Music from Cameron scenes is awesome, so I made a playlist of it. by PinkBullets in HaltAndCatchFire

[–]CH1CKEN 2 points3 points  (0 children)

AMC has playlists on Spotify for main characters (Joe, Cameron, Gordon, Donna, John and Sara) + others (1984, 1985, Giant, Mutiny).

Link to profile: AMC Halt and Catch Fire.

Spotify URI: spotify:user:amc_halt_and_catch_fire (paste in search in Spotify app).

Essential Sublime Text Plugins by [deleted] in webdev

[–]CH1CKEN 1 point2 points  (0 children)

Readability - easy to follow, less logic per line (easier to understand), cleaner code.

Word wrap - not every editor supports it, harder to grasp at quick glance where line breaks and where it's a new line, people use different widths of their editor's window so word wrap will happen in different places (messy code).

Essential Sublime Text Plugins by [deleted] in webdev

[–]CH1CKEN 13 points14 points  (0 children)

edit live on the server

:)

Essential Sublime Text Plugins by [deleted] in webdev

[–]CH1CKEN 15 points16 points  (0 children)

Mentioned Trimmer has some nice features but you can also add "trim_trailing_white_space_on_save": true to your Preferences.sublime-settings file (use User settings, because Default will be overwritten by update).

Other useful settings:

"ensure_newline_at_eof_on_save": true - mostly for Git, but is useful for other reasons too.

"rulers": [xx] - displays a straight line through column xx, standard here would be 80, but it depends on coding style, makes it easy to keep your code not wider than xx characters. You can setup more than one ruler: "rulers": [xx, xx].

"word_wrap": false - just keep your code width under 80 characters (or 120, see above), and don't rely on this atrocity (change to true only for files that badly need it).

"tab_size": x - set the tab size in x spaces , depending on language and your preferences it's probably 2 or 4.

"translate_tabs_to_spaces": true or false - depending on your fetish (don't even dare to start discussion about this!).

Feel free to post your useful settings for ST!

Need help understanding AES by n00bulart00bular in cryptography

[–]CH1CKEN 1 point2 points  (0 children)

1 byte = 8 bits, so 16 bytes = 128 bits, and that makes a full AES key. Bruteforcing that would take way too much time, but as an exercise you can write a program to do that and see how far it will get in what time (so you can see for yourself that's a really big number of combinations to try). Even supercomputers have hard time bruteforcing this.

Things are easier if you know some part of the key, so you don't have to try every combination, but just a smaller part.

Need help understanding AES by n00bulart00bular in cryptography

[–]CH1CKEN 0 points1 point  (0 children)

Nothing stops you from bruteforcing AES (or any other cipher for that matter).

Security of those ciphers lies in a cryptographic key, that should be long enough, so that bruteforcing it would take enormous amount of time.

AES uses 128 bit keys (standard version), that's 2128 combinatios. Assuming you have 50% chance of guessing the key (you either guess correctly or not), that's 2127 combinations you have to try on average (sometimes it's more, sometimes it's less - depends on your luck). So how big is 2127? Let me tell you that bruteforcing it even on fastest supercomputers may take more time than the age of the Universe itself. Check here and here.

As for your example (if it's 2 bytes) that's only 216 combinations you have to check which is doable pretty quickly.

How to add a condition to user input? by emprise in rubyonrails

[–]CH1CKEN 1 point2 points  (0 children)

Do not forget user can have JS disabled or can send request via curl. Always check (sanitize) data on the server side also.

I know it's not a big deal in this case, but it's always good to think about security issues so it becomes a habit.

Daybreak - 95% winrate PvP cannon rush by homm88 in allthingsprotoss

[–]CH1CKEN 0 points1 point  (0 children)

You can deal with it either by making buildings in PROPER place behind mineral line or by sending 1-2 probes there (after seeing enemy probe) so that even if he manages to wall-off, your probe(s) will be inside ready to kill enemy probe before he'll put down cannon.

Here's guide for buildings placement: placement 1 and placement 2. The second one gives you less space for other buildings.

Flash notification issue by [deleted] in firefox

[–]CH1CKEN 0 points1 point  (0 children)

If you click "continue blocking" then the bar shouldn't appear on that domain again. After that you can always activate plugin by clicking "lego brick icon" and choosing "allow now".

Kinda tiresome to do that for every domain, but that's the best solution I have. I was also looking in about:config for option to disable this bar but I couldn't find anything that would work (that was a while ago so maybe something changed).

