I fucking love Spam.
I fucking love Spam.
If you’re this brilliant and obviously that troubled (I’ve hit some tough shit and bailed on a degree myself) — Don’t give up like that. If you’re looking for military contract money then keep trying and build some prototypes- the military buys cool ideas from people. Build a proof of concept and you’ll be paid to…
The design and execution wouldn’t be terrifically impressive given the fact that it’s been many years since anyone has attempted to engineer and manufacture aircraft of this speed envelope in any significant way. This is because it’s silly in the same way that the SR-71 was silly. Science in materials and that which…
Fuck yes. Gawker: I want some graphed data on this.
This is just for sport:
Watching all of this episode is one of five strange tricks to keep your penis from falling off.
It’s really a case of exponential math. Anyone with a decent amount of processing power (read: super computer) can break an 8 byte (Bytes are characters, bits are 1 and 0— an 8 bit password would be one letter) fairly quickly— but bring that number of characters up only 12 and it becomes exponentially more difficult…
I completely agree that the algorithms are probably well studied and documented. BTW- Apple can happily randomly salt the UID because:
Access the security chip directly (by opening it with scary, scary acid) - laser disable the write-access lane on the chip itself. After the embedded microprocessor loses the ability to wipe the onboard flash you can brute force the numerical code all you want. Try it out first with a few other 5c phones that are the…
This is super correct.
Yeah, except the UIDs are likely rand-salted. Salting is where you add a special hidden static string or number to a security identifier to make it horrifying to directly attack. Rand salting means that the salt is random. The UID could be 2355344 but the rand salt could be a hundred extra and random characters that…
Actually the chip can absolutely magically erase itself. The chip is a microprocessor embedded non-volatile storage device (I am referring to the specialized security chip). You can’t just access the data via the pins- You have to interface with the embedded microprocessor to get anything out of it. To do that you…
How about benchmarks from your computer? Throw on development tools and get the FPS counter running for both browsers and side by side some jQuery/CSS3 transition intensive websites :)
Protocol level blocking is all fine and well, but javascript is a nasty and polymorphic vector for the most annoying advertisements. Client level blocking is a countermeasure against this, and also provides a crowd source of advertisement identities from many of it’s users.
I like this. I think I’m going to make one.
A cooler application would be something like this that burrows into the ground and observes. Perhaps it’s full of high explosives, perhaps it just pops out the the ground just to scare the shit out of you; Either way they would always be watching.
Durrr durr durr 140 character tweet overview hard limit— dur dur unlimited characters for tweet actual durr blurg seamless integration durff nurf.
It’s that glorious faux-ad that makes this comment Comedy Gold™
I’m helping...
fixed it for you.
Is there precedence of a company making two generations of service providers obsolete one right after the other? It would be sadder if it wasn’t so ironic and hilarious.