Fire! Fire! Fire!
Read more...
Read more...
A couple of years back the Transportation Security Agency started deploying full body scanners at some airports around the country which use millimeter wave radar to scan travelers and show them as if they were nude (note: actual image, NSFW) to ensure that they weren't concealing anything under their clothes. Nevermind the fact that they utterly failed in the practicals, but never let it be said that a little thing like "it doesn't do what we want it to" stops a government project. Needless to say this has many people upset and has even resulted in no small amount of …
Read more...
At long last, Starcraft II.
The front cover folds out to reveal more about the story.
DVD-ROM in its sleeve and what passes for the manual.
Bonus: a notepad bearing wanted posters for Jim Raynor.
We also ran into something all too common at lunch that Sunday whilst leafing through the contents of her just-purchased copy of Starcraft 2. I happened to be leafing through what passes for the game's manual (which is largely a recap of what happened during the origial Starcraft and Starcraft: Brood War). At one point our waiter came up to refill our drinks and made …
Read more...
Read more...
This one's expired.
<a href='/images/imag0300.jpg'
Read more...
The only thing that Java coders spend more time on than the user interface is the code in the installer that detects which variant of the JRE you're running and errors out because there are three extra characters in the canonical name of the JRE binary? Wasn't the whole point of Java to have a language that could be implemented everywhere and execute in any runtime environment that adhered to the spec?
Read more...
I've updated my blog's privacy policy to take into account some things that my web hosting provider does differently than I did when I ran my own web server. If you're curious or concerned about this, give it a look.
Read more...
Official Wikileaks document submission URLs:
https://sunshinepress.org/
http://suw74isz7wqzpmgu.onion/ (Tor only)
Source: /pictures/the_next_hope-2010/img_1624.jpg, taken 17 July 2010 at the keynote address. Image taken of Jacob Appelbaum's presentation slide.
Official SHA-256, SHA-1, and MD5 fingerprints of the Wikileaks document submission URLs:
SHA-256:
85:C3:77:8E:7F:BC:96:42:CF:EE:03:B0:AC:4A:2A:26:
15:18:CB:50:41:EC:7A:2A:CC:9F:56:60:67:94:04:7E
SHA-1:
68:C3:4B:3D:05:7A:53:E3:8C:FE:
71:F1:30:3D:8A:AD:8E:33:0A:76
MD5 …
Read more...
The pictures I took at The Next HOPE are now online. You can look at them over here. Be warned, they're not particularly dialup-friendly.
Read more...
If your morning divination returns the following result, maybe you should call off sick and go back to bed:
"We're sorry, but your call did not go through. Please check the directory and try your call again later. Code 1-7."
Read more...