Random Articles (Page 2)

Have a deep view into what people are curious about.

πŸ”— SDF Public Access Unix System

πŸ”— Internet πŸ”— Telecommunications

Super Dimension Fortress (SDF, also known as freeshell.org) is a non-profit public access UNIX shell provider on the Internet. It has been in continual operation since 1987 as a non-profit social club. The name is derived from the Japanese anime series The Super Dimension Fortress Macross; the original SDF server was a BBS for anime fans. From its BBS roots, which have been well documented as part of the BBS: The Documentary project, SDF has grown into a feature-rich provider serving members around the world.

Discussed on

πŸ”— 1000 Blank White Cards

πŸ”— Board and table games

1000 Blank White Cards is a party card game played with cards in which the deck is created as part of the game. Though it has been played by adults in organized groups worldwide, 1000 Blank White Cards is also described as well-suited for children in Hoyle's Rules of Games. Since any game rules are contained on the cards (rather than existing as all-encompassing rules or in a rule book), 1000 Blank White Cards can be considered a sort of nomic. It can be played by any number of players and provides the opportunity for card creation and gameplay outside the scope of a single sitting. Creating new cards during the game, dealing with previous cards' effects, is allowed, and rule modification is encouraged as an integral part of gameplay.

Discussed on

πŸ”— Boaty McBoatface

πŸ”— Internet culture πŸ”— Climate change πŸ”— Environment πŸ”— United Kingdom πŸ”— Antarctica πŸ”— Arctic πŸ”— Oceans πŸ”— Antarctica/British Antarctic Territory

Boaty McBoatface (also known as Boaty) is the British lead boat in a fleet of three robotic lithium battery–powered autonomous underwater vehicles (AUVs) of the Autosub Long Range (ALR) class. Launched in 2017 and carried on board the polar scientific research vessel RRS Sir David Attenborough, she is a focal point of the Polar Explorer Programme of the UK Government.

Boaty and her two fleet-mates are part of the UK National Marine Equipment Pool and owned by the National Oceanography Centre in Southampton. She is classified as an "autosub long range (ALR) autonomous underwater vehicle", and will use her onboard sensors to map the movement of deep waters that play a vital role in regulating the Earth's climate.

Discussed on

πŸ”— Mafia (party game)

πŸ”— Role-playing games πŸ”— Horror πŸ”— Games

Mafia (also known as The Werewolves) is a social deduction game, created by Dimitry Davidoff in 1986. The game models a conflict between two groups: an informed minority (the mafiosi or the werewolves), and an uninformed majority (the villagers). At the start of the game, each player is secretly assigned a role affiliated with one of these teams. The game has two alternating phases: first, a night role, during which those with night killing powers may covertly kill other players, and second, a day role, in which surviving players debate the identities of players and vote to eliminate a suspect. The game continues until a faction achieves its win condition; for the village, this usually means eliminating the evil minority, while for the minority this usually means reaching numerical parity with the village and eliminating any rival evil groups.

Discussed on

πŸ”— Stuxnet

πŸ”— United States πŸ”— Computing πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Weaponry πŸ”— Iran πŸ”— Computing/Software πŸ”— Computing/Computer Security πŸ”— Military history/Middle Eastern military history

Stuxnet is a malicious computer worm, first uncovered in 2010, thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel.

Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery and industrial processes including gas centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet's design and architecture are not domain-specific and it could be tailored as a platform for attacking modern supervisory control and data acquisition (SCADA) and PLC systems (e.g., in factory assembly lines or power plants), most of which are in Europe, Japan, and the US. Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges. Targeting industrial control systems, the worm infected over 200,000 computers and caused 1,000 machines to physically degrade.

Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack; a link file that automatically executes the propagated copies of the worm; and a rootkit component responsible for hiding all malicious files and processes, to prevent detection of Stuxnet. It is typically introduced to the target environment via an infected USB flash drive, thus crossing any air gap. The worm then propagates across the network, scanning for Siemens Step7 software on computers controlling a PLC. In the absence of either criterion, Stuxnet becomes dormant inside the computer. If both the conditions are fulfilled, Stuxnet introduces the infected rootkit onto the PLC and Step7 software, modifying the code and giving unexpected commands to the PLC while returning a loop of normal operation system values back to the users.

In 2015, Kaspersky Lab noted that the Equation Group had used two of the same zero-day attacks prior to their use in Stuxnet and commented that "the similar type of usage of both exploits together in different computer worms, at around the same time, indicates that the Equation Group and the Stuxnet developers are either the same or working closely together".

