Comment Re:Too late FBI (Score 1) 629
The FBI: think of it like heart surgery with a backhoe.
The FBI: think of it like heart surgery with a backhoe.
Id be interested in a camera that samples at 24+ megapixels but records at 12. The math suggests that you could eliminate some of the sampling artifacts that way.
MD6 by Rivest and Skein by Schneier et. al. seem to be getting a lot of attention, but another celebrity cryptographer, Dan J. Bernstein, also has a hash in this race, called "CubeHash."
DJB continued his tradition of offering cash rewards for people to find security problems with his code, giving out (so far) monthly prizes of 100 Euros to the most interesting cryptanalysis of CubeHash.
So far, the primary criticism of CubeHash is that it's slow, running some 10 to 20 times slower than many of the others in the competition. Dan brushes off this criticism by stating on his site: "for most applications of hash functions, speed simply doesn't matter."
To be honest, when compared efforts like MD6 and Skein, with their mathematic proofs of security, VHDL and other in-hardware reference implementations, and their amazing optimizations in both speed and efficiency (Skein can process half a GByte of data per second on modern hardware, and consumes only 100 bytes) -- entries like CubeHash seem to have that longshot underdog appeal, like a New Zealand soccer World Cup team.
Does it remove, or add, more control of my machine?
Your machine is still yours, I'm afraid. Sorry to dash any hopes of another conspiracy. Note that running as a non-root user restricts some functionality (which is the whole point), but that functionality can be regained using privilege elevation (i.e. UAC).
If it adds to my current XP2 configuration, fine, I'll CONSIDER it as a replacement on this machine when XP finally goes belly up.
"Adds to my current XP2 configuration". I'm not even sure whether that's a coherent thought. If you're asking whether it still runs your old win32 programs, then the answer is yes. If you're asking whether it retains all of XP's configuration mechanisms, then the answer is no. The UI appears much more like Vista than XP.
If it REMOVES any control of my machine, in any way, then it is just another Vista, in my mind.
It sounds like you believe everything you read on Slashdot. Multi-user operating systems protect the integrity of the environment by restricting the behavior of user-installed programs to a narrowly-defined API. Welcome to Computer Science. If you want absolute control of your machine, install DOS. Vista and 7 have increased protection in comparison to XP to guard against modification of the OS itself (root kits). Ideally, though, these enhancements increase the safety of the environment without degrading user experience.
I keep seeing benchmarking, eye-candy comparisons, etc, etc, but no real discussion of embedded DRM schemes, hidden processes, etc.
DRM restricts access to content. Operating systems restrict access to devices. The system ships with programs capable of playing DRM-protected content, but that's not an OS function. The vast majority of what an OS does occurs in "hidden processes" if you want to call it that. This fact is not interesting.
It is the stuff that I cannot see on my monitor that concerns me the most when considering a OS.
The only important consideration when picking an operating system is whether it will do what you want it to do, and if so then how well. If it can't do something critical to your own workflow, then pick a system that can. If more than one can, then pick the system that does it best.
Windows 7 is largely regarded as "better" than XP and Vista because it does more of what people want than previous systems, and it does those thing better than previous systems.
Using Java avoids most of the nastiness of Linux while preserving a solid code base.
What's the "nastiness of Linux"? After years of development, the only difficult thing I've found in Linux (POSIX) development in comparison to Win32 is the fact that you can't wait on both mutexes and file handles in the same call.
Translation: They were being unintentional racists.
Almost. Actually they intended to be racist, but due to some unfortunate misinformation, they were simply buffoons.
You mean defused until you type Control-z, Control-d or Control-c, right?
Nope. I really do mean from then on. Read the various write-ups to understand why.
And for bonus points, see if you can find your phone's "control" key.
"The medium is the massage." -- Crazy Nigel