Comment Swiss Army Key Ring (Score 1) 763
This guy added keys as tools to his multi-tool.
http://geek.phatus.com/2009/08/swiss-army-keys-tutorial-and-instructable/
This guy added keys as tools to his multi-tool.
http://geek.phatus.com/2009/08/swiss-army-keys-tutorial-and-instructable/
I have two of those thumb push key-things. You now, where one cylinder goes inside another, and you push the end in and it falls apart? They're a lot easier to use than carabiners, you can detach them one handed. (Erm, except half your keys fall on the floor if you do that.)
I'd recommend using them over carabiners, but for some reason they seem almost impossible to actually find and buy.
I don't use them for different sets of keys, though, I just grab another keyring from my car if I need it. I use them to detach my ignition key to leave my car running, and to detach my leatherman.
I put one of these: http://www.lmgtfy.com/?q=electric+door+strike between my house and garage 20 years ago, and put a simple keypad on it. Add some kind of CPU and the same strike would work for RFID access.
The keypad is not terribly high security, but my garage has no pedestrian doors to the outside or any windows at all, and the overhead door is quite secure. If a bad guy gets into the garage, they're going to find enough tools to take care of whatever door locks I have anyway -- if they don't simply steal the tools and leave.
I teach a statistics class and its a fun exercise for the students to take a batch of a thousand or so pennies and arrange them by year. Makes a great visual of a skewed distribution. Then they take samples of varying size. Lo and behold, the larger the sample size, the more normal the sample distribution. Makes a great illustration of the central limit theorem.
Please don't abolish the penny! A thousand nickels would be fifty dollars -- not chump change when you're on a teacher's salary!
The real bug, of course, is not that 6to4 is preferred, it is that 6to4 is unreliable. 6to4 does not monitor its tunnels -- it just assumes that a tunnel will work if there is a global IPv4 address.
It's worse than that: 6to4 is architecturally flawed.
A 6to4 CPE router can only monitor the availability of its own 6to4 relay. It can't do anything about the relay required for the reverse path. Service providers aren't sufficiently moved to deploy their own 6to4 relays because content providers and distributors aren't deploying the reverse path relays needed to make the system functional. The content providers and distributors in turn aren't deploying 6to4 relays because there are too damned many IPv4 firewalls that drop all incoming protocol 41 on general principle, so from their perspective, it's not worth the effort.
Worth noting: Teredo suffers from the same basic architectural flaw. Neither 6to4 nor Teredo should be used, if it can be helped at all.
The root cause here is multipath confusion, but there are lots of other ways the transition will get bumpy.
Once the IPv4 address exhaustion wave starts to break, the Internet community is going to be dealing with all manner of breakage caused by some parts of the Internet resisting the transition to IPv6 while other parts are being forced into the transition by financial considerations. These different parts will be intermediated by things like NAT64 and DNS64, as well as other evils like DS-Lite and the associated AFTR boxes. Meanwhile, there will still be crazy things like 6to4 and Teredo kicking around. For the transition to go smoothly, all these interlocking parts have to work perfectly... everywhere... and we know from long experience that this just cannot happen.
This will all seem fairly familiar to anyone who survived the transition to IPv4 a generation ago. But if you're a young gun, and all you've ever known is the IPv4 we have now because the old-timers spent a long damned time years and years ago making it rock-solid before you got here, then you're about to be schooled.
Get ready for life during wartime—that's what I say.
Yes, firewalls are only a first-line-of-defense tool. Making the assumption that a firewall is an end-all-be-all solution is not a good practice. You do need to have a network perimeter to filter out a large factor of attacks, internal borders to mitigate internal problems, and desktop/server security to protect you from your users.
That is why we have firewalls, content filters, network access control devices, intrusion prevention systems, and desktop products (like Cisco Security Agent).
You can't get your whole network security from a single solution and not necessarily a single vendor.
agreed.
example HL2 is a game ive always thought of as art, the atmosphere and immersiveness are probably mostly why. If you take this strange 'winnable criteria' then yes you can win it, but you win it the same way you finish reading a book. if you stop reading a book half way through (lose a game) then does it cease being art? in summary, this guys an idiot.
I had the same outlook about the Linux kernel, but the opposite: I thought it was an understandable fiend, and started to delve in.
This was when 2.6 was in development, and 2.4 was the main branch. And then 2.6 came out, and all was lost...
Very few left-handers are hemispherically reversed in my experience (and how would you measure it?)
Rather, some of the brain functions eg speech are more likely to be represented on the non-dominant hemisphere. It's a different kind of specialisation but probably increases communication across the corpus callosum - which would improve one's ability at synchronising both hemispheres.
With the cost of the recent Ultimate Editions of Windows, it's to be argued that consumers do in fact, purchase Windows that happens to also include a PC in the cost. With the upper Windows tiers, the pricing model puts Windows ahead of the hardware costs, at least in the desktop space - when you can go purchase an HP, Dell, etc from Wal-Mart for $699, and the cost of Ultimate was running $399 in some areas of the country, well....
We can predict everything, except the future.