The Geek Forum

  • April 28, 2024, 01:07:56 PM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

Due to the prolific nature of these forums, poster aggression is advised.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Messages - Chaulis

Pages: [1] 2 3 4 5 6
1
Anarchy / Re: This is what I did over Christmas break...
« on: December 27, 2009, 11:20:10 PM »
!!! Congrats Detta!

2
Entertainment / Re: Star Wars 1 through 3
« on: December 26, 2009, 03:00:25 PM »
Chewy not only rocks, but is a true rock star.

<image removed, stupid gifs>

3
Entertainment / Re: Fringe - season one
« on: December 25, 2009, 03:15:51 PM »
Here.  :mrgreen:

4
Entertainment / Re: Star Wars 1 through 3
« on: December 25, 2009, 03:14:27 PM »
I call for the button on this one. The use of the acronym that refers to laugh-out-loud in a majority of posts is abhorrent and far surpasses the ratio of use for any decent human being.

5
Entertainment / Re: Star Wars 1 through 3
« on: December 24, 2009, 09:14:53 PM »
Nobody cares. lol

LOLOMFGROFLCOPTER.
How are you to know that no one cares hmm?

6
New Geeks on the Block / Re: i'm curious...
« on: December 18, 2009, 11:11:41 AM »
I can aim, I win.   :-D

7
Anarchy / Re: My son turned pi today
« on: December 17, 2009, 09:23:01 AM »
Congrats!
And Dear Lizard Queen I feel oldish. Seems like it was only yesterday that I was replying to my happy birthday thread on the HN for my 18th.

8
Hardware, Software, and Other Imperialist Crap / Google Voice
« on: December 15, 2009, 08:31:28 PM »
I have 3 google voice invites, anyone interested?

9
Anarchy / Re: Screensavers?
« on: December 14, 2009, 10:30:46 PM »
I used to use a good Star Trek LCARS one on my mac, but I'm really hunting for a good draedus one from BSG.

Anyone remember After Dark?

10
Anarchy / Re: Weird sound issue
« on: December 11, 2009, 02:54:26 PM »
Ok, maybe I'm being a bit unfair. (Ha-ha -- a "bit" unfair -- get it?) It's not necessarily greed. Perhaps Mr. Gates was motivated by a sincere desire to advance the technology. And fractional bits do have a substantial advanage over whole bits. This isn't often noted, but standard computer memory can only store whole numbers. Fractions have to be represented by a combination of a number register and a decimal point register. So, for instance, the number 5 would be stored as (5,0), 5 in one register and the number of decimal places (0) in another. Accordingly, the number 5.1 is stored as (51,1), and the number 5.123 is stored as (5123,3). With the advent of fractional bits, any number can be stored in just one register, effectively doubling your memory. So far, so good. But the problem occurs when the unused portion of the fractional bits is improperly managed. They tend to drift out of their original memory cell into adjoining cells, causing what is called a "memory leak". This can result in a battery of problems, from the familiar BSOD to the more rare but potentially deadly CPU explosions. Little-known fact -- the Linux mascot, the cute little penguin, is a sly Monty-Python reference that directly mocks the exploding CPU bug.

I can go on.


Ivan did you ever work for the Star Trek franchise?

11
Homework Help / Re: Detta! (Or anyone else mathamatical!)
« on: December 10, 2009, 08:38:03 AM »
To caveat, I am not a great programmer or even a good one, I have to grab the book and reference it semi-often when coding. I know enough to know that I'm in the right ballpark, and to know that I don't know what to do and need help. The way I was conceptualizing it was Probie's question was related to a larger program, possibly one where she's designing something for output, and it would need specific data generated at certain points.

screenSizeDeducer(int height,int dividBy,int width, int dividBy2){
         figure out what the singular value is given two dimensions;
}

inputScSzDdVal{
 ask for height;
 ask for dividBy;
 ask for width;
 ask for dividBy2;
}

screenSizeDeducer();

