• Content Count

  • Joined

  • Last visited

About uberpenguin

  • Rank
    Full Member
  • Birthday 01/01/1970

Contact Methods

  • Website URL
  • ICQ

Profile Information

  • Location
    Schrödinger's box
  • Interests
    "There is a theory which states that if ever anybody discovers exactly what the Universe is for and why it is here, it will instantly disappear and be replaced by something even more bizarre and inexplicable. There is another theory which states that this has already happened."

Previous Fields

  • Operating System
    GNU/Linux, FreeBSD, Solaris, AIX, Plan-9, QNX Neutrino, OS/400, Windows Server 2k3, Windows 2k
  1. Yeah, I recently read that in some old sources. I've been meaning to add a footnote to the article to that effect. -uberpenguin
  2. Oh hey, it's me again, bumping this here thread. Well, with finals over I finally got around to finishing the article... Anybody want to take another look? -uberpenguin
  3. Both discrete and discreet are correct words, but with different meanings... Observe: discreet (adj) discrete (adj) Thanks for checking, though. -uberpenguin
  4. Oh come now, I'm not asking for help WRITING the article, just a few folks who can read and are mildly interested to give me some input/criticism. Surely such persons can be found herein? -uberpenguin
  5. What the hell tj? Somebody has a serious problem and you can't get over your own damn ego for five minutes and try to let go the various times that you've perceived me wronging you. The personal attack and stereotype on Southerners is a real winner for making your point, though... Bravissimo. Have you ever actually dealt with law enforcement agencies as regards to cyber crime? Try it sometime; local agencies are either understaffed or totally incompetent to deal with it. Higher agencies won't bother with your case unless things have already escallated to a very bad level. Wolfman doesn't actually HAVE any legal grounds for doing much at all except a harassment suit, and the police at any level aren't going to waste their time with something that frivolous when there are simple solutions that can STOP this before it gets worse. There are much MUCH worse cases of cyber stalking than this; you are only witnessing a very simple and easy to avoid case. This one can be stopped now by simple means, and I refuse to even attempt to step around YOUR enormous ego by recanting anything I've said. Wolfman needs to quickly, quietly, and cleanly cut all ties with the person causing his daughter trouble. End of story. Either clam up or be nice, it's your choice. I am by no means above posting links to the records of the two major times you've flipped out at me, and I seriously doubt you want people here reading that (I don't mind one bit, on the other hand). -uberpenguin
  6. Why hasn't anybody suggested the most obvious solution? Change your daughter's email address silently and without informing jerkwad. Leave the other account open so his emails don't bounce back and totally ignore anything he sends to it. I suggest changing the account password to one only you know, so you can make the judgement calls when it comes to anything that may need to be dealt with there (like, perhaps, legit friends of your daughter who didn't get the notification of a changed address, etc). It will take awhile for jerkface to realize what has happened, and by the time he does he won't really have any way of getting back into contact with your daughter (unless there is something you aren't telling us, like him having some other significant identifying information about her). It's inconvenient, true, but it's a small price to pay for the safety of your daughter and the removal of a source of obscenity. I'd forget about any plans of retaliation or even legal action. As you suggested, most police departments aren't anywhere near well enough equipped to track down someone like this, and unfortunately higher jurisdictions that have more power to subpoena the right people generally won't get involved until things are already far more serious than you want this to become. IANAL, but your only current legal grounds seem to be harassment, which could only turn into an ugly lawsuit that you'd probably be better off avoiding. The more serious charges that something like this COULD escallate into are too terrible to think about. The best treatment of this situation is to carefully pack up, as it were, and move out of that particular virtual ego. Also, I'd make a concerted effort into discovering how the guy got your daughter's email in the first place... Perhaps have a talk with her about the seriousness of being careful with her anonymity and/or monitor her internet activity more closely. This is, of course, totally up to you and your parenting style. You shouldn't interpret this as legal advice, just the concerned advice of someone who knows a thing or two about anonymity and tracking people over the internet. Disclaimer: What follows is totally my own opinion; treat it as such. Personally I don't think someone as young as your daughter has any business having a significant online presence. Beyond an email address and perhaps IM account for friends only, I feel a lot of involvement is unneccessary risk. Things like a personal website, chat rooms, even a seemingly harmless blog can divulge a LOT of details about a person to thousands of pairs of eyes that the author was never thinking about nor even aware of. Only a few details are needed to find a significant amount of information out about people on the internet (no, I'm not wearing my tin foil hat, but this has been a topic I've had interest in for a long time). I wouldn't ever presume to tell you how to raise your daughter, but I don't hesitate in strongly urging you to heavily monitor your daughter's activity online and limit what kind of information she posts. Unfortunately a ten year old usually lacks the judgement and sense of the scope of the Internet that more experienced persons may (or very well may not) posess. What seems like some totally harmless information to someone that age could very well be enough to track someone down to a certain date, time, and place. For example, I have released a fairly small number of personal details about myself over the years, and I have a pretty good handle on where these details are and exactly to what they can lead. Even withstanding that, more than one person in the past has ascertained my identity to a sufficient degree to physically locate me. Now, I'm much older than your daughter, have a much larger online presence, and in general am not terribly concerned if somebody pops by some of the places where I can be found just to say 'hi.' Granted, this may sound overbearing to some, and probably WILL sound overbearing to your daughter. However, the horror stories involving inexperienced children and the Internet abound, and in our day and age I personally prefer to err on the side of caution. Good luck in dealing with the problem, hope everything turns out for the best! -uberpenguin
