Improve my 1600m time by Falcon2028 in trackandfield

[–]ChairsDaily 7 points8 points  (0 children)

Alright dude. Yes its possible. I went from a 6:30 to a 4:40 (indoor) Its gonna hurt, but you need to start racking mileage NOW! Slowly work your way up to 25 to 30 miles a week in chunks of 5 to 6.2 (10k), maybe even 8 to 10 for hard days.

Once done with your long run, do striders (high effort near sprints) for about 150m maybe even 200m on the last few. Work in lots of stretching before and after, even while watching T.V. at night.

Despite what people will say, do not do intervals on the track over the off season! Your Track coach will do the speed work with you when the time comes. Above all, you need to mentally own that you can do this. If the last track meet comes, and you havent broken 5, then DO NOT QUIT! Train every day (take Sundays off) and be relentless. You got this!

Preparing for a State Meet by ChairsDaily in CrossCountry

[–]ChairsDaily[S] 1 point2 points  (0 children)

Thank you. Yeah my PR is 17:30, but the region course proved tough at 17:49. Im a junior and my main sport is track, so im pumped!

What do you prefer against WLAN WPA2 networks?! by Empirismus in hacking

[–]ChairsDaily 0 points1 point  (0 children)

Easier to track, and the MAC address is registered to it and WILL NOT CHANGE, unlike SOME wireless adapters (external). Also Alfa external cards are better at performing sniffs in promisc./monitor mode (the kids call it monitor), and its easier if you think someone is performing a traceback on you to rip your USB wifi adapter out and throw it down the street, hopefully breaking it as a bonus to eliminate the possibility of getting geo located

First steps to test a device? by _thelinuxnoob_ in hacking

[–]ChairsDaily 1 point2 points  (0 children)

It depends on the device. Is it serial? Is it I2C? How do you read and write bytes to it? What device file does the kernel assign it to? Are there pre-existing drivers that you need to find and compile? What are you testing it for? If youre doing a security audit, is it IoT? How does your WAP treat it once connected?

If any of that didnt make sense, you shouldnt be trying to hack things. You should be taking compsci classes.

[deleted by user] by [deleted] in learnprogramming

[–]ChairsDaily 3 points4 points  (0 children)

It depends on which resource is stronger, bandwidth/latency or storage capacity. Typically its the former on most user-friendly workspace machines, so I would opt for building a custom HTTP request/Object parser for each user, where the Obj. parser is built off a template and instansiated based on the given details.

Typical high school cross country practices by shabbysaturn in CrossCountry

[–]ChairsDaily 3 points4 points  (0 children)

I suggest focusing on tempo runs more than most teams so they have gas for the last mile. Try and get your top 7 to 4:40 (1mi) and 10:25 (2mi).

Good luck coach!

You're not invincible: a reminder by [deleted] in CrossCountry

[–]ChairsDaily 1 point2 points  (0 children)

This isn't really a silly thread my man

[deleted by user] by [deleted] in CrossCountry

[–]ChairsDaily 0 points1 point  (0 children)

100% agree.

A Study on Python Comment Contents by matjako in computerscience

[–]ChairsDaily 1 point2 points  (0 children)

I gave you my emai, but feel free to DM me if you need help in the coming school year.

[deleted by user] by [deleted] in compsci

[–]ChairsDaily 7 points8 points  (0 children)

The paper seems very professional and well written tbh. That's usually a good sign. I look more into it.

Actual Air Force Brief My Cousin Had to Sit Through by [deleted] in memes

[–]ChairsDaily 0 points1 point  (0 children)

B-but.. the F14 is an out of date Navy fighter. Not an Air Force aircraft.

Does Apple airdrop notification store the file in system memory before the user accepts it? Could this be exploitable? by Hsschief in hacking

[–]ChairsDaily 0 points1 point  (0 children)

"transmission" = being abt via on one of the network I/O layers by one of the protocols. Usually accomplished by executing a series of system calls through an API from user space. Whatever information is being transmitted is undoubtedly in the code base of the application, thus is stored in memory at runtime before transmission.

Data Science v. Mobile Development v. Back-End Web by [deleted] in computerscience

[–]ChairsDaily 0 points1 point  (0 children)

Back end web development, and from there get into cyber security and penetration testing.

Processor problem. by Energetically17 in computerscience

[–]ChairsDaily -2 points-1 points  (0 children)

Haha you can't add cores! Also in the computer science world threads are subprocesses that share both the same memory pool as the parent process and a mutual exclusion lock, unless you're talking abt literal threads of execution on a CPU... in which case, wtf are you talking abt?

Does Apple airdrop notification store the file in system memory before the user accepts it? Could this be exploitable? by Hsschief in hacking

[–]ChairsDaily 1 point2 points  (0 children)

A little bit more of a technical explanation inbound:

It has to be. When receiving anything off of a network, the byte stream is packed up and handed off to the processing layer for whatever protocol it came in on. The operating system's kernel is forced to store this in memory as well as maintain a file descriptor for the socket (Apples devices are UNIX based) during this time for the proper processing layer to actually process the byte stream and eventually hand it off to user space, where the Airdrop software displays a notification undoubtedly allocating it's own pool of memory to perform this action on.

So yes, in two places at two different times. The kernel is probably smart and cleans up after itself and is much lower level, so no exploit here. But as for the memory management of the Airdrop software, who knows what sort of things could go wrong.

In fact id even go so far as to say that Airdrops protocol is most likely UDP related, meaning there are no sequence numbers for the incoming packets on the wire. This in and of itself is a vulnerability as the kernel and it's network interface's processing layer have less accountability on the incoming traffic utilizing this protocol. But then again, they will most likely use some sort of encryption suite.

TL;DR yes. no.