Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Xorsion

Pages: [1]
1
General discussion / Re: I got caught scripting??
« on: February 21, 2016, 11:00:39 am »
If you're in the mood for some very troublesome, albeit very satisfactory chaos, you can literally tell her to fuck off the next time she pesters you about such a stupid thing.
Your English seems perfectly fine to me, it's rather obvious you don't need to waste two hours of your time every week for this shit.

Proxx's suggestion seems to be the way to go, though if they log regardless of timing (they likely do, since you said it was hidden) you're in tough luck: you'll have to apologize and promise not to do it again, which you'll most likely get away with. Otherwise, tell her to fuck off.

2
Ah, Leipzig. Majestic city. Really need to travel there, someday. I feel I'd give half my soul to stay indefinitely, as well.
Any cools on the hardware side? You must've had lots of fun.

3
  As an extension to Scient1st's post: Octave and SAGE are also frequently used, although one can claim they're not as advanced as their paid counterparts.
One could also argue that we're not strictly talking about programming languages, since all of these are essentially whole frameworks.
  Onto a more minimalistic scale: I *suppose* Python and Haskell can be useful to you, especially since you'd rather not bother with intricacies and gotchas and you just want to focus on the math at hand.
Assuming you are masochistic enough to want to bother with language intricacies, you could try coding some math functions in C/C++. I've also been told that ASM can be a very interesting game, though I personally strongly doubt the actual deployability and usefulness of math code written in ASM. Yet again, in any case, it's definitely a challenge, I guess.
  As personal advice on your question: As much as dull this may sound... pen and paper.

4
General discussion / Re: "Speed-reading"
« on: October 17, 2015, 11:18:12 am »
I'll agree with x40a0e here. Reading through something and 'studying' (as in reading through something while trying to understand as much as possible - which is often very different than the socially defined school-like studying) are two entirely different things. Speed reading through difficult-to-comprehend text will only get you as far as understanding some of the main points (likely not even all of them, since some might depend on the context). Of course, all this also depends on how easily you can make connections on the subject at hand.

If you absolutely want/need to speed read, you should do it in case you need to *recall* information. It'll work fine because, having studied the material, you'll then be able to make the necessary connections by speed reading alone.

Personally, if saving time feels important to you, I'd suggest simply neglecting (often loudly, if need be) to go through material you don't care about. However, this might get you in trouble in settings where conformism is required, such as school and stuff.

5
Found it on the Webs / Weird Decimal Sequences
« on: October 04, 2015, 01:19:00 pm »

6
Found it on the Webs / Re: A geometric proof that e is irrational
« on: October 01, 2015, 04:56:20 pm »
This is nice. For some reason it reminds me of the Dedekind Cuts which found the real numbers. Look it up if you haven't already and feel interested enough.

7
@th3g00n: None that I know of, though I'm really not particularly knowledgeable in the field yet. In any case, Quantum Mechanics and their theoretical applications do show significant potential for future problem solving. Perhaps you should ask some other physicist in here.
Also, if you're sexually into dead||alive cats, like Darkvision seems to be, pr0n.

8
Found it on the Webs / (Quantum Information Transfer) New Distance Record
« on: September 23, 2015, 12:59:59 pm »
http://phys.org/news/2015-09-physicists-distance-quantum-teleportation.html

And here am I sitting, still not having studied my quantum mechanics courses. Ah well. Funtimes.

9
General discussion / Re: JJHYOUXI
« on: July 29, 2015, 05:07:36 pm »
And you decided to share this with us because?... Throwing punches at a bag would benefit you more.
Honestly, just drop the ego and let the good hack times roll, if you consider yourself to be above their level.

10
I've been exploring chiptunes, lately. Here is 12 hours of chiptunes of varied quality (but that's subjective; just skip the ones you dislike, I guess) -->
https://www.youtube.com/watch?v=GH7eUlri4yM
https://www.youtube.com/watch?v=FlNiEFEVta4
https://www.youtube.com/watch?v=4nJKyfVK11A

Out of these, two artists I can currently remember that really stood out were Jeroen Tel and Xerxes.
I haven't listened to JT's tracks yet, and I'm on my way with Xerxes so far: http://xerxes-music.com/
Too lazy to cp track links, but here are some titles:

(All made by Xerxes)
My favourite kind of Silence -- Music for Chips -- Corque Screw -- Simple Math -- Fall -- Off the Blocks -- Moonrider -- Into the Nothing -- Bent out of Shape -- X-Flies -- Panic -- The Inlands

In short: Screw everything else and explore Xerxes.

11
General discussion / Re: Something similar to a study group, but not quite.
« on: February 20, 2015, 04:51:49 am »
Firstly, you can achieve this (obviously) via the internet. The lack of physical limitations plus the semi-targeted nature (compared to physically going around the street asking people, in a sort of way) makes it a fertile ground for seeking and finding likeminded individuals. Do -not- overthink about making 'your own' community of this kind; You can learn a lot of stuff in communities like this one, and what matters in the end, is that progress be made and knowledge acquired. If, for whatever reason, you'd like to organize, administrate or otherwise 'lead' such a community, do it as a side project of sorts (I suspect it'll be a good opportunity to learn more things).
Anyway, the above is of null importance anyway; I doubt it is what you asked.

