archived
stringclasses
2 values
author
stringlengths
3
20
author_fullname
stringlengths
4
12
body
stringlengths
0
22.5k
comment_type
stringclasses
1 value
controversiality
stringclasses
2 values
created_utc
stringlengths
10
10
edited
stringlengths
4
12
gilded
stringclasses
7 values
id
stringlengths
1
7
link_id
stringlengths
7
10
locked
stringclasses
2 values
name
stringlengths
4
10
parent_id
stringlengths
5
10
permalink
stringlengths
41
91
retrieved_on
stringlengths
10
10
score
stringlengths
1
4
subreddit_id
stringclasses
1 value
subreddit_name_prefixed
stringclasses
1 value
subreddit_type
stringclasses
1 value
total_awards_received
stringclasses
19 values
True
[deleted]
null
I run it and go to sleep. When I wake up, the downloading is done. ;)
null
0
1316217915
False
0
c2kfz94
t3_khtuh
null
t1_c2kfz94
t1_c2kf8f7
null
1427610017
1
t5_2fwo
null
null
null
True
gaymathman
null
It isn't. The algorithm is simple (an undergraduate course in numerical analysis will cover it); nobody's bothered to compute pi this way recently because we know how to compute decimal representations in such a way that d_k has no dependence on d_1...d_{k-1}. The record is actually held by someone who used a typical desktop computer for the calculation; nobody really cares about more accurate approximations to pi as the size of these approximations makes them horrifically unsuitable for actually computing things.
null
0
1316218167
False
0
c2kg094
t3_khf6j
null
t1_c2kg094
t1_c2kc12g
null
1427610028
7
t5_2fwo
null
null
null
True
wodahSShadow
null
So after a few million tries guess what happened...14.25Kg in 10 rocks! Here they are: •••••••••• I won't be taking further requests.
null
0
1316218174
False
0
c2kg0a9
t3_kgfhb
null
t1_c2kg0a9
t1_c2k8m1p
null
1427610029
1
t5_2fwo
null
null
null
True
mechengineer
null
It's not quite as extensive, but probably a good place to start, haha. I've found there's much less OpenCL information available than CUDA.
null
0
1316218230
False
0
c2kg0ia
t3_khryi
null
t1_c2kg0ia
t1_c2kep7f
null
1427610031
1
t5_2fwo
null
null
null
True
Zarutian
null
/me raises hand!
null
0
1316218392
False
0
c2kg159
t3_khip6
null
t1_c2kg159
t1_c2kbsgk
null
1427610039
2
t5_2fwo
null
null
null
True
boober_noober
null
I too thought it was a thing
null
0
1316218406
False
0
c2kg17g
t3_khtwb
null
t1_c2kg17g
t1_c2keeba
null
1427610041
1
t5_2fwo
null
null
null
True
LemonLion
null
It seems like you're using setInterval for the loops. setInterval is notoriously inaccurate - http://ejohn.org/blog/how-javascript-timers-work/ It's better to use setTimeout and calculate the correct time against the browser's built-in Date function - http://stackoverflow.com/questions/196027/is-there-a-more-accurate-way-to-create-a-javascript-timer-than-settimeout This Chrome experiment handles audio event scheduling pretty well: http://chromium.googlecode.com/svn/trunk/samples/audio/shiny-drum-machine.html
null
0
1316218439
False
0
c2kg1cb
t3_khn6y
null
t1_c2kg1cb
t1_c2kbqhr
null
1427610042
3
t5_2fwo
null
null
null
True
Zarutian
null
Dont get me started on people who want to use regular expressions to parse XML.
null
0
1316218526
False
0
c2kg1om
t3_ki52y
null
t1_c2kg1om
t1_c2kftcb
null
1427610048
11
t5_2fwo
null
null
null
True
sanitybit
null
> I'm not so fond of the new layout though, mainly because I went on it for the first time a few hours ago and panicked as to where the top hundred pixels of the page went. FWIW, I only play around with the layout design when I've been drinking. :)
null
0
1316218527
False
0
c2kg1ot
t3_khtwb
null
t1_c2kg1ot
t1_c2kfgk6
null
1427610048
1
t5_2fwo
null
null
null
True
MTGandP
null
And the fourtieth hundred times.
null
0
1316218586
False
0
c2kg1xe
t3_khtwb
null
t1_c2kg1xe
t1_c2kfg1j
null
1427610050
1
t5_2fwo
null
null
null
True
MTGandP
null
It's funny how xkcd is now the definitive source on password security.
null
0
1316218678
False
0
c2kg2be
t3_khtwb
null
t1_c2kg2be
t1_c2kcxkq
null
1427610055
0
t5_2fwo
null
null
null
True
hardsoft
null
It's also a sure wire way to worsen the current backlog of patents. This removes any incentive big companies had to do thorough R&D before applying for a patent. It is going to be a file now ask questions later filing frenzy where every big company is simply trying to be the first to get their foot in the door, regardless of how absurd the patent is.
null
0
1316218844
True
0
c2kg2z7
t3_khvyw
null
t1_c2kg2z7
t1_c2kdmtn
null
1427610064
20
t5_2fwo
null
null
null
True
MTGandP
null
This assumes that the attacker is not using dictionary words or combinations of dictionary words.
