BINREV SPYD3R

Members
  • Content count

    2,915
  • Joined

  • Last visited

    Never
  • Days Won

    15

BINREV SPYD3R last won the day on June 7 2014

BINREV SPYD3R had the most liked content!

Community Reputation

-41 Troll

About BINREV SPYD3R

  • Rank
    I make newbies cry!

Profile Information

  • Gender
  • Country
  1. NEW 'Off The Wall' ONLINE Posted 22 May, 2019 1:18:14 UTC The new edition of Off The Wall from 21/05/2019 has been archived and is now available online. "Off The Wall" - 21/05/2019 Download the torrent here!!!! View the full article
  2. Background This is rather large topic, so I split it in two episodes. Next one should follow in two weeks if everything goes as planned. First part is about modeling research, while second part concentrates on how things change over time. There’s three types of research: engineering, natural sciences and social sciences. Research costs points that are produced by various buildings. Implementation There’s three database tables, which are defined below: CurrentResearch type Technology progress Int factionId FactionId AvailableResearch type Technology category TopResearchCategory factionId FactionId CompletedResearch type Technology level Int factionId FactionId date Int Data types Technology is enumeration of all possible technologies. Knowing these enable player to build specific buildings and space ships, enact various laws and so on. In the end this will be (hopefully) large list of technologies. data Technology = HighSensitivitySensors | SideChannelSensors | HighTensileMaterials | SatelliteTechnology | BawleyHulls | SchoonerHulls | CaravelHulls ... deriving (Show, Read, Eq, Enum, Bounded, Ord) All research belong to one of the top categories that are shown below: data TopResearchCategory = Eng | NatSci | SocSci deriving (Show, Read, Eq, Ord) ResearchCategory is more fine grained division of research. Each of the categories is further divided into sub-categories. Only EngineeringSubField is shown below, but other two are similarly divided. data ResearchCategory = Engineering EngineeringSubField | NaturalScience NaturalScienceSubField | SocialScience SocialScienceSubField deriving (Show, Read, Eq) data EngineeringSubField = Industry | Materials | Propulsion | FieldManipulation deriving (Show, Read, Eq) ResearchScore is measure of how big some research is. It has type parameter a that is used to further quantify what kind of ResearchScore we’re talking about. newtype ResearchScore a = ResearchScore { unResearchScore :: Int } deriving (Show, Read, Eq, Ord, Num) TotalResearchScore is record of three different types of researches. I’m not sure if I should keep it as a record of three fields or if I should change it so that only one of those values can be present at any given time. data TotalResearchScore a = TotalResearchScore { totalResearchScoreEngineering :: ResearchScore EngineeringCost , totalResearchScoreNatural :: ResearchScore NaturalScienceCost , totalResearchScoreSocial :: ResearchScore SocialScienceCost } deriving (Show, Read, Eq) Following singleton values are used with ResearchScore and TotalResearchScore to quantify what kind of value we’re talking about. data EngineeringCost = EngineeringCost deriving (Show, Read, Eq) data NaturalScienceCost = NaturalScienceCost deriving (Show, Read, Eq) data SocialScienceCost = SocialScienceCost deriving (Show, Read, Eq) data ResearchCost = ResearchCost deriving (Show, Read, Eq) data ResearchProduction = ResearchProduction deriving (Show, Read, Eq) data ResearchLeft = ResearchLeft deriving (Show, Read, Eq) Finally there’s Research, which is a record that uses many of the types introduced earlier. It describes what Technology is unlocked upon completion, what’s the cost is and if there are any technologies that have to have been researched before this research can start. The tier of research isn’t currently used for anything, but I have vague plans what to do about it in the future. data Research = Research { researchName :: Text , researchType :: Technology , researchCategory :: ResearchCategory , researchAntecedents :: [Technology] , researchCost :: TotalResearchScore ResearchCost , researchTier :: ResearchTier } deriving (Show, Read, Eq) Tech tree Putting all this together, we can define a list of Research. Since finding an entry from this list based on research type of it is such a common operation, we also define another data structure for this specific purpose. Map in other programming languages is often known as dictionary, associative array or hash map. It stores key-value - pairs. In our case Technology is used as key and Research as value. We define it based on the list previously defined: techMap :: Map.Map Technology Research techMap = Map.fromList $ (\x -> (researchType x, x)) <$> unTechTree techTree Next time we’ll look into how to actually use all these types and data that were defined. View the full article
  3. Based on https://libranet.de/display/0b6b25a8-125c-a71f-c7ae-f1a686792961. It’s pretty short, less than 4 minutes, but I think it’s important. Who defines whether you are successful, or whether your project is successful, and does it matter? View the full article
