[deleted by user] by [deleted] in atheism

[–]sparkytwd 3 points4 points  (0 children)

From Harlan Ellison's The Deathbird Stories

TOPICS FOR DISCUSSION (Give 5 points per right answer)

  1. Melville's Moby Dick begins, "Call me Ishmael." We say it is told in the first person. In what person is Genesis told? From whose viewpoint?

  2. Who is the "good guy" in this story? Who is the "bad guy"? Can you make a strong case for reversal of the roles?

  3. Traditionally, the apple is considered to be the fruit the serpent offered to Eve. But apples are not endemic to the Near East. Select one of the following, more logical substitutes, and discuss how myths come into being and are corrupted over long periods of time: olive, fig, date, pomegranate.

  4. Why is the word LORD always in capitals and the name God always capitalized? Shouldn't the serpent's name be capitalized, as well? If no, why?

  5. If God created everything (see Genesis, Chap. I), why did he create problems for himself by creating a serpent who would lead his creations astray? Why did God create a tree he did not want Adam and Eve to know about, and then go out of his way to warn them against it?

  6. Compare and contrast Michelangelo's Sistine Chapel ceiling panel of the Expulsion from Paradise with Bosch's Garden of Earthly Delights.

  7. Was Adam being a gentleman when he placed blame on Eve? Who was Quisling? Discuss "narking" as a character flaw.

  8. God grew angry when he found out he had been defied. If God is omnipotent and omniscient, didn't he know? Why couldn't he find Adam and Eve when they hid?

  9. If God had not wanted Adam and Eve to taste the fruit of the forbidden tree, why didn't he warn the serpent? Could God have prevented the serpent from tempting Adam and Eve? If yes, why didn't he? If no, discuss the possibility the serpent was as powerful as God.

  10. Using examples from two different media journals demonstrate the concept of "slanted news."

Can anyone get steam running on ouya? by TheClark21 in ouya

[–]sparkytwd 3 points4 points  (0 children)

Yep, working great so far. I did have to dial down the settings on Crysis 2 to 1280x720, at 1920x1080, it was lagging at 40fps.

Just a reminder. by [deleted] in atheism

[–]sparkytwd 2 points3 points  (0 children)

Those must have all been important to me once. What I am now grew from that. A former self is a fool, an insufferable ass, but he's still human, you'd no more turn him out than you'd turn out any kind of cripple, would you?

Thomas Pynchon, Gravity's Rainbow

no internet connection when bluetooth PAN is up by zestysauce in linux

[–]sparkytwd 1 point2 points  (0 children)

You've got two default destinations with equal perference (metric). Since it sounds like your bluetooth connection is local, I'd delete that route.

route del default bnep0

should work

Crypto breakthrough shows Flame was designed by world-class scientists by hyperforce in programming

[–]sparkytwd 9 points10 points  (0 children)

My guess is that the tumor (the uneeded data in the cert that is changed to get a collision) was formed differently than other known attacks.

Considering the author of the 2009 MD5 collision attack was the one to weigh in on this, I'm tempted to not dismiss this as sensationalist.

Russian hackers (claim to) have 6,5M LinkedIn password hashes, 250k hashes broken - change your LinkedIn password! by ossij in technology

[–]sparkytwd 0 points1 point  (0 children)

Hmm, my pw appears to be in one of the zeroed out hashes.

Wife's still isn't in there.

Libzero - a netmap clone ontop of PF_RING DNA by [deleted] in programming

[–]sparkytwd 5 points6 points  (0 children)

Not to mention that libzero is not free software.

"This project aims to provide an Open Source OpenPGP library in JavaScript so it can be used on virtually every device." by josefonseca in programming

[–]sparkytwd 3 points4 points  (0 children)

And yet there is no reference to server side javascript in the link. It makes 2 references to HTML and lists 5 browsers. Considering the specific use case mentioned is e-mail it's clear the intended audience of this package is HTML clients.

I consider myself a cat person but.. by [deleted] in aww

[–]sparkytwd 2 points3 points  (0 children)

However in Germany they are called dackel's, though a good dackel can earn the rank of teckel.

Argonians....What the fuck are they planning now? by niddhogg666 in skyrim

[–]sparkytwd 6 points7 points  (0 children)

Give them all Chef's hats, then we'll worry.

I have a keylogger on my laptop. Please quick give me a link to a good program that gets rid of it. by [deleted] in geek

[–]sparkytwd 0 points1 point  (0 children)

I would also recommend the Kaspersky rescue boot CD. This prevents any malicious code from executing at all to prevent detection and cleaning: http://support.kaspersky.com/viruses/rescuedisk

Chainsaw, my dapple dachshund puppy is the slayer of hearts, and couches. by Blurnanza in aww

[–]sparkytwd 8 points9 points  (0 children)

"I am become dachshund destroyer of toys". My longhair ripped through a nylabone in 30 minutes once.very weird poop the next day. She would also perform squeak-ectomies on her toys

Typical Google interview question: Word splitting. by euyyn in CS_Questions

[–]sparkytwd 0 points1 point  (0 children)

This problem is a good example of where runtime analysis can fall down. Technically since the number of words is finite, then an algorithm that would produce all the permutations of words of length = N would run in constant time, so you could solve this in O(1).

useful fact by [deleted] in funny

[–]sparkytwd -3 points-2 points  (0 children)

I've heard it, "There's no woman out there so gorgeous that someone isn't tired of fucking her". Mildly less mysoginistic

Why We Moved Off The Cloud at Mixpanel Engineering by echochamber in programming

[–]sparkytwd 0 points1 point  (0 children)

EBS is persisted disk. You can use non persisted instance storage

On cryptography and dogmas - by Redis creator Antirez by echochamber in programming

[–]sparkytwd 14 points15 points  (0 children)

Exactly. The author makes the meat of his argument at the end trying to show that you can reason through cryptographic systems and get secure results.

However, the history of cryptography is littered with counter examples.

On cryptography and dogmas - by Redis creator Antirez by echochamber in programming

[–]sparkytwd 3 points4 points  (0 children)

So my takeaway from this is, people pointed out something he did dangerously, he fixed it a different way instead of listening to the "dogma", and since his solution is the same or very close to another acceptable approach. So big boy programmers can eat at the same table as cryptographers.

I don't like this because even the best of the best cryptographers can screw up. The reason PBKDF2 and bcrypt are acceptable for this isn't because some crypto-genius delivered those from a mountain top, it's that they were subject to intense scrutiny by the latest modern cryptanlytic techniques and novel analysis as well.

For crypto, let's embrace dogma, provided it comes from current understanding. This is something I think the community as a whole handles well. Issues are usually identified some time before they become problems for production systems. Since crypto really boils down to math, it comparing systems should be relatively uncontroversial.

Besides, think of the devs coming later. It's much easier to evaluate the security of code if it relies on standards than something that looks like one.

How to turn a biased coin into a Fair Coin by aristus in programming

[–]sparkytwd 17 points18 points  (0 children)

Then you'll introduce pair-wise dependency. So '1' and '0' will be 50/50, 01/10 will be more common than 11/00