Jump to content
xisto Community

gaurdro

Members
  • Content Count

    42
  • Joined

  • Last visited

Everything posted by gaurdro

  1. They put errors in the CSS code to see if the browser would properly ignore the bad coding. it's sorta like when you are skimming a word seek puzzle. if you're using english correctly you'll ignore the almost words but if you're not you'll use invalid words. Each browsers interprets the page differently(non standardly), so it appears different. if you've done much web development or design you know that firefox and IE don't usually agree unless you add a bunch of code that one ignores and the other picks up on. a good example of this is css induced transparency. for IE you have to use a special extra function to make it work (the function is ignored by all the rest of the browsers) because IE doesn't bother using the normal transparency commands. the same is true for making rounded corners on images.
  2. The lag and general performance hit of using the file compression is because the processor has to decompress data before it can be used. Knowing M$ I'm sure they didn't put too much planning into what method was used to compress the files. Note that they didn't bother to put in any settings for compression. also from my experience WinXP forces a decompress/recompress cycle when copying from one compressed partition to another. this may simply be due to how the compression is carried out on the filesystem or may be poor planning on the developers. With any sort of compression there will always be a performance hit just because of the necesity of decompression before use. this is true with all compression regardless of how fast the algorithm is or how little the data is actually being compressed. as a fairly good example of this. even with the command line Winzip will take longer to "unzip" a storage only zip file than a copy and bulk rename of an equivalent files.
  3. I personally would go with the basis for the mac os. which is linux. while it has a history of being difficult to use and lack of support for windows and mac programs, it has become very user friendly. I use suse linux enterprise desktop 10 on both my desktop an imac and my gateway latptop. it works wonderfully and without any learning curve whatsoever. it can be setup easily to look and behave like windows or mac. the support for windows and mac progams are slow in coming but are getting much better and in a few years linux most likely will be able to emulate windows and macintosh perfectly as far as programs are concerned. The technical side of linux is easily taken care of in suse by very easy to use administration tools located easily on the program bar.
  4. i think global warming is a part of a cycle of heating and cooling on this planet. humans however have made things significantly worse so in turn when things snap to the cold things will probably be even worsejust a note. trees emitt methane, moreso than a cow. methane is the granddaddy of all greenhouse gases. another thing adding to the problem is the last ice age trapped tons of co2, methane and other greenhouse gases and as glaciers, etc. melt they are releasing more and more of the stuff that we don't want in our atmosphere
  5. I've not only heard of this type of virus a computer sciences major friend of mine wrote a proof of concept "computer killer" as a part of his thesis. there are a lot of things that a virus can do to mess with hardware.-processor modulations(stated above)-faked dropped bits in ram. this affects typically network cards and harddrives. normally a chip of ram drops a bit of data every quadrillion cycles or so. no big deal. this one fakes dropped bits every 100 cycles with a chip that during post checks good. this eventually leads to bad data being processed and junk instruction being sent to hardware. this can be rather devastating during shutdown because it'll give harddrive addresses that are severly out of range. -forcing open transistors. sending bad data through the various busses can damage the power supply by shorting between conections on the mother board. -there's a technique called "drive bashing" that on all drives with moving parts. it is a raw read/write that forces the internal parts to crash against the edges of the inside of the drive. a symptom of this occurs naturally in harddrives. if your harddrive is clicking, get it replaced because it's about to die (unless it's scsi).
  6. It is a simple matter of definition that a black hole cannot be a white dwarf. it is possible that a white dwarf may turn into a black hole but once light stops escaping it ceases to be a white dwarf and becomes a black hole. it is more probable that black holes don't go away because there is no net radiation from the hole. therefore all the matter(remember e=mc2) and energy is contained and in most cases added to. they do emit "Hawking Radiation" but this is even below the level of background noise in the universe so there is still a net influx of energy.
  7. here's my opinion on the matter. we should take their license away on the first dui. on the second remove(and resell) the car not back to person or the family. on the third a "no appeal" death sentence.this would stop the problem and would eventually weed out the genes that make some of us suceptible to alcohol addiction.
  8. the governement conveniently likes to forget that traffic fatalities increase drasticaly (i think 400%) when seat belts became standard issue in cars and the first round of "modern" safety legislation went through. this made cars have crumple zones to decrease forces exerted on the passangers.also if you have a family history of heart defects or have heart disease wearing a seatbelt in a potentially fatal accident will most likely kill you much more painfully than going through the windsheild.