  4. Introduction This is the fourteenth episode of the “Learning Awk” series which is being produced by b-yeezi and myself. In this episode and the next I want to start looking at redirection within Awk programs. I had originally intended to cover the subject in one episode, but there is just too much. So, in the first episode I will be starting with output redirection and then in the next episode will spend some time looking at the getline command used for explicit input, often with redirection. Long notes I have provided detailed notes as usual for this episode, and these can be viewed here. Links GNU Awk User’s Guide Redirecting output of print and printf Special Files for Standard Preopened Data Streams Special File names in gawk Previous shows in this series on HPR: “Gnu Awk - Part 1” - episode 2114 “Gnu Awk - Part 2” - episode 2129 “Gnu Awk - Part 3” - episode 2143 “Gnu Awk - Part 4” - episode 2163 “Gnu Awk - Part 5” - episode 2184 “Gnu Awk - Part 6” - episode 2238 “Gnu Awk - Part 7” - episode 2330 “Gnu Awk - Part 8” - episode 2438 “Gnu Awk - Part 9” - episode 2476 “Gnu Awk - Part 10” - episode 2526 “Gnu Awk - Part 11” - episode 2554 “Gnu Awk - Part 12” - episode 2610 “Gnu Awk - Part 13” - episode 2804 Resources: ePub version of these notes Examples: awk14_fruit_data.txt, awk14_ex1.awk, awk14_ex2.awk, awk14_ex3.awk View the full article
  5. You can copy and paste on Linux the same way you do on any other OS: Ctrl+C to copy and Ctrl+V to paste (or use the Edit menu, or a right-click menu). However, Linux doesn't limit you to just that. The primary GUI environment of Linux (at the time of this recording) is X, and the Inter-Client Communication Conventions Manual defines three X Selection states: Primary, Secondary, and Clipboard. The Secondary is rarely (if ever?) used, so I don't cover it here. Primary The primary X Selection is anything literally selected at any given moment. If you highlight a word in Firefox with your mouse, for instance, then it becomes the Primary Selection, and it is owned by Firefox. If you press the Middle Mouse Button in any application, then that application asks the owner (Firefox, in this example) for the data contained in the Primary Selection. Firefox sends the data to that application so that it can paste it for you. A Primary selection remains the Primary Selection until it is overwritten by a new Primary Selection. In other words, text needn't be highlighted to be retained in the Primary Selection slot. Clipboard The Clipboard Selection is data that has explicitly been sent to the clipboard by a copy action. This is usually a right-click > Copy or a selection of Edit > Copy. When another application is told to paste from the clipboard, it pastes data from the Clipboard Selection. Both You can (and often do) have both a Primary Selection and a Clipboard selection. If you press Ctrl+V, you get the contents of the Clipboard Selection. If you press the middle mouse button, then you get the contents of the Primary Selection. xsel The xsel command allows you to retrieve the contents of an X Selection. $ xsel --primary dungeons $ xsel --clipboard dragons Clipboard managers Clipboard managers such as Klipper, CopyQ, Parcellite, and so on, provide a history for your clipboard. They track the latest 10 (or so) items you have copied or selected. They can be a little confusing, because they do tend to blur the line between the Primary Selection and the Clipboard Selection, but now that you know the technical difference, it shouldn't confuse you to see them both listed by a clipboard manager designed to conflate them. GPM GPM is a daemon allowing you to use your mouse without a GUI. Among its features, it permits you to select text in a text console (TTY) and then paste it with the middle mouse button. GNU Screen and Tmux Screen and tmux are "window managers for text consoles". I don't tend to use tmux as often as I should, having learnt GNU Screen long ago, so I'm not familiar with the process of copying and pasting with tmux. For Screen, you can copy text in this way: Press Ctrl+A to get out of insert mode. Press left-square_bracket to enter copy-mode Move your text to the position you want to start selecting and press Enter or Return Arrow to the position at which you want to end your selection and press Enter or Return again To paste your selection: Press Ctrl+A to get out of insert mode. Press right-square_bracket to paste View the full article
  6. I discuss the entire Spectre and Meltdown issues and where we might go post an Intel world. My objective is to encourage others to leave Speculative processing backed by management engine based chips. SCATTER HUMANS!!! WE MUST LEAVE!!!! View the full article
  7. This isn't a huge news story but we felt it was worthy of note. As part of our overall digitization project, our team of archivists have finished the thankless task of making all of the recorded talks from our first three conferences available on flash drives and downloadable MP4s for the very first time. Previously, they were only available as DVDs and on YouTube, with all of the baggage that service brings with it. Now you can have the highest quality, fully copyable files to do with as you please. No restrictions. (Please be aware that our video skills at the time were rudimentary at best so some of these videos might be best described as studies in how far we've come.) HOPE (1994) flash drives and downloadable MP4s Beyond HOPE (1997) flash drives and downloadable MP4s H2K (2000) flash drives and downloadable MP4s We hope to continue this project to cover the remaining three conferences. At present, nine out of our 12 conferences have been published in these formats. You can explore all of what's available here and on YouTube (with their restrictions and limitations). View the full article