If I understand the intent of recursion correctly, it's purpose is to tell the comp "here do this math and logic and give me the right answers with out me writing out the code to work out each case" And in the case of SQL, it's a procedural languange vs Java which is object oriented. So if later on in the SQL you needed to generate more results, you couldn't just call the same code, [ screenSizeDeducer(passed vars) ] You'd have to go back to that program that generated the solutions, or include it in ever program that would utilize the data. So my mind went there, and I was thinking ooo cool, I can play with some stuff and have real programmers tell me what I could have done to make it better, nifty! So yeah, yours definitely did iterate all possible vals, and I was just wondering if there were other ways of doing it with out having to, and where else could we go with it.

12
Homework Help / Re: Detta! (Or anyone else mathamatical!)
« on: December 09, 2009, 09:05:57 PM »
What language were you originally planning on doing it in? It seems to me that using recursion with java, it wouldn't be all that hard. And you could call it when ever you wanted through out the program easily instead of rewriting the SQL every time you needed to calculate the answers.

13
Anarchy / Re: Help me graduate!
« on: December 09, 2009, 08:28:38 PM »
I built that in to the whole future plans thing, eventually I'm going to need Facebook's cooperation, and hopefully under the flag of academia it will be a fairly painless process.

14
Hardware, Software, and Other Imperialist Crap / Re: MS Word
« on: December 09, 2009, 04:25:09 PM »
Have you seen windows?

15
Anarchy / Re: Help me graduate!
« on: December 09, 2009, 04:24:14 PM »
Thank you all! And future thanks to those who do it after this post. I have 64 responses right now, which is fantastic. The more the merrier of course but it's been out for less than 24 hours. I'm at a 31% response rate from those that I personally sent it out to which is amazing for surveys from what I understand so this is going really well and I really appreciate everyone's help.

My original vision was really fraking nifty if I do say so my self, but sadly the niftyness of it was countered by the massive scale of it, so this is basically phase 1. The next part is what I think will perk even more interest. I'm writing a facebook app that will actually collect the user data in a demonstration, and ask the user whether or not the data is accurate. If they say yes it is accurate I take them at face value, but then I check back later using the app with its inherent permissions to check and see if they've changed their information at all. I will then ask those people who changed their data why they did so. What I'm looking for is misinformation on the original information collected. I then try and validate the claim through other resources like Maltego, Myspace, Spokeo, pipl, etc. If either the new or old information can be validated through third party sources, I can use the statistics to generate a level of confidence of which can be applied to the information on a persons social networking profile. This will give law enforcement an idea of how trustworthy the info can be, and the techniques will be validated through the study and tell me how many different places I have to look before the info is correct enough. Then the techniques can be verifiable and used for social network analysis for future research or investigation :)

So yeah, big dreams, and lots of baby steps to go.

16
Anarchy / Re: Help me graduate!
« on: December 09, 2009, 11:54:53 AM »
Oh? Would it be possible to share some more of the details concerning her research? I'd love to talk to other people doing things similar to my stuff.

17
New Geeks on the Block / Re: i'm curious...
« on: December 09, 2009, 07:33:52 AM »
Considering the nature of the internet, you will find a lot more outspoken guys.  :slap
Welcome to the boards! Hope you enjoy.

18
Hardware, Software, and Other Imperialist Crap / Re: MS Word
« on: December 09, 2009, 07:27:33 AM »
Not surprised you couldn't find Normal.doc, go for Normal.dot instead. No doubt keyboard gremlins must have gotten at BizB's post.
The file is located in:
c:\Documents and Settings\{user name}\Application Data\Microsoft\Templates\
Several of the folders in that path are hidden so you'll have to enable viewing hidden files and folders in order to get at it.