  9. I'm not sure where you've based this from. but um black holes can be created from white dwarfs but they are not one in the same. white dwarfs still have a small enough gravitaitonal field that light esapes. black holes, however, don't let anything escape. and while black holes produce "Hawking radiation", they never die as a star would. by the way approximately 40 tons of matter collide with our sun every day so it would follow that things (especially iron which doesn't fuse any further) could hit and add to the mass of white dwarfs or any celestial being.
  10. I'm sorry to say this is false. while burning any carbon based fuel does emmit substances considered as pollutants. no carbon fuels, especially gasoline and other hydrocarbons, contain chlorine or flourine so there is no way that a gas burning car could emit this class(chlorofluorocarbon) of compound. the race of things doesn't actually benefit the environment. the ethanol fuels emit 10% less carbon emmissions but creating them produces 40% more emissions than petroleum. the "natural oil" burning diesel vehicles are still burning a huge amount of carbon but with more phosphorous, which creates phosphoric acid. this acid is worse than sulfic and sulfurous acids because they interfere with several hormones that plants use to regulate growth. a widespread phosphoric acid rain would give us trees that grow one foot up and attempt to grow a hundred feet of roots(which emit carbon dioxide and methane; two green house gases). even "clean" power sources aren't at all. hydrogen fuel only emits water(another greenhouse gas) but takes five times(in contained, usable energy) the amount of fuel in oil. we don't have a good system for separating water, which takes a huge amount of energy anyway. we instead get hydrogen from huge hydrocarbon chains that we can successfully partially burn leaving some hydrogen, some water, and a whole lot of carbon oxides. electric cars just pass the buck. we don't have very much of our power grid off the oil drip so when you fill up the battery your not really gaining an efficiency but producing the emissions at one local not just where you're driving. not to mention all the money, time and energy(mostly from oil) wasted on these fruitlessly dependent alternatives. what we need is a thrust to nuclear technology. fission isn't clean but fusion is and we are very close to getting it to work. it does sound like science fiction but trust me, as a physics major planning to conduct research into fusion technology, that it is possible and will make a truly clean fuel. taking only hydrogen(which can be produced with the clean energy) and producing only the inert gas helium. when we get really good at it we may be able to fuse all the way to iron. extracting 98% of the energy from hydrogen atoms. this includes the energy used running the machines to keep the reactors running and the energy used to split water. i think we will burn through all the oil, coal, natural gas, tar sand, oil shale, etc. before we have a working alternative completely seperated from fossil fuels. it's that we, the united states, use more electricity than china and more oil that china and russia combined. but we have only a quarter the population of china. hmm doesn't seem right does it.
  11. Here's my view on such things. the conciousness that you are is merely one of infinite that your physical body has been. when there is a choice between two(or more) outcomes i believe the unverse follows all of them concurrently. so in my estimation by the time your born you've died an infinite amount of times in every way imaginable already. as for what happens after all your conciousness' die, i believe that what you want/believe to happen will. if that means going to heaven, great, if you're to be reborn you will be etc.
  12. a security threat to be concerned with is the increasing prevalence of viruses containing advanced rootkits to hide their actions or data on the computer. even from the anti-stuff tools. a rootkit was originally a name for tools that hackers/crackers would use to maintain root on unix/linux machines. root is the uber user with all the permissions on a linux box. on windows these tools can be used to hide data on the harddrive and in the registry by manipulating the way the data is stored. THe windows api(the thing windows uses to communicate to the hardware) reads things in certain ways but the data/structures can be vastly different. an example of this is in the registry the data is stored as numbered strings while the api reads them as null terminated string. the data a rootkit would write is:/hkey_something_or_other/folder/"data that is seen\x0(the null character)data i want hidden"and windows will return:/hkey_something_or_other/folder/"data that is seen"the rootkit reads the raw data and bypasses the windows api so it can read the full data. these programs are everywhere already. windows even has one to deal with the special files on an ntfs filesystem and another to deal with windows update. i've heard that there are many tools to find these things but as of yet i haven't looked into any of them. Notice from truefusion: Moved to the Security Issues & Exploits forum.