  8. NEW 'Off The Wall' ONLINE Posted 15 May, 2019 0:55:54 UTC The new edition of Off The Wall from 14/05/2019 has been archived and is now available online. "Off The Wall" - 14/05/2019 Download the torrent here!!!! View the full article
  9. Knightwise wonders if we should let go of the linux desktop environments and focus on cross-platform applications instead. Please bring your torches and pitchforks. View the full article
  10. This is mostly verbatim from my Fediverse post https://libranet.de/display/0b6b25a8-165c-9c7f-b55d-c7a077813050, with a few minor edits. The anti-5G campaign has been cooking for many years now, and at the epicenter of it all are two men, Lennart Hardell and Rainer Nyberg. It’s a Swedish-Finnish phenomenon that is now really making the rounds and spreading internationally, as actual commercial deployment of 5G networks draws nearer. As a Swede, I apologize. These two do not represent the Swedish or Finnish cancer or radiation research community, and our media have given them far more space in the public discourse than their work merits. They are heavily quoted in networks of pseudoscience, including anti-vaccine sites, right-wing "alternative facts" sites and Strålskyddsstiftelsen ("Swedish Radiation Protection Foundation"), a private foundation created in 2012 with a deceptive name meant to invoke authority, which has had to be corrected on multiple occasions by the actual Swedish Radiation Safety Authority, Strålskyddsmyndigheten. Strålskyddsstiftelsen received the 2013 "Misleader of the Year" award from the main Swedish scientific skeptics' society, Vetenskap och Folkbildning ("Science and Public Education") for "[their fearmongering propaganda and biased reporting on the health effects of mobile telephony use and wireless networks]". https://www.vof.se/utmarkelser/tidigare-utmarkelser/aretas-forvillare-2013/ (in Swedish) These networks are part of a feedback loop where they get media attention, politicians pick up on their claims and use them to invoke the precautionary principle and get precautionary regulation in place, or judges rule based on the claims, which then gets quoted by these entities as evidence that they were right all along. They make it very hard to find factual information on whether millimeter-wavelength radiation actually has any different effect from the centimeter-wavelength radiation that we have been using for over two decades without any documented harmful effects, because wherever you look you just find these sites claiming that we have definitely had adverse health effects for the last two decades and the new frequency bands will definitely be far worse. When you dig deeper into the claims on these sites you find a handful of cherry-picked articles, leading back to the two men mentioned at the top, to studies with flawed methodology like self-reported surveys on mobile telephony use among cancer patients, or to the pseudoscience/media/politics/law feedback loop. And it’s all about centimeter waves, which simply have shown no conclusive sign of increasing brain cancers or any other adverse health effect related to the radiation. For every positive report made you can find one that reports brain cancer fell as we introduced mobile phones. There is a massive body of data, and if the signal were there, we would have seen it by now. I’m no cancer researcher, but neither is Rainer Nyberg, he’s a retired professor in pedagogy. He’s a concerned citizen. https://en.wikipedia.org/wiki/Lennart_Hardell is an actual oncologist and professor who has studied carcinogens, but his research results on the wireless/cancer connection have been dismissed as "non-informative", "post hoc", "barely statistically significant" and "flawed" by his peers. There is nothing there. We know that high-voltage 16.7 Hz fields increase the risk for leukemia in train drivers, but we don’t know why. I am open to the possibility that 20-50 GHz waves have different consequences from 2 GHz waves, but I’d have to hear it from a credible source. Straight up DNA mutation is out the window, and that’s one of the centerpoints of these campaigns. This is still frequencies below visual light, it’s not ionizing radiation. No plausible mechanism has been suggested, and there is no clear data on any adverse effects. We use millimeter waves for the full body scans in US airports. Surely the effects of those have been studied? The top search results go to truthaboutcancer and infowars and similar names I won’t even bother to click. I don’t want to read another article about how all cancer research after 1950 has been wrong, we should all just eat chalk to balance our acidity, and cancer is a fungus. Apart from the pseudoscience sites I found one paper on the first search results page, concluding that X-ray backscatter scanners have well-known risks, but radiation levels are far below safety standards, both for passengers and for security staff, and also below the background radiation exposure while flying, and millimeter-wave scanners, while an "alarmingly small amount of information about its potential health effects" is available, "The established health effects associated with non-ionizing radiation are limited to thermal effects" and "these scanners operate at outputs well below those required to produce tissue heating", that is, we currently don’t know of a way millimeter waves might be harmful: https://www.sciencedirect.com/science/article/pii/S1687850714000168 (https://doi.org/10.1016/j.jrras.2014.02.005) For a guide on how to spot pseudoscience and how to read scientific papers, see ahuka’s excellent hpr2695: Problems with Studies. https://en.wikipedia.org/wiki/Betteridge%27s_Law_of_Headlines View the full article