null
0
1316218971
False
0
c2kg3hk
t3_khtwb
null
t1_c2kg3hk
t1_c2kd5d2
null
1427610071
1
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316219164
False
0
c2kg48a
t3_khtwb
null
t1_c2kg48a
t1_c2kefov
null
1427610081
1
t5_2fwo
null
null
null
True
rizla7
null
SSL certs? self-signed certs? not the same thing... also, if you're running an intranet with self-signed, that's just fail dude. you should have the servers available to run a CA. as for admin consoles, lolz.. that's just utter fail.. complete security risk if someone compromises that key. by their very nature, http servers are less secure than CAs, meaning compromising such a key is a trivial task in some cases. also, in the case of admin consoles, your network admins should never have access to these keys. you could argue it is acceptable in a one-man operation, that is all. problem with self-signed certs is you have no way of revoking it if it becomes compromised without removing it manually from all affected machines. furthermore, admins often dont check the warning that a cert has changed and sometimes assume they just don't have the cert installed and will just click OK. these types of events should never be permitted. therefore, allowing installation of such certs directly through the browser (or at least in a 1-click fashion) is just a security risk as end-users will not be aware of this fact. there is a reason why browsers deliberately make this difficult. furthermore, what is the point of encrypting solely http on an admin console? you're better off using something like ipsec. simply put: this means there is no way to actually implement them securely in a production environment. therefore they are for dev use only.
null
0
1316219518
True
0
c2kg5lf
t3_kgqxt
null
t1_c2kg5lf
t1_c2kbqn5
null
1427610098
-2
t5_2fwo
null
null
null
True
inmatarian
null
Not a patent lawyer, but as I understand it doesn't eliminate the process of invalidating patents, and you can still use prior-art as a way of doing it. So, that's good. But it switches to "first-to-file" as the way of deciding who gets the patent. So, instead of checking the "invented on" date on the application, the USPTO checks the "filed on" date when they approve bogus patents. It sounds like it just speeds up the process of large businesses proper fucking each other.
null
0
1316219655
False
0
c2kg65k
t3_khvyw
null
t1_c2kg65k
t3_khvyw
null
1427610107
9
t5_2fwo
null
null
null
True
soulp
null
Same here. Did you see his presentation on c# 5 and Roslyn? Pretty good stuff.
null
0
1316219934
False
0
c2kg7ap
t3_kgb4h
null
t1_c2kg7ap
t1_c2k1xib
null
1427610120
1
t5_2fwo
null
null
null
True
Peaker
null
The Pirate party makes a [case](http://christianengstrom.wordpress.com/2011/03/09/an-alternative-to-pharmaceutical-patents/) on why pharma patents are bad too.
null
0
1316219960
False
0
c2kg7e7
t3_khvyw
null
t1_c2kg7e7
t1_c2ke7kh
null
1427610129
3
t5_2fwo
null
null
null
True
[deleted]
null
Am I the only one that read the title as "So I got pre-impregnated"?
null
0
1316219983
False
0
c2kg7hu
t3_khtwb
null
t1_c2kg7hu
t3_khtwb
null
1427610123
1
t5_2fwo
null
null
null
True
KayRice
null
Yes
null
0
1316220050
False
0
c2kg7rv
t3_khtwb
null
t1_c2kg7rv
t1_c2kg7hu
null
1427610127
2
t5_2fwo
null
null
null
True
Peaker
null
AFAIK, the constitution merely says: > The Congress shall have the power . . . To Promote the Progress of Science and the useful Arts by securing for limited times to Authors and Inventors the exclusive right to their respective writings and discoveries. That doesn't demand anything. It merely *allows* congress to have patent/copyright laws (though not practically-unlimited-times copyrights we have today).
null
0
1316220069
False
0
c2kg7uv
t3_khvyw
null
t1_c2kg7uv
t1_c2ken2r
null
1427610128
6
t5_2fwo
null
null
null
True
KayRice
null
Rules exist to be broken
null
0
1316220134
False
0
c2kg845
t3_khtwb
null
t1_c2kg845
t1_c2kfpuk
null
1427610131
-2
t5_2fwo
null
null
null
True
[deleted]
null
My brain is stupid.
null
0
1316220183
False
0
c2kg8b8
t3_khtwb
null
t1_c2kg8b8
t1_c2kg7rv
null
1427610134
2
t5_2fwo
null
null
null
True
[deleted]
null
I think maybe it's only a restriction for this developer preview version.
null
0
1316220270
False
0
c2kg8nh
t3_khtuh
null
t1_c2kg8nh
t1_c2kfe8j
null
1427610139
3
t5_2fwo
null
null
null
True
Bloqhead
null
Wow. That's some Bush League shit right there. I can't believe people still make this offense.
null
0
1316220311
False
0
c2kg8t4
t3_khtwb
null
t1_c2kg8t4
t3_khtwb
null
1427610140
3
t5_2fwo
null
null
null
True
mcwiggin
null
In case you are curious fedex also stores your passwords in plain text on the back end. If you ever try to recover your fedex.com password the simply email it to you. So now you have a copy of your password sitting in your email. Yay!
null
0
1316220320
False
0
c2kg8uo
t3_khtwb
null
t1_c2kg8uo
t3_khtwb
null
1427610150
1
t5_2fwo
null
null
null
True
Gnolfo
null
It's accurate from a brute force standpoint which is explicitly what that tool is calculating. And we're still a solid order of magnitude in time above the single word option so adding in your dictionary method hasn't changed the conclusion but rather the details. Also this is an advantage on two sides, as it's easy not only to remember a series of words but you can take it a step further and add on capitalization and punctuation, which will come very naturally and give the same ease of retention. Meanwhile it will wreck havoc on your ability to reduce the search space as compared to just "4 words". Also it's really not that much more of a step to say "5 words", which even with your method will rocket the search time back out to ~2.5 million years. It's really not about just taking 4 words cobbled together but rather exposing the technique and the doors it opens and all the advantages therein. In the comic even he's giving something of a worst-case comparison where the single-word password is a rather strong one while the multi-word password is a dead simple pattern and even then it wins out by a wide margin.