  13. Blackholes are mostly theory because as we construct them now they violate a few of the "laws" of physics. one such being non-overlapping massive domains. which is just saying that two massive objects can't overlap in space. you can't be in the exact same location as someone else. gravity is a force generally thought of as being caused by a massive object. in the creation of a black hole, typically from a nuetron star or a white dwarf, which are already extremely massive and dense. the gravitational pull is so great that it begins to pull the outside in and the postulate of masses can't overlap is broken. the object becomes so dense that it creates an "event horizon". this is the proverbial point of no return. once ANYTHING crosses the event horizon it cannot return. the reason light can't escape is due to the fact that a superdense object tends to warp space. which makes light bend around it. in the case of a black hole the bending of space is such that the light always is placed on a collision course with the black hole itself. the word "laws" is in quotes because we don't know the true laws of the universe yet. we can only guess which would more likely place them under the scope of theorys but most people get really uncomfortable when one says "the theory of gravity states".
  14. I use a nice set of programs for free to keep my computer secure.antivirus: avg- you have to look for the free one but it is there.adware/spyware: ad-aware 6 and spybot s & d.firewall: agnitum basic
  15. It's user beware with online dating. In my opinion it shouldn't matter what disabilities she/he has. Yeah if you just want to get laid i could see being instantly repulsed but i would hope you aren't online trying to do that. I met my current girlfriend on an online dating site and later found out she was a deaf mute, which i had no clue of beforehand. she has the absolute best personality and a great set of green eyes and we're very happy together.
  16. I have a question and a correction. what is the efficiency of this converter? because with just polarizing light you can lose 50+% of the transmission from the sun right away. experiments with polarizing film is a great example of this. does this added lossy step actually not cancel the gain in efficiency of the solar cell? this is a really interesting subject. I'd like to here more about the physics of the matter. the correction is:Not all nuclear energy sources are a double edged sword. nuclear power is very safe but there are the potential problems with fission technology(radiation,meltdown etc.) the work i'm going to be doing is on fusion technology which has none of these potential hazards. if there is an error the production of hydrogen stops (lack of power to run the reaction) and the fusion core reaction also collapses due to lack of hydrogen input. even if the safety catches ALL fail there may be an explosion but no radiation hazard. fuel cells are limited by the reaction they use. it's quite slow. it also requires fossil fuels to make these work. ethanol is a non-option because to hold our current energy needs we would have to cover three earths completely with corn which isn't feasible.
  17. I'd like to point out that norse mythology is from northern europe and hinduism is from india(asia minor). These are two completely separate things. if you want info on hinduism please go here(hindunet.org)
  18. another idea is add a third tank. right now inks have a volatile (not combustible typically) solvent for the ink. this evaporates and leaves dry caked on ink that stops the flow. The ink would be put in some non-volatile solvent and have a drying agent in the third tank. this would be applied to the ink combining with the solvent and both would evaporate.
  19. Hotmail IS NOT secure in the slightest. a *relatively* close school district had their administrations hotmail accounts hacked repeatedly by a co-worker. BTW there are scripts online for all you little script kitties to play with that will allow access. I do not support any action of the sort nor the "frozen" account thing. Seriously it's not that hard to get into ANY hotmail account and you should move to a better service
  20. well the sun can't go boom. it's simply not massive enough. the smallest star to be theoretically possible to supernova is nearly ten times the start mass of the sun. The sun will eventually kill everything on this miserable little planet though. eventually when it runs out of hydrogen it will become a "red giant" star. it will expand to about the radius of earth's orbit, thereby eating the earth. but everything will be dead by then. as the sun gets older it get's hotter (global warming anyone) and we will eventually fall out of the band that will support life around the sun. our red neighbor, on the other hand will be just entering the band at this time so we may be able to jump there.
  21. It's that the server is moving some data from your acccount so the data in the cookie isn't valid. it's most likely that their moving your archived mail from a local server to their home server.