  11. A few years ago, when you wanted to install a package on your Linux system, you had to grab the source code, and the nightmare began. But nowadays, this is over. You have deb files, and snaps, and flatpacks, and many other package formats available. On this episode, I was joined by Alan Pope, from Canonical, to talk about one of them in particular : snaps. View the full article
  12. Background You're running a firewall on your work and home networks right, so of course you're running one on your Smart Phone. Given this device holds more information about you than you probably know yourself, it would be only prudent to make sure that you are protecting what gets in but also what gets out. I run AFWall+ which is available from the F-Droid app store. It runs fine on LineageOS. I then set it on the children's phone so that no application is allowed to use mobile data, and then only applications that need Internet get Internet Access. This works well as it's a normal use case for mobile applications to have intermittent access to the Internet. I see no reason why the Linux Kernel should need unfettered access to the Internet, so it's not allowed out. One issue you may come across is that even though you know that there is a Connection your phone doesn't, and so it will display the Wi-Fi Connected, no Internet message. I'm not sure how this check is done but abqnm suggests at in the StackExchange question How does Android determine if it has an Internet connection? that it may be related to Google Cloud Messaging. ... this means that the device is unable to receive a response from GCM (Google Cloud Messaging, the framework that handles push notifications). This traffic is sent through ports 5228, 5229, and 5230. If the AP is blocking or interfering with traffic on those ports, push notifications won't work ... I do indeed see blocked attempts by Google Play Services on my own phone, but not on the other phones that have no google services installed. The only entry I see in the logs is an ICMP attempt to "Comcast Cable Communications, Inc". If you know more please record a show for Hacker Public Radio about it. Giving Access Normally you will get a message saying that the Wi-Fi has no Internet access. If you tap the message a popup will allow you to stay connected and will let you remember the choice. In some cases the router helpfully resets the connection before you can reply to the message meaning it goes into a loop continually popping up the message but not reacting to it. In this case we can use Termux a Android Terminal emulator, to drop to a shell and fix the problem. I used su to get root access but you could also change to the user wifi. The file you need to edit is /data/misc/wifi/wpa_supplicant.conf. It's probably best to edit this file with the wifi off. network={ ssid="OpenWireless.Org" key_mgmt=NONE priority=15 id_str="{snip}" } Scroll down to the network that is giving you trouble and add disabled=1 network={ ssid="OpenWireless.Org" key_mgmt=NONE priority=15 disabled=1 id_str="{snip}" } I ended up copying the file to the sdcard, and editing it there. I then copied it back as su and used chown wifi:wifi /data/misc/wifi/wpa_supplicant.conf to fix the permissions. Once that's done you can reboot the phone and connect to the network without a problem. You should also consider putting up an Open Wireless access point yourself. View the full article
  13. NEW 'Off The Hook' ONLINE Posted 09 May, 2019 2:53:47 UTC The new edition of Off The Hook from 08/05/2019 has been archived and is now available online. "Off The Hook" - 08/05/2019 Download the torrent here!!!! View the full article
  14. The Blue Oak Model License 1.0.0 was just released this month. In this episode I read the license, explain where it sits in among other software licenses, and enumerate some of the problems it purports to solve. I’m no legal expert, so take all of this as sort of a rough introduction to the license. Overall, if you are looking at permissive (vs copyleft) licenses, I would strongly suggest you consider this license! It’s concise, robust, it was developed by credible people, and gives your users future-proof safety from a number of common legal traps. However: just note that it has a feature, some would say bug, that might be a big deciding factor in whether you feel comfortable with it (listen for details) Nevertheless, I believe this license, or at least its style of language, will soon become extremely common. Further links: The Blue Oak Model License 1.0.0 — the license itself. You may also wish to read the group’s statement about their methodology and how the license came to be. Deprecation Notice: MIT and BSD — the blog post I mention in the recording, by Blue Oak council member, developer and IP lawyer Kyle Mitchell. He explains some problems he sees with the MIT and