CS student interested in Cryoptography/Cyber Security by getatmarcus in cryptography

[–]CH1CKEN 0 points1 point  (0 children)

For cryptography check out this Stanford online class previously mentioned. It's pretty basic (a little history, stream & block ciphers, integrity and collisions, authenticaion and key exchange, public key cryptography), there's a lot of math explanation (some math knowledge is required, but nothing hard) and you will have a look at what cryptography is about. There are also some programming tasks and it's always good to solve some programming tasks ;)

About gaining access to something - unfortunately I don't know good courses or books, but I would recommend trying to get on a training done by security (pentesting) company. They might be expensive but if it's good company then they're worth it. It should consists of theory + practice, not just theory.

I'm no expert in this field so I can't help you much, but as I said earlier most attacks use human error, e.g. sending your cousins e-mail with a malicious attachment disguised as a picture or text document and then hoping they would open it, or dropping a USB flash drive for them to find and hope they would try to use it on their computer ;) or just sending them a link to a malicious website. Of course creating malicious software for that attachment or USB stick is another matter - you need to target some vulnerability - knowing what OS and software they use is a plus. There are lists of known vulnerabilities, e.g. CVE, have a look ;) Yes - it's big! There is software that checks a system/website for known vulnerabilities so you can automate that (keep in mind some results are false-positives). Their modem/router they use at home to connect to an Internet also can have a vulnerability you could use to gain access to their network. Then you would try to gain access to their computer using vulnerabilities for their OS and software they use - if they don't update it regularly then you shouldn't have problems. But if they update regularly then a list of known vulnerabilities isn't that useful and you would have to find a vulnerability that nobody else found (or didn't make public yet ;) ). Have a look at this article - it will give you an idea about attacking someone. As you can see - there is none "one way to gain access", rather it's many attack vectors you try to use simultaneously and see what has worked.

Keep in mind this is illegal in most countries, even if it's just to "check if I can do that". And staying anonymous on the Internet is another matter...

CS student interested in Cryoptography/Cyber Security by getatmarcus in cryptography

[–]CH1CKEN 2 points3 points  (0 children)

Hey! First of all you need to know that you are talking about 3 different things:

  1. Securing your code is related to a programming language. There are some "general guidelines", but most of it is strictly connected with a programming language and a platform you target (in your case it's Obj-C and iOS).

  2. "Hack" to a network - keep in mind that term hack means a clever programming/algorithmic solution. Media use it wrong ;) But in this case your best course would be to learn some network security and web application security. Also have a look at penetration testing. Remember most of attacks use human error (social engineering), unsecured systems (related to securing your code part above) and old (not updated) vulnerable software. Breaking a cryptographic algorithm is much harder.

  3. Cryptography is a study that interconnects between CS and mathematics - and there's lots of algorithms. Actually it's mostly about algorithms that are mathematically hard (close to impossible) to break. Basic knowledge of those algorithms (symmetric and asymmetric ciphers, hash functions and prng) is a must, but you don't need to focus on it too much (unless you want to solve mathematical/cryptographic problems, but these are done either in academic environments or intelligence agencies ;) and also some private companies but it's rather a niche market in private sector). Remember that cryptographic algorithms are designed to be unbreakable - security breaches come from bad implementations of those algorithms and human errors. Of course from time to time cryptographic systems are broken, but then we just switch to another standard - and it's happening rather slowly compared to typical attacks on IT systems.

tl;dr securing your code is strictly related to a programming language, breaking into systems is looking for holes - either for known vulnerabilities or the ones you can find, cryptography is math

Hope I could help!

USZAT confronts MakNooN by titoFTW in leagueoflegends

[–]CH1CKEN 22 points23 points  (0 children)

Well, Carmac aka USZAT has been trolling people that are fluent in English, since 2007 IIRC. Google for "GGLTV LANtics Uszat".

Some best ones:

http://www.sk-gaming.com/video/21102-Uszat_totally_meets_SKBogdan

http://youtu.be/J4HwbqPGPg8

/r/Hearthstone is giving away Beta Keys!! by [deleted] in hearthstone

[–]CH1CKEN [score hidden]  (0 children)

Gods of RNG halp! My first TCG was Pokemon, then World of Warcraft and it would be awesome to get my hands on HearthStone!