null
0
1316220350
False
0
c2kg8yx
t3_khtwb
null
t1_c2kg8yx
t1_c2kecym
null
1427610142
1
t5_2fwo
null
null
null
True
[deleted]
null
Here's some links I found that may be helpful for investigating further [google search](http://www.google.com/#hl=en&sugexp=bvec&cp=3&gs_id=95&xhr=t&q=in+url:+fedex.com/onlinelabel/login.do/labelusercddesc%3D&qe=aW4gdXJsOiBmZWRleC5jb20vb25saW5lbGFiZWwvbG9naW4uZG8vbGFiZWx1c2VyY2RkZXNjPQ&qesig=M48CnL0y47uYyQ8a4jZTsQ&pkc=AFgZ2tkjClRZSnyVWyODd-kh4VGtmLOID6pTEJgwBL9UDhKJEEwS3Cemq4ZVeQV887QhAtvbTXdzlvv1U3DJ_9eCu4ReRcH5FA&pq=in+link%3A+fedex.com%2Fonlinelabel%2Flogin.do%2Flabelusercddesc%3D&pf=p&sclient=psy-ab&safe=active&source=hp&pbx=1&oq=in+url:+fedex.com/onlinelabel/login.do/labelusercddesc%3D&aq=f&aqi=&aql=&gs_sm=&gs_upl=&bav=on.2,or.r_gc.r_pw.r_cp.&fp=f011ebd10d5e903a&biw=1542&bih=819) [I copy/pasted the URL](http://www.peeniewallie.com/2011/04/the-arent-the-d.html) and found that it tried to immediately log me in but it errored [One more](http://www.grafixtreme.com/fedex/php/wsdl/CreatePendingShipmentReply_v9.txt) This isn't something new so I wonder if there has been an exploit of this?
null
0
1316220553
False
0
c2kg9ra
t3_khtwb
null
t1_c2kg9ra
t3_khtwb
null
1427610152
1
t5_2fwo
null
null
null
True
sadris
null
Why? Your argument is the same Ford used against the creator of the windshield wiper: http://trailers.apple.com/trailers/universal/flashofgenius/
null
0
1316220555
False
0
c2kg9rr
t3_khvyw
null
t1_c2kg9rr
t1_c2keh1h
null
1427610154
-7
t5_2fwo
null
null
null
True
jorellh
null
http://revision3.com/hak5/mitm
null
0
1316220590
False
0
c2kg9wj
t3_khtwb
null
t1_c2kg9wj
t1_c2kfklg
null
1427610163
1
t5_2fwo
null
null
null
True
rycr
null
> Say you go to https://www.google.com, and search for something. You click on a link, say to https://anothersite.com . Your browser sends the Referer to anothersite.com. Thank you. Why is this *so* hard for people to understand?!
null
0
1316220747
False
0
c2kgaib
t3_khtwb
null
t1_c2kgaib
t1_c2kei56
null
1427610164
3
t5_2fwo
null
null
null
True
KayRice
null
Just a little bad RAM... it's okay it's okay!
null
0
1316220771
False
0
c2kgalq
t3_khtwb
null
t1_c2kgalq
t1_c2kg8b8
null
1428193849
1
t5_2fwo
null
null
null
True
chemchris
null
yeah, should have been POST
null
0
1316220802
False
0
c2kgapr
t3_khtwb
null
t1_c2kgapr
t1_c2ke3kw
null
1427610166
1
t5_2fwo
null
null
null
True
toadkicker
null
In this case, login.do
null
0
1316221080
False
0
c2kgbsu
t3_khtwb
null
t1_c2kgbsu
t1_c2kemcw
null
1427610180
1
t5_2fwo
null
null
null
True
skoocda
null
Really? All I see is stars!
null
0
1316221082
False
0
c2kgbt6
t3_khtwb
null
t1_c2kgbt6
t3_khtwb
null
1427610180
6
t5_2fwo
null
null
null
True
Gnolfo
null
The comic is using a worst-case scenario (or, okay, "really bad" case) where the single word password is quite strong and the multi-word password is as simple as you can get. But, even while with a dictionary attack the multi-word password is still stronger than single-word (see other comments in this thread chain), it's taking the next steps with the technique that really sets things apart. Why not 5 words? Why not have sentences with capitalization and punctuation, etc? You really don't lose the ease of remembering as a specific phrase is far more particular than a word, and dictionary-type algorithms start to lose traction when simple bits like that are introduced. So it's more making the point that at (or rather near) its worst, a multi-word password fares far better than a single word password at (near) its best.
null
0
1316221300
False
0
c2kgcmd
t3_khtwb
null
t1_c2kgcmd
t1_c2kdnfc
null
1427610190
1
t5_2fwo
null
null
null
True
jerschneid
null
[For the lazy: plaintextoffenders.com](http://www.plaintextoffenders.com)
null
0
1316221309
False
0
c2kgcn9
t3_khtwb
null
t1_c2kgcn9
t1_c2kcrkv
null
1427610191
3
t5_2fwo
null
null
null
True
[deleted]
null
XML is like violence, if it's not working, you're not using enough of it.
