I publish this as an assistance to those who, as tradition dictates, would like to share gifts with loved ones, a tradition in which I also partake. At the same time, I readily acknowledge God and my family for all of the material wealth and possessions which I own, which are plentiful. I am already extremely blessed in my loving family, my close friends, and, above all, my adorable husband. No material possession will make me happier than I already am being married to him. Still, I enjoy and adhere to Christmas tradition. Give it your best shot. Merry Christmas.[Read further…]
It wouldn’t be Christmastime without the annual Christmas Wish List. This year’s theme is a bit of 8-bit nostalgia. As always, this is done mostly for kicks and giggles. Below is an embedded PDF. To scroll through it, simply place your mouse somewhere over it and use your scroll wheel (or alternatively click and drag the scroll bar on the right side). Also, most of the list item descriptions are also links to a product page for that item, and they’re clickable. Go ahead. Try it.
In the course of writing a research paper on possible new methods to reduce and eradicate computer virus threats, I came across a bit of intriguing history whose available details did not satisfy my curiosity, and I needed to know more than what the internet had to offer. The event in question was the creation of Creeper, a piece of software created in 1971 by Bob Thomas that has since been commonly accepted as the world’s first computer virus. What Wikipedia and the rest of the internet will tell you is that Creeper was created to “infect” computers running the TENEX operating system on ARPAnet, the predecessor to the internet. It would cause the machine to print “I’M THE CREEPER. CATCH ME IF YOU CAN.” Then Ray Tomlinson created Reaper whose sole purpose was to seek out and remove Creeper from the machines it had “infected”– so all at once, the first virus (more accurately a worm, if that) and the first helpful worm were created. However, I’m beginning to think journalistic sensationalism has turned Creeper into something it’s not, especially by today’s standards– that is, malware. Regardless, this was all still interesting.
I wanted to know more, though. Why was Creeper created in the first place? Did it cause problems? Was it an annoyance? Should it really be considered the first virus? So I found contact information for Ray Tomlinson, asked him if I could ask a few questions about Creeper and Reaper, and he very kindly obliged. Below is an email Q&A session with Ray himself, and I think the details he reveals about this piece of history are very interesting and enlightening; they also cast it in an entirely different light. Also, Ray sent me a link before I asked him my questions that contained the best information I could thus far find online; this information helped me form some of these questions in a better way as it helped me realize that Creeper wasn’t a malevolent or even jovial practical joke as it is sometimes painted. The link he sent is available here.
I happened to lose the five-digit code for a SentrySafe (model KSW0510) that we had bought. Looking up the company’s website let me know that I could get the factory default combination from them again with a notarized form proving that I am who I say I am as well as $30. I knew of a couple of other things on which I could spend that $30, and I knew that the safe’s electronics were likely rather simple, so I opted to take the funner way out and use my programming and electronics prowess to crack the combination myself. This post outlines in good detail how I cracked the combination using a brute-force combination cracker I programmed in Python that interfaced with the safe using a Raspberry Pi. If you’re not very tech-savvy and just want to see the safe cracker in action, click here to skip ahead to the video of the finished product.
“Bigotry” is one of those 21st-century words that’s thrown around by the media and the popular kids like a football at a college campus on Thanksgiving. It doesn’t really mean what it originally meant. In fact, it doesn’t really mean anything anymore just like the rest of the words that have been neutered by the “progressives” with perpetually hurt feelings, but let’s explore what it’s supposed to mean and what it originated in meaning and compare and contrast (like we did in elementary school) the vast, ironic, and funny differences.
See part one explaining the problem here
Since the dawn of the modern office, the common man has increasingly had to deal with the stresses of too much information causing him what is known as information overload. According to a study performed at the beginning of the internet’s explosion, “information overload occurs when the amount of input to a system exceeds its processing capacity”. The processing capacity of mankind has been pushed to its limits in the years since that study, and now society is facing unprecedented problems with stress, unproductivity, laziness, and even unfaithfulness all due to the vast increase in the overload of data having to process through the average human brain.
Why do we fund our own enslavement to a life of mediocrity by purchasing the very tools, over and over again, that help us be mediocre?