensus method to the imaginary deity method.
Slashdot forums: Diverting ethical questions into off-topic anti-religion screeds since 1997.
A meet-in-the-middle attack still works on 3DES, but it can only strip off one layer of DES. Thus, 3DES has 112 bits of security (56*2).
Quoting from the grandparent:
3DES runs the second round backwards, which enables the "meet in the middle" attacks.
I have no idea whether that "second round backwards" thing is true, but this has nothing to do with why 3DES is vulnerable to meet-in-the-middle attacks. Meet-in-the-middle attacks work on any plaintext that's encrypted multiple times with the same cipher but different keys. If you encrypted with AES-128 twice, that ciphertext would also be vulnerable to a meet-in-the-middle attack. (Though the space cost would be see high that such an attack would be even more impossible than an AES-128 bruteforce already is.)
Exactly. Moreover, it's misleading to call all those activities "unlawful." Just because you do something that gives someone a legal remedy against you, doesn't make it wrong. Sometimes, it's actually a good thing when a party breaches a legal obligation. For example, see efficient breach theory.
Mind you, I don't think breach of copyright is analogous to an efficient breach, because infringement usually means the rights-holder gets no compensation. It's a complicated question.
At any rate, "illegal" doesn't have an inherent meaning. There are only breaches of obligations, and consequences ensuing from those breaches.
That's because knowing the number of characters in a password greatly eases the password guessing.
Not actually true. If you have a password alphabet of size k, then the possibility space in an n-character password is k times greater than the possibility space for an (n-1)-character password, k*k times greater than for an (n-2)-character password, etc. Brute-forcing all the possible passwords of length 1 to (n-1) is a trivial amount of work compared to brute-forcing all the passwords of length n.
If you're brute-forcing a password, knowing the length doesn't "greatly ease" your guessing - it spares you some insignificant preliminary work. What it does help you do is spot passwords that are weak enough to brute-force, but an enforced minimum password length will prevent this from happening. Basically, there's a reason that the Unix-style login isn't more widely used.
Yeah, but don't forget that the Deltas make a difference.
Also, I hear they like to walk all over the Epsilons. But in fairness, the Epsilons are very small.
Education is the cornerstone of democracy and it's fantastic that we are setting our bar "high" (yeah, right) for our most precious resource - our future leaders. However, not everyone can be president.
"Welcome, graduates. You are no longer the future."
But if you want some examples, Michelangello produced some nice forms of art. How? By finding someone wanting to pay him for that. But, hey, maybe you don't think that example to be representative since Michelangello didn't produce music. So be it. J.S. Bach, maybe you heard about him, made a live out of composing and playing music. How was that possible? Well, by finding someone wanting to pay him for that. What would have happened if nobody wanted to pay Bach? He simply would have find another way to earn for a living. If distributing media is a bussiness no more, just find a different bussiness.
That doesn't really work today, though. Two problems:
First, Michelangello and Bach lived in an age where wealth was heavily concentrated in the nobility and the clergy, two groups who were very interested in commissioning artistic works. Nobody has that kind of wealth nowadays; Gates and the Waltons aren't nearly as wealthy, proportionately, as the wealthiest people back then.
Second, that only works for certain types of works. Do you know any billionaires who would commission new video games, comic books, or Hollywood blockbusters?
Intellectual property creates artificial scarcity, yes, but it also creates a viable market for information. The ability to control licensing means that rights-holders can force their audience to pay for the value of their content. This gives content producers a strong incentive to create value for their audience.
As simply as that. Really.
It's possible that a no-copyright commission-based model could work, if audiences/readers/players/etc felt obligated to tip the content producers generously for producing a work. But it's not nearly as simple as you suggest. I'm not totally convinced that it would be better than a copyright system. Certain works would be under-produced - especially high-budget works and works that people might enjoy, but feel ashamed to sponsor. Also, the amount of money going into content-production would almost certainly be less than now - most likely, what people are forced to pay under copyright is often more than what they would pay without compulsion.
For £30 - £35 I expect a game, not a mod.
And L4D2 is a mod because it uses the same engine? By that logic, wasn't Half Life a Quake 2 mod?
I think it's reasonable to say, also, that the size and vocality of a given anti-fanclub is as good (or perhaps even better) an indicator of the success of a product as that of its fanclub.
N-Gage. Virtual Boy. Phantom.
Life would be so much easier if we could just look at the source code. -- Dave Olson