null
0
1316221425
False
0
c2kgd30
t3_ki52y
null
t1_c2kgd30
t1_c2kftcb
null
1427610197
18
t5_2fwo
null
null
null
True
shiroihollow
null
YEEEEEEAH 916.
null
0
1316221429
False
0
c2kgd3v
t3_khtwb
null
t1_c2kgd3v
t3_khtwb
null
1427610199
1
t5_2fwo
null
null
null
True
munificent
null
> If you have definite assignment analysis then you know whether or not to auto-initialize the field. Definite assignment analysis doesn't ensure that you haven't accessed the field *before* it's been initialized.
null
0
1316221459
False
0
c2kgd7b
t3_kfvm7
null
t1_c2kgd7b
t1_c2kbhpr
null
1427610200
1
t5_2fwo
null
null
null
True
yellowstuff
null
This made me cringe, and I've built up a tolerance for that kind of thing through years of reading Raymond Chen's blog.
null
0
1316221482
False
0
c2kgda5
t3_khip6
null
t1_c2kgda5
t3_khip6
null
1427610205
4
t5_2fwo
null
null
null
True
Oppis
null
huh, I was under the impression when submitting a form either post or get can be used-- and get will show the parameters of the form in the url (so it can be copied and pasted (perfect for search results)) while post will hide the parameters from the user (unless they know where to look). But I'm no expert in web tech.
null
0
1316221661
False
0
c2kgdyk
t3_khtwb
null
t1_c2kgdyk
t1_c2kdqyb
null
1427610208
1
t5_2fwo
null
null
null
True
realstevejobs
null
Good link. You saved me the trouble of digging for that wiki. It's my understanding that data parallelism is a conceptual alternative to task parallelism. Threads and processes fall under task parallelism. I first saw SIMD mentioned by Brendan Eich [here](http://news.ycombinator.com/item?id=2983420), 5 days ago, as part of an interesting discussion about Dart vs. JS.
null
0
1316221739
False
0
c2kge8t
t3_ki1gj
null
t1_c2kge8t
t1_c2kfttw
null
1427610211
3
t5_2fwo
null
null
null
True
lgodsey
null
You have good taste, OP. Seriously, PowerOn Services makes the best silicon sex dolls on the market.
null
0
1316221780
False
0
c2kgeev
t3_khtwb
null
t1_c2kgeev
t3_khtwb
null
1427610214
3
t5_2fwo
null
null
null
True
[deleted]
null
Just to be serious for a moment, I've recently had the (obvious) realization that experimenting/designing/exploring when many different parts may be varied is *very difficult*. The only way to tackle it while keeping your sanity, is to only vary a few variables (or just one) at a time. I say it's obvious, because it avoids the combinatorial explosion of those many variables affecting each other (as often not independent in design); and this is how scientific experiments are carried out. But I find it difficult to stick to, when I have an idea, and want to try it out... then I see there's a problem with it (or a possible refinement/exception) and I try that... then I see another one. And pretty soon, I have pretty much no idea what's going or what I am trying to do. (well, I do; but they interact in half-seen ways that I don't quite understand... it's unsettling). A solution is to go back to basics, and then slowly increase it in complexity by varying only one thing at a time. Then, I can get on top of the insights I've had, how they interact and what they mean. Actually, this may even be a reasonable way to proceed, alternating between intuition and logic. After all, as Henri Poincaré said: > *It is by logic that we prove, but by intuition that we discover.*
null
0
1316222034
False
0
c2kgfcz
t3_ki52y
null
t1_c2kgfcz
t3_ki52y
null
1427610226
4
t5_2fwo
null
null
null
True
xiongchiamiov
null
Are you [that guy](http://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags)?
null
0
1316222059
False
0
c2kgfgh
t3_ki52y
null
t1_c2kgfgh
t1_c2kg1om
null
1427610227
4
t5_2fwo
null
null
null
True
mamjjasond
null
> give the user a unique one time name and password they should have called it something else then - not a password. People associate the term "password" with something secret and multi-use.
null
0
1316222126
False
0
c2kgfqd
t3_khtwb
null
t1_c2kgfqd
t1_c2kfi3j
null
1427610231
3
t5_2fwo
null
null
null
True
Gnolfo
null
He's more making the point that you should break away from single word passwords and use phrases or at least multi-words instead. Add in punctuation, capitalization, a number, don't forget whitespace, and so on and you will be miles ahead of single word passwords in terms of strength. * "I have 40 TPS reports!" * "Brute-force this, jerks" * "<your team's mascot> won in <year they took a championship>" Even those edge on being sensible and possibly derived from some super complex dictionary attack of the future. So how about throwing together a phrase that wouldn't be used commonly, and then having fun with the punctuation/etc. Take for example, from Gravity's Rainbow, the phrase "you never did the kenosha kid" with something like 9 variations on use and punctuation: http://itre.cis.upenn.edu/~myl/languagelog/archives/001288.html So if you take the comic at face value, which is keeping the multi-word approach exceedingly simple compared to its single word counterpart on purpose, then yes it's not all that wonderful. But taking it a step further in any of a number of dimensions and the strength of the password climbs very rapidly while still being quite easy to commit to memory.