19
Anarchy / Re: Migraines
« on: December 09, 2009, 12:00:53 AM »
I'm one of the lucky ones I guess. I have only had them during times of consistent long term stress and even then only once or twice. Maybe you're thinking too hard and causing a cascade failure in your synapses.  :wink:

20
Anarchy / Help me graduate!
« on: December 08, 2009, 11:54:53 PM »
Hi everybody!
I would like to request everyone's assistance in completing the requirements for my graduation in a timely fashion. I have to collect data to use in my thesis. The data will be absolutely anonymous and no one will be able to tell who responded with what. What I would like is for everyone to go to my site linked below, read the most recent post, and complete the very short 2 question survey at the bottom! Feel free to pass this along to others, the more responses I get, the more accurate my study is! Your assistance in my graduation is greatly appreciated!

My research is related to the ACLU of Northern California's Facebook quiz that helped spur a change in the way Facebook handled the level of access it granted to applications as opposed to user accounts. This is basically the first step into my masters and finishing that nasty little research requirement for my undergrad. I realize this is kinda spammy and such, and I apologize, but I do it with the best intentions and I mean no disrespect to this community of which I hang my hat.

Chaulis.com

21
Sticky Stuff (no pun intended) / Re: IBTNP
« on: November 29, 2009, 07:35:21 PM »
True, underthinking takes much less time.

IBTNP has read at least one XKCD strip.

22
Anarchy / Cyber Ethics
« on: November 29, 2009, 01:41:19 PM »
I'm in my final semester of my undergrad at good ol' EMU and I have to analyze and state an ethical philosophy in regards to cyber security. Essentially this is what I'm going to put into my syllabus and how I'm going to handle ethical questions when I get handed the reigns next semester for the Ethical Hacking classes.

This semester I'm the TA for a class called Ethical Hacking, there hasn't been much discussion about ethics mainly because it is a difficult topic to intertwine into a technology based course structure on top of everything else we've been doing. I've been concerned about some of the students using the skills we teach in an unethical manner and I've done my best to sit down and focus on those students during the time I have with them in the classroom. In some cases I have succeed by explaining to them that they don't always know what they are attacking, and must be very careful in case that server is virtual and they bring down the entire box, not knowing what they just took down. Of course there are going to be those that just don't get it and launch hydra against an ftp server and pound it just for the thrill of it. But I have full faith that this is a very small fraction of the population and won't affect the integrity of the class.

I would like to give a basis of theory for those who haven't come to a firm standing as of yet one way or the other, and reinforce those who already do have an ethical structure in regards to cyber security. While I understand this is going to have a lot to do with ones own personal theory and philosophy on life, a supplement may be able to at least give a guideline to work with.

Personally I've grown up with things like 2600, Hackers the movie, the Anarchists Cookbook, and The Hacker's Manifesto.  Back when hacking was cool, not a weapon, and the philosophy of information is that it should be free no matter what. After reading books like Hacker Cracker by Ejovi Nuwere and being in a place where freedom of information can have a very negative impact to the safety, health, and livelihood of others and their families my viewpoint has become more conservative. And just through understanding the concept of a malicious attacker that uses someone elses box as a proxy to launch an attack from, I can see how counterattacking to that proxy would have serious negative impacts on that innocent victim.

The other side of this is that I am putting together a proposal for a class in Cyber Ethics. Surprisingly in a degree that requires a background check, and signing a 'do no harm' document to enter into, no one is required to examine ethical philosophy prior to graduation. I would like to see this changed for the sheer fact that one becomes more capable of defending their ethical judgments when they are asked to examine their ethical beliefs in a critical manner. 

What I am looking for is your own personal viewpoints on ethics in cyber security/cyber space and other readings on that topic matter that you personally feel are good. So if you are willing to share, I look forward to reading your replies.

23
Hardware, Software, and Other Imperialist Crap / Re: Google Wave
« on: November 29, 2009, 12:52:23 PM »
I just received 20 more invites to hand out, if anyone wants em lemme know.

24
New Geeks on the Block / Re: Hello
« on: November 29, 2009, 12:46:30 PM »
That was kinda of a let down.

25
New Geeks on the Block / Re: Should I be here?
« on: November 29, 2009, 12:45:50 PM »
Welcome either way, the place is fun, geek, hacker, network, org, or not.

Pages: [1] 2 3 4 5 6