  7. Okay, I added the image of the PDP-8/I's guts to the article... It works very nicely I think. I'd still like to add an image of a modern microprocessor mask or die, perhaps a good image of tube racks from an early electronic computer's arithmetic units (if such a thing can be verified), and some kind of datapath diagram for the functionality section. Intel has a really good picture of a Pentium 4 die here (I dunno if it's false colour or not)... It would be nice to use that one, though I'm unsure if Intel would allow it. I've also found a pretty decent picture of an IBM 603 tube-based multiplier of the variety that would later be used in full computers. I think this might be the best I can do in this regard, and I MAY be able to use this image on a stretch. There's also this good image, which is a US Army photograph (and therefore is public domain). The problem is that it's really hard to argue that ENIAC did in fact behave like a CPU (it certainly wasn't a Von Neumann machine), and I have suggested otherwise in the article. Furthermore I really have no idea what portion of ENIAC is being shown there (though in reality, ENIAC probably only really had execution elements and interconnects, since it didn't run stored programs). It's definitely a better image that is easier to use, but I don't know if it fits in the article... -uberpenguin
  8. Eh... Ahead makes Nero for Linux. I believe it's a free download if you already own a non-OEM copy of Nero.
  9. So I had a few extra moments to myself this weekend, and in an upswing in my love/hate relationship with Wikipedia decided to try to write another featured article. My last one was on Oakland Cemetery, so for a change of pace I decided to take upon myself the ambitious task of making the Central processing unit article not suck. This is what I had to work with. As you can see, the task of making that train wreck of an 'article' not suck is daunting indeed. After scrapping almost all the significant content of the article (and scoping out the rest for future scrappage), I've brought it to a much more respectable (but as of yet very incomplete and in need of both my own and third party revision and checking) level. The section I have yet to write (as of now) will outline (briefly) how CPUs have actually been implemented over the years, and talk (briefly) about some of the major design considerations of CPUs in more recent times (RISC vs CISC, SISD vs SIMD, power/heat dissipation, miniaturization, parallelism, deepening pipelines, clock signals, et al). Contrary to what you might be thinking, though, I'm not here to toot my horn but to ask for some assistance. I'm by no means a guru on this subject and am writing about some things that happened long before I was around. First, I'd appreciate input on the flow of the article. From the lay man's perspective (as the article is intended to address; being more or less general interest), is the text fairly understandable and clear? Do you learn anything at all from it? Is it too general? Is it not general enough? (keep in mind that the original article basically assumed that CPUs didn't exist in any form before ICs came around) My intent is to keep it high level enough to keep the interest of most readers, but not "dumbed down" or resorting to silly analogies as some terrible teaching texts are. I realize that the article doesn't yet address many of the important issues of modern CPU design, but I'm getting to that and will post again when that section is drafted up. Hopefully I can get this up to featured article quality within a week. Additionally, I'm looking for good images to go along with the article, and any input is appreciated there as well. The caveat here is that with recent changes in WP policy, I can't use any images that aren't public domain or haven't been released under a Free license. I want to use this image in the history section both because it's a really good photo, and because it's a really good example of a discrete transistor multiple PCB CPU (and memory controller, core memory, bus controller, and a few odds and ends). I just emailed the owner of the photo today asking for him to release it under a Free license so it can be used (we'll see what happens). Anything you feel would be appropriate for the article is good, though I don't really want a bunch of glamour shots of microprocessor dies (one very good one would be nice) nor do I want a bunch of public domain military photos of very old computers (unless they are applicable to the article... I might end up including ONE of these). A good datapath diagram would be nice; if nobody can find one I might just make one myself. For the more technically inclined. I realize that I have taken a generously broad definition of the term "CPU," and debated at some length about whether or not this was appropriate. I explain this a bit on the talk page, but in a nutshell I did this to be consistent with some of the other respectable Wikipedia articles on computing. One thing I'd specifically like to find out is when/where the term CPU came into common usage. In doing some searching through old PDP documents, I get the strong feeling that DEC used the term in the early 70s, but as of now I have no reasonable way of verifying this. Anyone who can provide some insight would be most helpful. Thanks for any assistance you can provide... Feel free to correct any issues you see directly on the page, as I haven't really even copyedited what I've written yet. -uberpenguin
  10. Very impressive; you've witnessed the XNU/Mach kernel dying... That's a pretty noteworthy accomplishment... Not epic, but noteworthy indeed. -uberpenguin
  11. Nah, it's just trace amounts of adrenaline being produced from a residual and suppressed version of the "fight or flight" mechanism. What your body is really telling you is "run." -uberpenguin
  12. Stop trying to be witty! We know you're incapable of it! -uberpenguin
  13. In honor of the occasion, I present the image of a man who is probably the most famous single furniture salesman in Atlanta. The man who turned his facial hair into a selling point (ASK FOR THE WOLFMAN!): -uberpenguin
  14. You might be thinking of a replay attack, which is when an attacker captures a useful packet that generates a response of known length (ARP is almost always what is used), and replays it over and over in order to generate a lot of encrypted traffic to analyze. The actual cryptanalysis, however, is done by the same means regardless of whether the attack is active or passive. That is, you can totally passively (non-detectably) crack WEP. -uberpenguin
  15. uberpenguin

    About U?

    Pass on my sincerest condolences. -uberpenguin