null
0
1316222131
False
0
c2kgfqz
t3_khtwb
null
t1_c2kgfqz
t1_c2kf28k
null
1427610231
1
t5_2fwo
null
null
null
True
lunacraz
null
it's a pretty catchy song
null
0
1316222156
False
0
c2kgfuk
t3_khtwb
null
t1_c2kgfuk
t1_c2kfqhw
null
1427610233
2
t5_2fwo
null
null
null
True
mdipierro
null
The Fedex security procedures are very poor. I once ordered a phone with T-mobile and cancelled before shipment. T-Mobile shipped again but asked me to refuse delivery. I was out of town so I called Fedex and asked not to deliver. I also left a message on my door asking not to deliver. They left a $800 phone outside my door in the open, under the rain, and I live in a densely populated area. I tried to return it but they never came to pick it up. I returned it to the Fedex office and as proof that I handed them the phone, they game a photocopy of the original delivery receipt. Somebody could have stolen the phone in front of my door. The Fedex employees could have stolen the phone. Either case there would be no way for me prove I was not responsible for the loss.
null
0
1316222171
False
0
c2kgfwv
t3_khtwb
null
t1_c2kgfwv
t3_khtwb
null
1427610233
3
t5_2fwo
null
null
null
True
zck
null
That is wrong. For example, in Firefox, there's an [about:config pref](http://kb.mozillazine.org/Network.http.sendSecureXSiteReferrer) to control whether Referer is sent "when navigating from a https site to another https site". Its default is `true`.
null
0
1316222260
False
0
c2kgg8f
t3_khtwb
null
t1_c2kgg8f
t1_c2kf8ec
null
1427610238
2
t5_2fwo
null
null
null
True
cyrex
null
I'm aware.. that was my point... They do not hire good programmers
null
0
1316222417
False
0
c2kggsz
t3_khtwb
null
t1_c2kggsz
t1_c2kff00
null
1427610256
2
t5_2fwo
null
null
null
True
gnaritas
null
Being emailed your password doesn't imply it's stored in plain text, it just means they didn't store it with an irreversible hash. Many places simply encrypt it. It's still wrong, but not stored in plain text.
null
0
1316222461
False
0
c2kggyo
t3_khtwb
null
t1_c2kggyo
t1_c2kg8uo
null
1427610249
3
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316222510
False
0
c2kgh5p
t3_khtwb
null
t1_c2kgh5p
t1_c2kgg8f
null
1427610256
1
t5_2fwo
null
null
null
True
zck
null
This is incorrect. Firefox has an [about:config preference](http://kb.mozillazine.org/Network.http.sendSecureXSiteReferrer) to control whether Referer is sent "when navigating from a https site to another https site". Its default is `true`. Can you point out, either in the spec I linked to before, or on some other page, something that supports the "only same-domain Referer" policy?
null
0
1316222533
False
0
c2kgh8h
t3_khtwb
null
t1_c2kgh8h
t1_c2kezej
null
1427610259
6
t5_2fwo
null
null
null
True
nfriedly
null
FYI, while all of Facebook's SDKs already support OAuth 2.0, starting on October 1st they will *only* support OAuth 2.0 - anything that depends on the older authentication system will break.
null
0
1316222672
False
0
c2kghr8
t3_ki9q6
null
t1_c2kghr8
t3_ki9q6
null
1427610264
1
t5_2fwo
null
null
null
True
sedition
null
A million years ago (internet time) I used hunter2 exclusively for my password. I figured if you guessed that you deserved my shell account.
null
0
1316222867
False
0
c2kgigq
t3_khtwb
null
t1_c2kgigq
t1_c2ke3me
null
1427610271
1
t5_2fwo
null
null
null
True
evinrows
null
Yes, that's what I was saying. In my first comment I was saying that'd I'd rather show appreciation for dedication to learning rather than "innate ability", because there's just not much to be said about someone who was just born intelligent. It's easier to appreciate someone who is really dedicated to something. After typing that though, I sort of realized that your dedication to something could just be traced back to your environment and your DNA, both of which are really out of your hands, which takes away some of the merit that you earn from doing great things. It's not really a useful concept and I certainly wouldn't base my life actions off of it (like with most nihilistic philosophy), but I guess it stands. Hope I clarified.
null
0
1316222940
False
0
c2kgipg
t3_khf6j
null
t1_c2kgipg
t1_c2kd30o
null
1427610274
1
t5_2fwo
null
null
null
True
zck
null
You can tell how, in the HTTPS spec, they wanted to split the difference between "help developers make a better product" and "don't leak sensitive data". Firefox could certainly do what you're suggesting; if you suggest it, they might implement it. It sounds like improved functionality, for those few people that would turn it on.
null
0
1316223136
False
0
c2kgjdv
t3_khtwb
null
t1_c2kgjdv
t1_c2kgh5p
null
1427610281
2
t5_2fwo
null
null
null
True
misplaced_my_pants
null
Yeah I get what you're saying. I guess I just see it as a cop out when people look to genetics; it's always something that you can't prove and I think it's a more productive line of reasoning to focus on environment.