BSD licenses and how the BOML addresses them. Discussion on Hacker News — This was a pretty good discussion. Kyle Mitchell also chimed in here to respond to some criticisms and tire-kicking of this license (you can recognize him by his handle kemitchell). Not mentioned in the recording: One thing that caused me a bit of confusion at first was the term “attribution”. Kyle and the Blue Oak folks use this term mainly to talk about license terms, not authorship or credit. So for them an attribution requirement is a requirement to include the license terms with any distributed copies, not a requirement to give authorship credit to people. If you want to use this license as a starting point for your own “bespoke” license, you can! As I mention in the recording, I created my own variant of the Blue Oak license for one of my own projects. My main change was a strong requirement for downstream users to give credit to upstream contributors—not just when redistributing source code, but in all published software, books and websites created with the software! The Local Yarn License 1.0.0 — This is the license as it currently sits in an experimental branch in my project’s Fossil repository Notes about my customizations — Another tech note from the Fossil repo. Of course, when you make your own changes, you had better think hard about them, and if possible, get the advice of an Actual Lawyer who can discuss your particular situation. View the full article
  15. As many of you are aware, it has become increasingly difficult to survive in the publishing world. Digitization of media is one challenge that magazines can either embrace or fight. The perception that people are reading less these days is also cause for concern. And the decline of bookstores due to large chains moving in and then shutting down is another ominous trend. It's that latter circumstance that has hurt us the most. (We're continuing to expand our digital options and we find that our readers are reading more than ever, so the first two aren't threats to us.) When people can't find us in the retail stores that remain, that's a big problem. Earlier this year, we started the process of adding 2600 to stores throughout the United Kingdom at the request of many of our readers. Previously, we were prominently displayed on shelves throughout the country. As referenced above, many chains that carried us (such as Borders and Virgin Megastore) are no longer around. Since then, the distributor environment has become significantly more hostile to publishers, requiring new fees for the privilege of being stocked, a majority of the sale price to go to the store and distributor, and exorbitant delivery charges to be borne by the publisher. Despite all of this, we felt we owed it to our many readers in the U.K. to at least try to survive in this marketplace. This Tuesday, we got our hands on a letter from a representative from Seymour Distribution Ltd. to our American distributor with reasons why we were being denied consideration. We reproduce it below. ----------------------------------------------------------------------------------------------------------------------- The rational for taking any import title is based on the following criteria: 1) What is the possible sales volume we can achieve based upon the business plan of the publisher. This includes above and below the line marketing plan, the UK cover price and the quality of the publication compared to others in the market place. 2) Is the subject matter likely to cause any negative publicity or consumer complaints. Is the magazine compliant with all aspects of UK Law. In the event of point 2 some retailers such as WH Smith High Street, our largest retailer of specialist goods have in the contract they can charge the publisher per complaint and fine the publisher up to £10,000 plus any cost they may incur on recalling the title such they decide this is necessary. In this circumstance, based upon the content being such that it may cause complaints we decline your offer of distribution. ----------------------------------------------------------------------------------------------------------------------- We see this as a very ominous development. Where once we were able to be displayed in stores, now we're barred due to concern over controversy. As the above letter shows, there is no concern over potential sales figures or reader interest. Those have not changed. What has changed is the diversity and level of speech that is now permitted in United Kingdom bookstores. This is not just about us. It affects anyone who dares to publish even slightly controversial material. We have no doubt this policy has already had a chilling effect on many publications and is in no small part leading to their reduction. After all, if people can't see the magazines, how do they know they even exist? We apologize to our readers in the U.K. for our failure to return to bookstores in your country. We ask that you spread this information widely so that people are aware of the restrictions affecting your freedom to read material of your choice. And, of course, you can always subscribe. They haven't (yet) figured out a way to stop that. For now, we are focusing on strengthening our U.S. distribution so that something similar doesn't happen here. The help and support of our readers will be invaluable in these efforts. View the full article