Discussed on

πŸ”— Darwin (1960s programming game)

πŸ”— Video games

Darwin was a programming game invented in August 1961 by Victor A. Vyssotsky, Robert Morris Sr., and M. Douglas McIlroy. (Dennis Ritchie is sometimes incorrectly cited as a co-author, but was not involved.) The game was developed at Bell Labs, and played on an IBM 7090 mainframe there. The game was only played for a few weeks before Morris developed an "ultimate" program that eventually brought the game to an end, as no-one managed to produce anything that could defeat it.

Discussed on

πŸ”— Dyson Tree

πŸ”— Science Fiction πŸ”— Plants

A Dyson tree is a hypothetical genetically engineered plant (perhaps resembling a tree) capable of growing inside a comet, suggested by the physicist Freeman Dyson. Plants could produce a breathable atmosphere within hollow spaces in the comet (or even within the plants themselves), utilising solar energy for photosynthesis and cometary materials for nutrients, thus providing self-sustaining habitats for humanity in the outer solar system analogous to a greenhouse in space or a shell grown by a mollusc.

A Dyson tree might consist of a few main trunk structures growing out from a comet nucleus, branching into limbs and foliage that intertwine, forming a spherical structure possibly dozens of kilometers across.

Discussed on

πŸ”— MD6 Message-Digest Algorithm

πŸ”— Cryptography πŸ”— Cryptography/Computer science

The MD6 Message-Digest Algorithm is a cryptographic hash function. It uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis. The source code of the reference implementation was released under MIT license.

Speeds in excess of 1 GB/s have been reported to be possible for long messages on 16-core CPU architecture.

In December 2008, Douglas Held of Fortify Software discovered a buffer overflow in the original MD6 hash algorithm's reference implementation. This error was later made public by Ron Rivest on 19 February 2009, with a release of a corrected reference implementation in advance of the Fortify Report.

MD6 was submitted to the NIST SHA-3 competition. However, on July 1, 2009, Rivest posted a comment at NIST that MD6 is not yet ready to be a candidate for SHA-3 because of speed issues, a "gap in the proof that the submitted version of MD6 is resistant to differential attacks", and an inability to supply such a proof for a faster reduced-round version, although Rivest also stated at the MD6 website that it is not withdrawn formally. MD6 did not advance to the second round of the SHA-3 competition. In September 2011, a paper presenting an improved proof that MD6 and faster reduced-round versions are resistant to differential attacks was posted to the MD6 website.

Discussed on

πŸ”— I Get This Call Every Day

πŸ”— Video games

I Get This Call Every Day is a 2012 point-and-click video game developed and published by Toronto-based developer David S Gallant. It was released for Microsoft Windows and OS X on December 21, 2012. It focuses on a call received by an employee of a customer service call centre; the player must navigate through the call without irritating the caller or breaking confidentiality laws. Gallant was fired from his job at a call centre as a direct result of publishing the game.

Discussed on

πŸ”— Anne Morelli: The Basic Principles of War Propaganda

πŸ”— International relations πŸ”— Books πŸ”— Women writers

The basic principles of war propaganda (Principes élémentaires de propagande de guerre) is a monograph by Anne Morelli published in 2001. It has not been translated into English. The subtitle recommends its "usability in case of cold war, hot war and lukewarm war" (Utilisables en cas de guerre froide, chaude ou tiède).

The ten "commandments" of propaganda which Anne Morelli elaborates in this work are, above all, an analytical framework for pedagogical purposes and for media analysis. Morelli does not want to take sides or defend "dictators", but show the regularity of use of the ten principles in the media and in society:

"I will not put to test the purity of one or the other's intentions. I am not going to find out who is lying and who is telling the truth, who is believing what he says, and who does not. My only intention is to illustrate the principles of propaganda that are used and to describe their functioning." (P. 6)

Nonetheless, it seems undeniable to the author that after the wars that characterize our epoch (Kosovo, Second Gulf War, Afghanistan War, Iraq War), Western democracies and their mediaΒ  must be discussed.

As Rudolph Walter in his review in Die Zeit shows, Morelli in this work adapts the typical forms of various contents of propaganda to news of her time. She takes up Arthur Ponsonby's Falsehood in War-Time and George Demartial's La mobilisation des consciences. La guerre de 1914 about propaganda in the First World War, systematizes them in the form of ten principles, and applies them to both world wars, the war in the Balkan, and the war in Afghanistan. Four of the following principles, according to Walter just emanate directly from the principle of friend or foe, "we and them" mindset and simplistic thinking in terms of black and white.