• Content count

  • Joined

  • Last visited

Community Reputation

35 Neutral

About n3xg3n

  • Rank
    "I Hack, therefore, I am"
  • Birthday 04/23/1991

Profile Information

  • Gender
  • Country
    United States
  • Location

Contact Methods

  • Website URL
  • ICQ
  1. Ratpoison. Floating window managers are essentially dead to me at this point, tiling is far more efficient for my usage. I chose ratpoison because I prefer the hands on approach to tiling (as ratpoison lets you tile for yourself rather than having predefined tiling layouts) and because I already was using screen (which ratpoison is modeled after) for my terminal sessions. RPWS makes ratpoison even more efficient.
  2. Basically we are getting to an impasse when it comes to processing power. We are still able to make processors smaller, but the speed improvement rate is tailing off and we are leveling off. To that end, the only way we can get a huge amount of processing power is to get more processing cores, not to make them faster. Dual core CPUs are already standard for low end computers with quad core (and hyperthreaded) cpus being the standard at the midrange. High end computers already have between 6 and 8 processing cores available for computation, and supercomputers have thousands of CPUs. We've stopped (or slowed down considerably) making CPUs faster, but we are adding ever more processing cores to them. To fully utilize the multicore CPUs which are fast becoming the norm, a task has to be able to break up its computation into parallel work units. I predict that in the near future, we are going to see a huge amount of industrial pressure put on developing multicore ready applications and algorithms which take advantage of parallelism. Vector processing is basically being able to perform calculations on multiple values at once. If we are looking into parallelism, this is a good thing. Parallel programming has already effected programming in a big way, but currently the place where you are most likely to run into it is in a research institution. Scientific computing is really big into parallelism currently because the simulations and calculations that are being performed are simply to complex and long running to perform on even the fastest cores available today. That is why you occasionally hear about researchers being awarded upwards 65million hours of computer time on a supercomputer. If that was run against one core it would last thousands of years, but when you spread that across many thousands of processing units, it is a much more feasible amount of time.
  3. Ehh, I use all three. I use my el-cheapo second hand MacBook for day to day activities (web browsing, Skype, IM, etc.). I use my Linux laptop for any serious work (programming, homework, IRC, etc.) I use my Windows tablet for... watching movies and Windows Journal. I try to keep my skills up to date with all three because you never know when you might have to apply those skills.
  4. If you make a mistake typing a command you can change something specific and then re-execute using the following bash trick: [n3xg3n@enigma ~]$ wgt http://www.whatismyip.org bash: wgt: command not found [n3xg3n@enigma ~]$ ^wgt^wget wget http://www.whatismyip.org --2010-11-21 20:35:48-- http://www.whatismyip.org/ Resolving www.whatismyip.org... basically, ^old^new will replace 'old' with 'new' in the previous command and re-execute.
  5. systems_glitch: If you don't mind my asking, what did you switch into?
  6. InsaneAutomata: What are you talking about? Just because the figure appears in the HTML does not mean that it is hard coded. If you visit the site again, you'll notice that the counter has incremented. The counter is being put into the page dynamically, server-side. Dynamic, hence the 'D' in DHTML. For instance, the following code will keep track of the count server-side: <?php $file = 'count.txt'; $count = file_get_contents($file); $count = $count + 1; echo $count; file_put_contents($file, $count); ?>
  7. Why do universities block and filter access to the internet? My university's policy is don't transfer more than 4.2GB/day to a single IP and don't do illegal stuff, also we reserve the right to kick you off the unix servers if they are needed for something academically related. (Also the standard, "don't be a dick, this is our network" clause) Isn't the concept of blocking access to anything sort of antithetical to the concept of unbridled learning. What sort of university controls what the students are allowed to see/do online? As for VPNs, yes they are nice (especially because I need to VPN into my universities network now that I live off campus... sigh, no more 100Mbps synchronous connection to the dorm), but it is considerably easier for most people to set up a SSH tunnel, so you might want to look into that as an option. In either case, there is going to be some encryption overhead and an additional route that the data has to take to reach you, which means that the connection won't be quite as nice as a direct connection. Maybe you should try to get into the IT department there or talk to your SGA with the intent to try to change policy (As a member of my school's SGA I can tell you that if there was a policy of blocking the internet I wouldn't rest until we had pushed through a resolution calling on the school to open up the net. Your SGA is there to serve you, use them.). (Sorry if this is sort of incoherent, I just got out of a midterm and my mind is in random thought connection mode.)