null
0
1316223209
False
0
c2kgjmd
t3_khf6j
null
t1_c2kgjmd
t1_c2kgipg
null
1427610284
1
t5_2fwo
null
null
null
True
p47n1p
null
> reading obfuscated source code isn't really reverse engineering Well I didn't "reverse engineer" the ffmpeg code because it was impossible to make sense of 4 layers of C preprocessor macros and undocumented lookup tables. I really believe it would have been easier to read the assembly it generated. Thankfully there was another less obfuscated (though not by much) implementation I was able to ~~reverse engineer~~ decrypt. > the developers are fixing bugs (not just optimizing) Indeed they are (although they still haven't fixed my bug I reported 2 years ago), and it was so nice of them to remove the need for entering a cryptic message just to use the bug tracker. ;) Sadly, if it hadn't been for multimedia mike setting up FATE, there wouldn't even be any guarantee ffmpeg was really working for your obscure format of interest (unless it was spitting out noticeable artifacts or crashing). Nor would we have wiki.multimedia.cx to provide a minimum amount of high-level info about the formats. I have to agree with mgrandi, I really don't understand how the developers code like they do.
null
0
1316223281
False
0
c2kgjw7
t3_kgqdd
null
t1_c2kgjw7
t1_c2kezdi
null
1427610287
1
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316223431
False
0
c2kgkfw
t3_khtwb
null
t1_c2kgkfw
t1_c2kgjdv
null
1428193846
2
t5_2fwo
null
null
null
True
ScreamingGerman
null
Yes, my son?
null
0
1316223504
False
0
c2kgkob
t3_khtwb
null
t1_c2kgkob
t1_c2kfedx
null
1427610300
1
t5_2fwo
null
null
null
True
zck
null
Hey, no problem. Good luck!
null
0
1316223581
False
0
c2kgkxk
t3_khtwb
null
t1_c2kgkxk
t1_c2kgkfw
null
1427610304
1
t5_2fwo
null
null
null
True
TraumaPony
null
"mathematics" is a big word? Fucking reddit...
null
0
1316223645
False
0
c2kgl61
t3_khf6j
null
t1_c2kgl61
t1_c2kf7r4
null
1427610306
4
t5_2fwo
null
null
null
True
evinrows
null
There is no maximum sentence size but run-on sentences don't have anything to do with length.
null
0
1316223960
False
0
c2kgmaq
t3_khf6j
null
t1_c2kgmaq
t1_c2kbwpp
null
1427610322
6
t5_2fwo
null
null
null
True
seanbaxter
null
It's not on the todo list right now because I'm not sure I could do that particular algorithm justice. Next up is global segmented scan and that leads into sparse matrix. But I will check the FFT literature and see what the state of the art is. Maybe there are some things I can do with it.
null
0
1316224034
False
0
c2kgmkn
t3_khryi
null
t1_c2kgmkn
t1_c2kfbpf
null
1427610327
9
t5_2fwo
null
null
null
True
[deleted]
null
How could that be your point... you say they pay more for their drivers(who they pay nothing). Unless you mean like they really pay their developers shit.
null
0
1316224096
False
0
c2kgmrq
t3_khtwb
null
t1_c2kgmrq
t1_c2kggsz
null
1427610331
-1
t5_2fwo
null
null
null
True
McBurger
null
For the lazy: https://fedex.com/OnlineLabel/login.do?labelUserCdDesc=JoeyBrunel&labelPasswordDesc=fr7ZCaVUQI
null
0
1316224157
False
0
c2kgn08
t3_khtwb
null
t1_c2kgn08
t3_khtwb
null
1427610334
1
t5_2fwo
null
null
null
True
dron57
null
I don't understand what you mean by 'compile'. I thought ASM code can simply be executed, if it's on its native architecture.
null
0
1316224415
False
0
c2kgnxy
t3_khxzd
null
t1_c2kgnxy
t1_c2kfn6f
null
1427610348
0
t5_2fwo
null
null
null
True
mmhrar
null
If you are a startup working on something that doesn't sound absolutely ridiculous and can show that you won't be going under in at least a year, you shouldn't have too much trouble. My next job, I'm going to be looking for a relatively stable start up, tired of big companies.
null
0
1316224487
False
0
c2kgo6x
t3_khx0u
null
t1_c2kgo6x
t3_khx0u
null
1427610350
2
t5_2fwo
null
null
null
True
otakucode
null
We understand. You're trying to keep the forum safe for alien life forms who might not understand ideas that refer to human-specific terms. I mean, sure, there's more than 6 billion of us, and not a single one is without a sexual component to their life, so it makes sense we might be tempted to view sexuality as not a big deal, but we should think more broadly. Just because our sexuality is one of the most important parts of our identity as human beings, and a necessary bodily fact of life doesn't mean everyone the post will reach will have the equipment and experience necessary to understand. Really though, the question makes sense even if the objects were named completely nonsensical names... and I don't think it's likely that the names would confuse anyone as to the functional nature of the code.
null
0
1316224490
False
0
c2kgo7e
t3_j35ew
null
t1_c2kgo7e
t1_c28qx8z
null
1427610351
-1
t5_2fwo
null
null
null
True
otakucode
null
Isn't being able to talk about sex without getting all nervous and uncomfortable what separates us from the middle schoolers?
null
0
1316224571
False
0
c2kgoih
t3_j35ew
null
t1_c2kgoih
t1_c28qy97
null
1427610356
1
t5_2fwo
null
null
null
True
otakucode
null
I think you're a tad confused. It's children that are confused and befuddled when it comes to sex talk. Adults deal with it like it is, basic bodily functions shared by over 6 billion individuals, and hardly worth getting hot under the collar about.