Secondly, if you seek -physical contact- with likeminded people, I also suggest to refrain from making your own community (for lack of a better term?), because;
1. The physical limitations (e.g. there might be not enough people interested in your area (yes, it is NY which is huge, but you'll still have to pick *A* place *SOMEWHERE* and you can't bet everyone who is interested will bother getting (long distance) to wherever you picked) are detrimental to such a thing.
2. You will very likely need to financially support it (not necessarily on your own, but it's still a burden for a possible student) and once you start it it'd be a pity to discontinue its activity due to financial problems.
3. Not everyone interested might be willing to be openly (and most importantly, physically) associated with 'such' a community (referring to how you said hackerspaces are essentially makerspaces which are -not- what -exactly- you've been looking for) - which is particularly likely, since you want to deal with hackers, and some of them tend to value their privacy and anonymity highly (statistically, there are -bound- to exist such people in your possible 'audience').
4. You can achieve this by means already existing;
    a.   You can join a hackerspace and actively seek out individuals interested in whatever -exactly- it is you are in -- just be careful not to come off as a moron, I guess.
    b.   You can attempt to educate your friends and argue (constructively) about why 'hacking' should be actively pursued (If you have -not- set this straight in your mind yet, I suggest to not do anything rush (e.g. 'leading' such a community) before you actually do and are serious about it) and pass on technical (and other) knowledge you may possess; in such a way you fulfill your dream (albeit in maybe a slightly smaller scale) -and- most importantly, contribute (even the tiniest bit helps) into making humanity a 'better' species.

In short: If your desire to 'lead' your *own* community is set in stone, you will have better 'luck' doing so in the confines of the internet, instead of on physical ground.

Also, good to see someone who seems serious about this; have fun, and don't harm innocent people in your attempt to hack.

12
This is a rather interesting discussion, and although I lack the technical competence to argue any points made here, I thought I'd simply speak my mind.

First of all, I'd like to emphasize on Lucid's point: Radical changes require a "flood" of -coordinated- movements. Pretty much like a voltage spike, if you will. Act too far apart on the time axon, and you're fucked, you've given them time to fix any damage and prepare. However, such a radical change could be classified as an "active defense" in my opinion. And it is also something that requires physical action, aside from hacking automated infrastructure routines. In other words: It is severely dangerous. Besides, I think Proxx's point was the creation of a "passive defense" system (in this case, one that requires no physical action and as such lessens the potential of being harmed) - Even though something like that can NOT offer -radical- changes in any society, it is a good start, and the hacking underground should be the creator of such a system (If not you, hackers, then who?).
In other words, I think we shouldn't linger too much on the thought of -radical- changes, at least not for the time being.

Secondly, regarding the points made by proxx, vezzy and Darkvision:
1. I won't go into technical talk, as I lack knowledge in this area and rather not talk bullshit.
2. The idea of crafting such a system is surely something decent. The point should be straining NSA's manpower AND computational power to the limit. Creating a system that's very difficult to crack is one thing and creating a system that slows down any and all human-handled investigations is another thing. Both are decently powerful, but alone, useless. Unless the two are combined, it's already a lost battle (Check Lucid's point above).
I think that the effort of creating something like that should, oddly, NOT be opensource (sidebranches of it, not openly related to it, could be opensource, as Darkvision suggested) -  That is, until it is actually made. This is essentially a system that would screw with the government.
Unless you're out of your mind, you don't openly fuck with the government.
3. <Linked with #2> : If you do decide to start this as an Evilzone project, it would be a good idea to simply start... Disappearing. The more traces you leave behind, the more likely it is you'll fail. A good idea, in my opinion, would be to gather info on who's interested, leave them some time to think it over, set up a date to meet on IRC or wherever, formulate a longterm plan, and then disappear from the face of the Internet. After some pre-defined time, you all meet again and discuss what progress has been made. This process will most likely be repeatable, but the further apart the meetings are, the better. Also, I'd like to stress: If you're an American, do not even consider taking part in this. Or well, if you do, I think my idea would be a must, unless you want to become a sitting duck.
4. I've also been thinking on something for some time now, and feel it fits such a project, so I'll drop the idea here. I do not know if it is theoretically possible, or even if it has been done before and is now considered insecure, so bear with me. Anyway, the idea is to create a piece of code that would be able to alter itself (as in, through a most likely very complex procedure, self-alter its own code into a non-gibberish text, and still remain functional) - After that, I thought: Yeah okay let's assume that does happen, so what? It can still be easily cracked by analyzing the code without ever running the executable part. - And then it hit me.
Would it be possible for such a code to also have a secondary defense mechanism? I've been thinking to implement a system that erases and totally shreds the program immediately upon "breach". I mean, if I were a cryptanalyst and whatnot and someone handed me a piece of code and said "crack it", the best way for the code to protect its content would be through self-destruction. Such a defense system should activate as soon as anyone would try to analyze it (examples include inspecting it, attempting to transfer the code in a secondary program and whatnot in order to safely analyze it etc etc). No idea if it is possible, just saying.

Anyway, no more ideas at the moment, and apologies if the text has been tiresome.

Pages: [1]