  8. Oh ok....I just don't know anything about these things and that is what it is telling me to do. So how do I get the password from it? Try every possible combination until you get one that works… Suppose you have a function f(x) and an inverse function f`(x), such that f`(f(n)) = n. MD5 is a one way hashing algorithm which means that it is believed that for f(x) being the MD5 function there exists no function f`(x) which reverses it and is also computationally easy. It is possible to find the password by searching for a collision. That is, to try every possible (or a plausible subset of possible) input combinations and comparing them to the output. This can be done by cycling through all the possible letters/digits/symbols, using a wordlist, or being slightly more mathematically savvy about it and using a rainbow table (this pregenerates certain hash tables, then uses some really cool algorithms to search where in that keyspace the actual key is). Either way there is no avoiding the fact that there is no 'computationally easy' method of reversing an MD5 hash that is currently known. (There are known vulnerabilities in MD5, but no magic bullet. If you find one, there are definitely academic awards to be awarded and papers to be written)
  9. My Matches: 100% - Gentoo 100% - Arch 100% - Slackware Which is pretty accurate because I'm an Arch guy myself.
  10. Vimperator makes firefox worth it for me. I know that there are some clones for Chrome, but I just haven't gotten around to trying them. I use Chrome on Windows, Firefox on Linux, and (when I get one) Safari on Mac.
  11. The two most important: man and apropos. man followed by a command name will give you a detailed explanation of what the command does and how to use it. apropos followed by a keyword will give you all commands related to that keyword (and a brief explanation of what it does). Knowing these two commands will allow you to find the information you need even if you don't know exactly what it is you need to know. Beyond that, ls - list files cd - change directory mv - move file (rename) cp - copy file mkdir - make directory rm - remove file (-r for directory [recursive delete]) cat - echo the contents of a file to the screen (it does more than that, but for beginners...) grep - filter text results (I urge you to read the manpage for this one. execute 'man grep' for that) As for tab completion, it is very useful. You can start typing a command and then tab complete it (or have it give you a narrowed down list of options).
  12. Sigh, this makes me cry a little inside. I haven't visited my grandparents in over three years without "being put to work" for at minimum an hour each time. It's so bad I just prefer not to visit sometimes, as I thought I was visiting them not being a tech support house call service (or phone supporting software I have never used, thats fun too).
  13. (Note to mods, by the nature of this post, some docs are going to get dropped, feel free to delete this if you deem it necessary.) Yes it is possible. If you look at the filename of the picture, the third set of numbers is the person who uploaded the picture's user id. In this case, 35426_802059759332_68111578_43275108_3681124_n.jpg, 68111578. You can go to the person's facebook profile by going to http://www.facebook.com/profile.php?id=UIDNUMBER Also, the fourth set of numbers is the picture id, which if the picture isn't private, will allow you to to go to that picture's page. In this case, 35426_802059759332_68111578_43275108_3681124_n.jpg, 43275108. (Won't work in this case though...) Picture URLs are of the format http://www.facebook.com/photo.php?pid=PICTUREID&id=UIDNUMBER Use this information for good, happy stalking, and as always neither the DDP, BinRev, nor I am responsible for what creepy hi-jinx you get up to with this.
  14. You're trying to access the $_POST array before it is set (because nothing has been POSTed yet, you want to do a form, then post that form to itself and then access the $_POST data) do something like if isset($_POST['email']) { // do stuff with the post data here. // you might want to check isset($_POST['xxx']) && !empty($_POST['xxx']) for each variable just to make sure. } In PHP there tends to be a billion ways to do everything. See the manual: isset array_key_exists empty Also you don't need to post a screenshot of code, just use [code][/code] tags (or [php][/php])
  15. It appears that the CSS is not getting applied correctly. Is there any way we could get the links, without that all I can say is to check that the .css files are in place, linked properly from the html files, and getting served correctly.