null
0
1316224668
False
0
c2kgow8
t3_j35ew
null
t1_c2kgow8
t1_c28qwrr
null
1427610358
1
t5_2fwo
null
null
null
True
Gnolfo
null
...It's not and it's not claiming to be? He's taken some very well understood and long-known password usage philosophy and put it in a simple digestible format, which as it happens makes it highly convenient to use for getting a point across in a medium like this as it's a highly condensed yet expressive summary. He's not making claims that he came up with it, in fact the alt text suggests this should be common knowledge but sadly isn't. Nobody would read a link to some 12 page analysis that delves further into the topic, and from what would be called a definitive source (if any exist), so use a comic that gets the point across quickly and effectively.
null
0
1316224911
False
0
c2kgpsv
t3_khtwb
null
t1_c2kgpsv
t1_c2kg2be
null
1427610369
2
t5_2fwo
null
null
null
True
manberry_sauce
null
I don't care for the fantasy genre, but I'm glad other people enjoy it. I just wish this "and my axe" thing would go the fuck away.
null
0
1316224973
False
0
c2kgq1w
t3_khtwb
null
t1_c2kgq1w
t1_c2ke8wn
null
1427610372
1
t5_2fwo
null
null
null
True
mmhrar
null
I like reading about problems in other languages. Sometimes I read something like this, a problem I would have never in my wildest dreams could even exist. That being said, I'm not really convinced using string manipulation on runtime information is a good way to do anything :P This whole concept doesn't even make sense to me. You group objects depending on if they have the same function name. Does it matter if two completely separate objects have the same function name and land in the same group? What if they operate on completely different parameters? I thought reflection was dangerous as it was, but at least the information is strongly typed. This is a sort of thing, in my experience, is solved during the design phase and you rely on the compiler when invoking the corresponding derived methods for each type of object. Not hating on the blog or what he did, it's just so 'wtf' to me coming from C++. Then again, I remember stepping into C# and having to continually tell myself each time I used the 'as' keyword it was NOT a hack and actually normal/accepted practice.
null
0
1316225104
True
0
c2kgqjp
t3_khnlm
null
t1_c2kgqjp
t3_khnlm
null
1427610377
4
t5_2fwo
null
null
null
True
robertcrowther
null
It's important for employers to not allow malware to be downloaded just because that malware happens to be delivered over HTTPS. I seriously doubt there's anyone, anywhere employed to actually read the same web pages the employees are reading.
null
0
1316225131
False
0
c2kgqnl
t3_khtwb
null
t1_c2kgqnl
t1_c2kfd2p
null
1427610378
1
t5_2fwo
null
null
null
True
manberry_sauce
null
I saw the first movie before it was released. I knew that all three movies had been shot already. The first movie was so f'in long that at some point I thought we were watching all three of them back-to-back.
null
0
1316225169
False
0
c2kgqst
t3_khtwb
null
t1_c2kgqst
t1_c2ke8te
null
1427610380
1
t5_2fwo
null
null
null
True
Gnolfo
null
Plus add in capitalization, add in punctuation, add in numbers, venture out beyond just 4 words, and the gap broadens by leaps and bounds, not to mention dictionaries start to fail and so you're back to some brute forcing on enormous search spaces.
null
0
1316225230
False
0
c2kgr0n
t3_khtwb
null
t1_c2kgr0n
t1_c2keva5
null
1427610382
2
t5_2fwo
null
null
null
True
gaussin
null
Very motivating indeed. [relevant: Richard Feynman](http://en.wikipedia.org/wiki/Richard_Feynman) > In high school, his IQ was determined to be 125—high, but "merely respectable" according to biographer James Gleick. Feynman later scoffed at psychometric testing. By 15, he had learned differential and integral calculus. Before entering college, he was experimenting with and re-creating mathematical topics, such as the half-derivative, utilizing his own notation. In high school, he was developing the mathematical intuition behind his Taylor series of mathematical operators.
null
0
1316225254
False
0
c2kgr3s
t3_khf6j
null
t1_c2kgr3s
t3_khf6j
null
1427610382
2
t5_2fwo
null
null
null
True
leadline
null
this made me laugh.
null
0
1316225312
False
0
c2kgrba
t3_khtwb
null
t1_c2kgrba
t1_c2kfv6s
null
1427610384
1
t5_2fwo
null
null
null
True
jutct
null
Well I think most groups have prebuilt rainbow tables generated from every password they every get, with every popular hash algorithm.
null
0
1316225453
False
0
c2kgru6
t3_khtwb
null
t1_c2kgru6
t1_c2kedi2
null
1427610390
1
t5_2fwo
null
null
null
True
malfy
null
Funny, because computer scientists actually have the **highest** chances of getting laid if they use the right approach :P
null
0
1316225457
False
0
c2kgrun
t3_khf6j
null
t1_c2kgrun
t1_c2kb7zt
null
1427610390
1
t5_2fwo
null
null
null
True
nofuckingwaydude
null
*Nothing* can save you on a computer you don't trust. SSL, TOR and incognito mode won't save you from keyloggers or video cameras.
null
0
1316225472
False
0
c2kgrwl
t3_khtwb
null
t1_c2kgrwl
t1_c2ketgh
null
1428193845
1
t5_2fwo
null
null
null
True
Sniffnoy
null
We know how to do that for binary representations; since when do we know how to do it for decimal? And this is the continued fraction representation, anyway, which just aren't used for computation in the first place.