  22. It should be noted that there is a difference between two-way encryption(reversable) and one-way encryption (hashing). For most password checking and such where the original message is unimportant but you need a way to check that the person has the correct data. you could use such one-way hashing such as md5 which outputs a string of hex digits(I think 40 characters?). the original message cannot be reconstituted from the hash but everytime you has a certain string it will begit the same hash. you can therefore match the hashes to check a password but if someone is able to break into your database or storage depot they won't be able to get the code even with the hash firmly in hand. two-way encryption is best divided into two parts. single key encryption is used for such things as your windows password or basic encryption for file transfers. This isn't as secure as other forms because there is a single key that must be transferred from one place to another. typically the key is formed by taking one huge prime number and multiplying it by another huge prime number (aka: double prime encryption). this makes it very hard to guess the key because the number has only two factors and "normal" methods of cracking a code rely on factoring the key based on the output of the decryption attempt but with only two it's very difficult for the program to guess.the other form of two-way encryption is private/public key encryption. (this stuff is all around you). this has a publicly available key that enables anyone to encrypt data. but to unencrypt the data there is a separate key that is kept private and is often encrypted using the first method of two-way encryption. this makes the data an order of magnitude more secure because instead of guessing one key(which can be very very difficult) they have to guess one key then try and decrypt another something that is also encrypted to see if the key was done correctly. this adds another step which will bog down even the fastest machines because of the millions of iterations necisary to guess the first key. the private key can also be sent using another bit of data used when generating the public key that will force the generation of the correct private key. this is typically done using parallel programming. both the sender and the reciever have a program that generates private keys and using a token of data will generate the proper key to decrypt the data.A new form of encryption that is still in the development state is called "quantum encryption". before you turn off your eyes, it really does exist. it involves a hand shake of sorts (like how your computer negotiates a connection to a host). the sending computer sends bits of lets say electrons. the recieving computer chooses a filter and sees if the electron makes it or not. only the data of whether or not the electron made it are important to the home computer. after several iterations of this a key is generated on the sending computer and the data is then sent to the reciever by this method (after being encrypted). the data appears at the other end correctly. if someone trys to sniff the data it will be very evident because the data will appear garbled on the other end because the sniffing alters the qantum state of the electron(thing of it spinning counterclockwise or clockwise for different states.) and unless the intruder has guess the proper filter the data will also appear garbled to him/her. and this can be done on the fly indefinitely without any possible leaks.
  23. At my highschool teachers are evaulate 3 times a year for their first 5 years then once every three years after that. this is a safety thing for the school to prevent teachers from not teaching the students anything. To keep teachers the school system first needs to stop enforcing such idiotic ideals and averages.(yes i do mean the no child left behind act). at my highschool they had a teacher "leave because of family reasons", which was completely false. They actually forced him to resign because he refused to make his class fit the bell curve. His class was not easy by any means but the class average was a 98%. I know this was the reason both because i'm still in contact with the teacher and i've overheard enough when waiting in the principals office. Another things is to pay teachers what their worth. the first year teachers shouldn't be paid much because (especially if they haven't taught anywhere before) because of their inexperience. After the first year the pay should improve significantly with time. the teachers also need to have a good health plan and help with saving for their future retirement. You're in florida so i'd also add help with housing, and moving expenses to any teacher willing to stay(i don't know) 5 years?.
  24. gaurdro

    Suse Linux 10.1

    Suse is good but it isn't good and free anymore. THe opensuse project is not good at all. it only allows 'open source' packages to be included in distro. beyond that it's great for newbies to the linux world. everything is intuitive. I prefer slackware linux which is a little higher end. it has a wide range of features and better control for development and web tasks. such as autconfiguring the php package to work with apache which is very difficult to do in suse because it has a tendency to ovewrite the manually type configuration commands when the yast module containing the 'easy' configuration of the file.
  25. actually Homosexual relationships are quite prevalent in nature. The Canadian Malard for instnace has a homosexuality rate approaching 50%. A certain amount of any 'freely' reproducing species is homsexual. by freely i mean able to choose a mate not like bees. I believe that such things as 'love' are simply a prduct of the culture of a society and has nothing to do with nature. A physical attraction or cognitive preference for something is choice something everyone is free to do. who are we to decide what is right for someone else? That's like me saying Times New Roman is crappy and is against the order of things. Anyone caught using will be considered as a non-human. I have my preferences and others have theirs. It's good to respect others for who they are and respect their decisions even if they don't agree with your decisions
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.