echorequest.francesmorales.com
Echo Request: 1(000)0123-3456
http://echorequest.francesmorales.com/2007/10/10000123-3456.html
Something to write 127.0.0.1 about. Friday, October 26, 2007. If you’ve ever gotten a number like 1(000)0123-3456 showing up on your caller ID, you’ve probably scratched your head in confusion and wondered who the heck was calling you. Soon, transmitting this kind of misleading caller id information could be a crime. Truth in Caller ID Act of 2007. Are bills seeking to the Communications Act of 1934 to prohibit manipulation of caller identification information. Subscribe to: Post Comments (Atom).
b10w.wordpress.com
A Stick Figure Guide to AES Encryption | - ex[b10w]sive security -
https://b10w.wordpress.com/2009/09/24/a-stick-figure-guide-to-aes-encryption
8211; ex[b10w]sive security –. The thoughts and rants of an InfoSec nobody. A Stick Figure Guide to AES Encryption. 24/09/2009 – 11:58 am. I check Jeff Moser’s blog. From time to time – the guy is wicked smart and his posts are always very interesting and educational. This week’s post is no exception: A Stick Figure Guide to the Advanced Encryption Standard (AES). Laquo; MSF Unleashed: Mastering the Framework. Daily bits – 24.09.2009. Leave a Reply Cancel reply. Enter your comment here.
lin-ear-th-inking.blogspot.com
Lin.ear th.inking: Convenience trumps all
http://lin-ear-th-inking.blogspot.com/2012/12/convenience-trumps-all.html
Because the shortest distance between two thoughts is a straight line. Thursday, December 20, 2012. The always-readable Stephen O'Grady has an insightful post titled Do Not Underestimate the Power of Convenience. He proposes that an increasingly important factor driving the uptake of software is the developer's drive for convenience. Convenience" is an, er, convenient term for things like ease-of-use. And low barrier to entry. Which he discusses in detail in another post. As Larry Wall said. A common req...
lin-ear-th-inking.blogspot.com
Lin.ear th.inking: Polygon Triangulation via Ear-Clipping with Delaunay Refinement
http://lin-ear-th-inking.blogspot.com/2011/04/polygon-triangulation-via-ear-clipping.html
Because the shortest distance between two thoughts is a straight line. Friday, April 8, 2011. Polygon Triangulation via Ear-Clipping with Delaunay Refinement. On the JTS list Michael Bedward was inspired to create a polygon triangulation. Algorithm using the Ear-Clipping. Approach. Standard Ear-Clipping algorithms don't handle polygons with holes, but Michael made a nice extension to do this. (David Eberly has a good write-up on this subject here. And of course there's always Wikipedia. Its small enough ...
lin-ear-th-inking.blogspot.com
Lin.ear th.inking: The Great Geometry Clipping Contest
http://lin-ear-th-inking.blogspot.com/2012/11/the-great-geometry-clipping-contest.html
Because the shortest distance between two thoughts is a straight line. Tuesday, November 13, 2012. The Great Geometry Clipping Contest. Don Meltz initiated a fascinating flurry of performance evaluation with his post on Is QGIS a Viable Alternative to ArcGIS? And its followup ArcGIS vs QGIS Clipping Contest Rematch. Note: subsequently ESRI reported that they have improved their algorithm to provide much better results for this case - and presumably to enable it to actually complete! Of his optimized impl...
simonbarron.blogspot.com
An Open Road: OU - An Update
http://simonbarron.blogspot.com/2011/04/ou-update.html
My experience of studying for a BSc (Hons) with the Open University in the UK - and how I keep changing direction. Tuesday, April 26, 2011. OU - An Update. Well, no updates from me since January - but I'm not slacking - I'm just very busy! Anyway, I read through the marked transcript this morning and found that I made a couple of stupid mistakes (careless oversight - seems to be a habit of mine), a part of one question that I managed to miss out (not the first time thats happened either! Some of the most...
metaverseblog.wordpress.com
October | 2009 | We all live in the Metaverse
https://metaverseblog.wordpress.com/2009/10
We all live in the Metaverse. Privacy addon to public DHTs. Based on that, and defensive strategies which rely on the DHT replication strategy seems irrelevant, the figures associated are not as big as needed, even if we talk about 1 million Vuze nodes, regarding the consistent living time of a self-destruct message [currently 8 hours or more using a proxy, but I guess the. So for a while, I really thought those Unvanish guys were right, as they conclude in their paper :. And as a result, one answer is r...
metaverseblog.wordpress.com
Hello Metaverse ! | We all live in the Metaverse
https://metaverseblog.wordpress.com/2009/09/20/hello-world
We all live in the Metaverse. One question still struggles me… Should this blog be in french or not? Bah we’ll see :). The real question would probably be something else, like “What the hell, again a blog? 8221; Yes, and as most of the times, that’s a way for me to put my ideas, questions, projects, whatever on “paper” instead of forgetting them… And as I totally forgot how to use a pen, let’s use that black keyboard which lies in front of me a couple of hours a day. Au delà de notre univers. Jeff Moser&...
metaverseblog.wordpress.com
Resources | We all live in the Metaverse
https://metaverseblog.wordpress.com/resources
We all live in the Metaverse. Links and other stuff related to the posts. Vanish and related topics. Vanish : http:/ vanish.cs.washington.edu/. Unvanish : http:/ z.cs.utexas.edu/users/osa/unvanish/. Encrypted E-Mail Company Hushmail Spills to Feds : http:/ www.wired.com/threatlevel/2007/11/encrypted-e-mai/. Modern cryptography : http:/ www.queen.clara.net/pgp/art5.html. Benlog : security, privacy, transparency. Gnagnaki, Tobé's blog. Jeff Moser's adventures. The Hardware Side of Cryptography.
metaverseblog.wordpress.com
Quotes | We all live in the Metaverse
https://metaverseblog.wordpress.com/quotes
We all live in the Metaverse. Some quotes I particularly like about Security, Hacking,…. Steven Levy, Hackers: Heroes of the Computer Revolution, Preface. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual,. The Mentor, The Conscience of a Hacker. The Realm of Wonder.
SOCIAL ENGAGEMENT