null
0
1316225609
False
0
c2kgsee
t3_khf6j
null
t1_c2kgsee
t1_c2kg094
null
1427610397
1
t5_2fwo
null
null
null
True
jutct
null
But I think most are generated from know lists using methods that aren't brute force. They also generate hashes for different algorithms. That's why thenonly truly secure passwords are long, random, and use non alpha chars. Odds are, if a password contains a word or variation, someone else somewhere has used that password. That's where rainbow tables come in handy.
null
0
1316225683
False
0
c2kgsoj
t3_khtwb
null
t1_c2kgsoj
t1_c2kedi2
null
1427610401
1
t5_2fwo
null
null
null
True
gaussin
null
**Right approach**: If we all go for the blonde and block each other, not a single one of us is going to get her. So then we go for her friends, but they will all give us the cold shoulder because no one likes to be second choice. But what if none of us goes for the blonde? We won't get in each other's way and we won't insult the other girls. It's the only way to win. It's the only way we all get laid.
null
0
1316225856
False
0
c2kgtb6
t3_khf6j
null
t1_c2kgtb6
t1_c2kgrun
null
1427610420
2
t5_2fwo
null
null
null
True
raydeen
null
Nope. ASM is one step above straight machine code. Still needs compilation. Otherwise it would be interpreted.
null
0
1316225858
False
0
c2kgtbd
t3_khxzd
null
t1_c2kgtbd
t1_c2kgnxy
null
1427610420
8
t5_2fwo
null
null
null
True
jutct
null
But any good rainbow table will contain hashes for different passwords. They are created knowing the original password, so it's easy to hash it using different algorithms. There isn't a lot of brute force involved in their creation.
null
0
1316225860
False
0
c2kgtbn
t3_khtwb
null
t1_c2kgtbn
t1_c2keera
null
1427610420
1
t5_2fwo
null
null
null
True
jutct
null
True. very bad idea to put passwords there. lol
null
0
1316225979
False
0
c2kgtq7
t3_khtwb
null
t1_c2kgtq7
t1_c2kej9o
null
1427610417
2
t5_2fwo
null
null
null
True
mappu
null
The offline installer is available [here](http://www.microsoft.com/download/en/details.aspx?id=27538) and it's about 2GB.
null
0
1316226080
False
0
c2kgu3g
t3_khtuh
null
t1_c2kgu3g
t1_c2kf8f7
null
1427610423
6
t5_2fwo
null
null
null
True
mappu
null
woo, C++11 <thread>
null
0
1316226190
False
0
c2kguhr
t3_khtuh
null
t1_c2kguhr
t3_khtuh
null
1427610428
3
t5_2fwo
null
null
null
True
[deleted]
null
Why words\*\*4 and not \*\*3 or **5? Also, this technique could easily be combined with adding something say in the middle of the second word. Good luck accounting for that. You can't possibly predict the many, many things I *might* do.
null
0
1316226314
False
0
c2kguz5
t3_khtwb
null
t1_c2kguz5
t1_c2kecym
null
1427610431
2
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316226503
False
0
c2kgvmw
t3_khf6j
null
t1_c2kgvmw
t1_c2kgr3s
null
1427610438
1
t5_2fwo
null
null
null
True
SoundOfOneHand
null
Well, it's a big deal in the sense that it's unusual for a 13 year old to pull it off, but you're right, everything Wolfram writes comes off like this, his voice just seeps right through with blatant self-promotion. I can't say that I hold it against him at that but it has such a strong cult of personality vibe to it, that it's really distracting after the first time you've noticed.
null
0
1316226640
False
0
c2kgw5l
t3_khf6j
null
t1_c2kgw5l
t1_c2kfslj
null
1427610446
3
t5_2fwo
null
null
null
True
wreckerone
null
Pay good money and don't be an ass to your employees. How hard is it? Oh, you don't want to do either of those things?
null
0
1316226650
False
0
c2kgw6h
t3_khx0u
null
t1_c2kgw6h
t3_khx0u
null
1427610446
8
t5_2fwo
null
null
null
True
otakucode
null
Small correction: Deciding whether A program will stop is not impossible or often even difficult. Deciding whether ANY program will stop is the difficult bit. You could make an oracle that would return true if a specific program would halt, but you can't make one that can answer the question for ALL programs.
null
0
1316226852
False
0
c2kgwxu
t3_hdeg3
null
t1_c2kgwxu
t1_c1uk4ws
null
1427610457
1
t5_2fwo
null
null
null
True
richdougherty
null
Assembly code is machine specific, but raydeen is right: some work still needs to be done to turn the human-readable assembly language into a binary format that can be executed by the machine. The translation process is quite straightforward for assembly compared to higher-level languages, but there's still work to do before it will be natively understood by the machine (and OS). If we're being picky then we usually say that an assembler 'assembles' a program rather than 'compiling' it. Maybe this is what you spotted. :)
null
0
1316226878
False
0
c2kgx12
t3_khxzd
null
t1_c2kgx12
t1_c2kgtbd
null
1427610458
3
t5_2fwo
null
null
null
True
pseudolobster
null
No, not really. You create a set of rainbow tables for each individual crypto algorithm. Each table of course contains the crypts for millions of passwords, but they're only valid if they're encrypted the same way using the same algorithm as is used to create the tables. bcrypt uses an adaptive salt, so no tables can be generated for it... or, an infinite number of tables would need to be generated for them to be useful. So yeah, no.
null
0
1316227071
False
0
c2kgxpu
t3_khtwb
null
t1_c2kgxpu
t1_c2kgtbn
null
1427610476
1
t5_2fwo
null
null
null