uberpenguin

Members
  • Content Count

    51
  • Joined

  • Last visited

Everything posted by uberpenguin

  1. Yeah, I recently read that in some old sources. I've been meaning to add a footnote to the article to that effect. -uberpenguin
  2. Oh hey, it's me again, bumping this here thread. Well, with finals over I finally got around to finishing the article... Anybody want to take another look? -uberpenguin
  3. Both discrete and discreet are correct words, but with different meanings... Observe: discreet (adj) discrete (adj) Thanks for checking, though. -uberpenguin
  4. Oh come now, I'm not asking for help WRITING the article, just a few folks who can read and are mildly interested to give me some input/criticism. Surely such persons can be found herein? -uberpenguin
  5. What the hell tj? Somebody has a serious problem and you can't get over your own damn ego for five minutes and try to let go the various times that you've perceived me wronging you. The personal attack and stereotype on Southerners is a real winner for making your point, though... Bravissimo. Have you ever actually dealt with law enforcement agencies as regards to cyber crime? Try it sometime; local agencies are either understaffed or totally incompetent to deal with it. Higher agencies won't bother with your case unless things have already escallated to a very bad level. Wolfman doesn't
  6. Why hasn't anybody suggested the most obvious solution? Change your daughter's email address silently and without informing jerkwad. Leave the other account open so his emails don't bounce back and totally ignore anything he sends to it. I suggest changing the account password to one only you know, so you can make the judgement calls when it comes to anything that may need to be dealt with there (like, perhaps, legit friends of your daughter who didn't get the notification of a changed address, etc). It will take awhile for jerkface to realize what has happened, and by the time he does he
  7. Okay, I added the image of the PDP-8/I's guts to the article... It works very nicely I think. I'd still like to add an image of a modern microprocessor mask or die, perhaps a good image of tube racks from an early electronic computer's arithmetic units (if such a thing can be verified), and some kind of datapath diagram for the functionality section. Intel has a really good picture of a Pentium 4 die here (I dunno if it's false colour or not)... It would be nice to use that one, though I'm unsure if Intel would allow it. I've also found a pretty decent picture of an IBM 603 tube-based multip
  8. Eh... Ahead makes Nero for Linux. I believe it's a free download if you already own a non-OEM copy of Nero.
  9. So I had a few extra moments to myself this weekend, and in an upswing in my love/hate relationship with Wikipedia decided to try to write another featured article. My last one was on Oakland Cemetery, so for a change of pace I decided to take upon myself the ambitious task of making the Central processing unit article not suck. This is what I had to work with. As you can see, the task of making that train wreck of an 'article' not suck is daunting indeed. After scrapping almost all the significant content of the article (and scoping out the rest for future scrappage), I've brought it to a
  10. Very impressive; you've witnessed the XNU/Mach kernel dying... That's a pretty noteworthy accomplishment... Not epic, but noteworthy indeed. -uberpenguin
  11. Nah, it's just trace amounts of adrenaline being produced from a residual and suppressed version of the "fight or flight" mechanism. What your body is really telling you is "run." -uberpenguin
  12. Stop trying to be witty! We know you're incapable of it! -uberpenguin
  13. In honor of the occasion, I present the image of a man who is probably the most famous single furniture salesman in Atlanta. The man who turned his facial hair into a selling point (ASK FOR THE WOLFMAN!): -uberpenguin
  14. You might be thinking of a replay attack, which is when an attacker captures a useful packet that generates a response of known length (ARP is almost always what is used), and replays it over and over in order to generate a lot of encrypted traffic to analyze. The actual cryptanalysis, however, is done by the same means regardless of whether the attack is active or passive. That is, you can totally passively (non-detectably) crack WEP. -uberpenguin
  15. uberpenguin

    About U?

    Pass on my sincerest condolences. -uberpenguin
  16. Ahh... Well, same response... DDR implies SDRAM. -uberpenguin
  17. DDR-SDRAM is a type of SDRAM. However, if you are meaning PC-33/66/100/133 standard SDRAM, then no, you cannot use it with that board. Can't use it. -uberpenguin
  18. uberpenguin

    About U?

    I'm 42 (base unspecified... not 10), a EE major at GaTech (year unspecified and indeterminant) with an affinity for signal processing and digital microelectronics, and an on-again-off-again programmer (Z80/M68k/6502/IA-16 assembler, C, C++, RPG II, COBOL, Java, PERL, PHP, Python, *SQL, Scheme, Common Lisp, oCaml, Haskell, Verilog, VHDL, MATLAB, you name it, I've probably messed with it and eventually become fed up with it). TA extraordinaire (field unspecified), "OS enthusiast" (whatever that means), maintainer of a medium sized website (~6k users currently; URL unspecified), veteran in custom
  19. But it makes for some fun acoustic analysis. Remember, folks, "positive" and "negative" are pretty much arbitrary as long as you're consistant (most circuits are analyzed in terms of a POSITIVE charge current just because of tradition). On a non-quantum level, electrical potential is only useful when talking about differences, so one point in space is said to have some voltage (positive or negative) WITH RESPECT to another point (perhaps ground, which is assumed to have zero voltage). Of course you probably didn't want to hear that little tangent, so the point of the matter is, it doesn't re
  20. Ubuntu is cool and friendly for beginners. The only word of advice I can give is this. Don't expect Linux to be Windows. Don't even try. You will only inevitably become annoyed when you finally realize that Linux is not, in fact, Windows. -uberpenguin
  21. Desolder them from the motherboard? -uberpenguin
  22. I won't even try to generalize Windows users... It's easier to generalize entire medium-sized COUNTRIES than it is Windows users. Not true... All Linux users are high school kids trying their hardest to be leet haxxors, but who have yet to discover an actual sane modern *nix. All Unix (proper) users are obese, slightly musty smelling, bearded angry ex-Bell hackers who refuse to use any computer but their beloved PDP-8. I just tell it like it is.... -uberpenguin
  23. Uh uh... Sorry, but BF is my `frightens the little children' programming language of choice. "Kicking and screaming" is all I have to say... (I bet the poor OP isn't feeling too secure about all this right now). -uberpenguin
  24. I don't use the term lightly, and the generalization usually holds true... Guess I'll take your word that I'm wrong this time. My general rule of thumb is "if you have ever seen an operational DEC PDP or written software in RPG II..." Well, I digress... Still pissed Apple off something awful, though. The point stands that changing to IA-32 by no means implies that Apple necessarily looses control of their target platform. -uberpenguin