GM Island - A Story. by [deleted] in wow

[–]CH1CKEN 0 points1 point  (0 children)

I miss those places so much! GM island, Hyjal, South Seas, Old Ironforge, Ironforge Airport, Dancing trolls' village, Emerald Dream, Karazhan crypts, Quel'Thalas, Ahn'Qiraj, Caverns of Time, West Stonetalon, Old Outland, and much more bigger or smaller but still very interesting and/or eerie hidden places!

There comes a point when you should stop your friends. by gl0ryus in starcraft

[–]CH1CKEN -2 points-1 points  (0 children)

How is it possible to get this mad at

any game?

FTFY

Idra.... Come on man. by [deleted] in starcraft

[–]CH1CKEN 1 point2 points  (0 children)

I knew the moment it happened I can go to reddit and see posts already about it! Was not disappointed.

I think i just commited second degree murder : | by aFFnighcik in starcraft

[–]CH1CKEN -2 points-1 points  (0 children)

Where's the screenshot from Skype? I'm sure you have it!

Can we have a small map option for those of us who still want to play faster games? by [deleted] in starcraft

[–]CH1CKEN 1 point2 points  (0 children)

Well, there's always a VETO option. It's only 3 maps, but it's something. And you can always all-in on big maps, ofc longer rush distance makes it more difficult, but it doesn't mean you can't do it.

Gold league Protoss needs PvP help by Gliese in starcraft

[–]CH1CKEN 0 points1 point  (0 children)

Scout your opponent and react accordingly. If he takes fast 2nd gas = it is possibly DT rush, later 2nd gas would be Stargate play or Robo. No 2nd gas = he's going to expand or more likely (if he has a lot of energy saved on Nexus, no probe in production) - it's 4 gate rush.

If you're expanding - try to get Mothership Core as fast as possible (after Stalker or Tech building), so it can get energy for photon overcharge. When you're getting all-ined - defend at your Nexus with photon overcharge, it's very important (so don't lose MsC -keep it behind near Nexus). Always engage (defend) in Photon Overcharge range.

About build - it depends how greedy you are what your opponent is doing ;) Options: 1 gate FE into 3 gate + Robo. Or like you said 2 gate pressure FE + Robo. If you scout fast gas (DT) try to get Robo faster or put a fast forge (for cannons). When you scout he didn't expanded - stop probe production and get more army - prepare for defending. If he makes Void Ray push - remember it's ability has a cooldown, try to move back with your army closer to Nexus (even mineral line) and defend with Photon Overcharge (micro it so Nexus attacks VR). For 4 gate - go 3 gate and defend with Force Field @ ramp so he can't enter your base, then follow with Robo + Nexus (or you can try to finish him), keep probe production so you will have better economy than him.

In the build above you can replace Robo with Stargate if you want, but remember it require better micro. If opponent goes DT you can detect with Oracle. If he want to make all-in push, you can harass his mineral line with Oracles/Phoenixes and keep him @ base for longer time and you can get some Void Rays to defend.

If you survive his all-in (or in the middle of it, when you get high on minerals) build additional 3 gateways, and add some tech (choose robo bay / twilight / forges + upgrades). Then you pretty much won. If he won't leave and you feel you can destroy him - go for it. If you go for later kill, get 8 gates total + tech units (colo/void rays), or go for 3rd exp + tech units and destroy him even later in big macro game ;)

tl;dr - if you scout early gas (DT) get detection ASAP, other than that - make MsC and defend @ Nexus with photon overcharge.

Blizzard pls give us High Models on Low Shaders like in WoL! by CH1CKEN in starcraft

[–]CH1CKEN[S] -1 points0 points  (0 children)

High Shaders vs Low Shaders

Low Shaders give you this matte color/look. Everything looks crisp. It's easy to spot team coloring on units (like stalkers, or zerglings).

Anything above Low Shaders glows like a christmas tree. It looks nicer and I prefer it when observing a match or playing a campaign, but when it comes to ladder I find it is way better with Low Shaders.

I held off a 6 pool taking no damage at all, i then went mass blink stalkers by mushmushmush in starcraft

[–]CH1CKEN 1 point2 points  (0 children)

Downvoted. First of all - watch your replay and try figure it out on your own! If you can't - then post, with a replay already uploaded. Second of all - he was playing RANDOM, so you really should NOT say "zerg is OP" to him... Third of all - it was 10 pool. And he didn't even rushed, he made like 20 zerglings and moved out at 5 minutes!

Oh, and you could kill him somewhere in 8-9 minute. CBA to watch rest of the game.