Random Articles (Page 3)

Have a deep view into what people are curious about.

πŸ”— The Cuckoo's Egg

πŸ”— Espionage πŸ”— Books πŸ”— Computer Security πŸ”— Computer Security/Computing

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of the hunt for a computer hacker who broke into a computer at the Lawrence Berkeley National Laboratory (LBNL).

Stoll's use of the term extended the metaphor Cuckoo's egg from brood parasitism in birds to malware.

Discussed on

πŸ”— List of Topics Categorized as Pseudoscience

πŸ”— Physics πŸ”— Lists πŸ”— Skepticism πŸ”— History of Science πŸ”— Alternative Views πŸ”— Science πŸ”— Alternative medicine πŸ”— Paranormal πŸ”— Creationism

This is a list of topics that have, at one point or another in their history, been characterized as pseudoscience by academics or researchers. Detailed discussion of these topics may be found on their main pages. These characterizations were made in the context of educating the public about questionable or potentially fraudulent or dangerous claims and practicesβ€”efforts to define the nature of science, or humorous parodies of poor scientific reasoning.

Criticism of pseudoscience, generally by the scientific community or skeptical organizations, involves critiques of the logical, methodological, or rhetorical bases of the topic in question. Though some of the listed topics continue to be investigated scientifically, others were only subject to scientific research in the past, and today are considered refuted but resurrected in a pseudoscientific fashion. Other ideas presented here are entirely non-scientific, but have in one way or another impinged on scientific domains or practices.

Many adherents or practitioners of the topics listed here dispute their characterization as pseudoscience. Each section here summarizes the alleged pseudoscientific aspects of that topic.

Discussed on

πŸ”— HTTP 451 Unavailable for Legal Reasons

πŸ”— Internet πŸ”— Computing πŸ”— Law πŸ”— Computing/Software πŸ”— Computing/Websites πŸ”— Computing/Networking

In computer networking, HTTP 451 Unavailable For Legal Reasons is an error status code of the HTTP protocol to be displayed when the user requests a resource which cannot be served for legal reasons, such as a web page censored by a government. The number 451 is a reference to Ray Bradbury's 1953 dystopian novel Fahrenheit 451, in which books are outlawed. 451 intends to provide more information than 403 Forbidden, which is often used for the same purpose. This status code is standardized in RFC 7725.

Examples of situations where an HTTP 451 error code could be displayed include web pages deemed a danger to national security, or web pages deemed to violate copyright, privacy, blasphemy laws, or any other law or court order.

The RFC is specific that a 451 response does not indicate whether the resource exists but requests for it have been blocked, if the resource has been removed for legal reasons and no longer exists, or even if the resource has never existed, but any discussion of its topic has been legally forbidden (see superinjunction). Some sites have previously returned HTTP 404 (Not Found) or similar if they are not legally permitted to disclose that the resource has been removed. Such a tactic is used in the United Kingdom by some internet service providers utilising the Internet Watch Foundation blacklist, returning a 404 message or another error message instead of showing a message indicating the site is blocked.

The status code was formally proposed in 2013 by Tim Bray, following earlier informal proposals by Chris Applegate in 2008 and Terence Eden in 2012. It was approved by the IESG on December 18, 2015. It was published as RFC 7725 in February 2016.

HTTP 451 was mentioned by the BBC's From Our Own Correspondent program, as an indication of the effects of sanctions on Sudan and the inability to access Airbnb, iOS's App Store, or other Western web services.

After introduction of the GDPR in European Economic Area (EEA) many websites located outside EEA started to serve HTTP 451 instead of trying to comply with this new privacy law.

Discussed on

πŸ”— Jesus Nut

πŸ”— Aviation πŸ”— Aviation/rotorcraft

Jesus nut is a slang term for the main rotor retaining nut or mast nut, which holds the main rotor to the mast of some helicopters. The related slang term Jesus pin refers to the lock pin used to secure the retaining nut. More generally, Jesus nut (or Jesus pin) has been used to refer to any component that is a single point of failure which results in catastrophic consequences.

Discussed on

πŸ”— Human Rights Violations by the CIA

πŸ”— United States/U.S. Government πŸ”— United States

This article deals with the activities of the Central Intelligence Agency of the Federal government of the United States, that violate human rights.

Discussed on

πŸ”— Moondog

πŸ”— Biography πŸ”— Biography/Musicians πŸ”— Jazz

Louis Thomas Hardin (May 26, 1916 – September 8, 1999), also known as Moondog, was an American musician, composer, theoretician, poet and inventor of several musical instruments. He was blind from the age of 16.

Hardin lived in New York City from the late 1940s until 1972, and during this time he could often be found on 6th Avenue, between 52nd and 55th Streets, wearing a cloak and a horned helmet sometimes busking or selling music, but often just standing silently on the sidewalk. He was widely recognized as "the Viking of 6th Avenue" by thousands of passersby and residents who were not aware of his musical career.

Discussed on

πŸ”— First Council of Nicaea

πŸ”— Greece πŸ”— Guild of Copy Editors πŸ”— Turkey πŸ”— Christianity πŸ”— Catholicism πŸ”— Christianity/theology πŸ”— Greece/Byzantine world πŸ”— Christianity/Eastern Orthodoxy πŸ”— Christianity/Oriental Orthodoxy πŸ”— Christianity/Syriac Christianity πŸ”— Christianity/Christian history

The First Council of Nicaea ( ny-SEE-Ι™; Ancient Greek: Σύνοδος Ο„αΏ†Ο‚ Νικαίας, romanized:Β SΓ½nodos tΓͺs NikaΓ­as) was a council of Christian bishops convened in the Bithynian city of Nicaea (now Δ°znik, Turkey) by the Roman Emperor Constantine I. The Council of Nicaea met from May until the end of July 325.

This ecumenical council was the first of many efforts to attain consensus in the church through an assembly representing all Christendom. Hosius of Corduba may have presided over its deliberations. Its main accomplishments were settlement of the Christological issue of the divine nature of God the Son and his relationship to God the Father, the construction of the first part of the Nicene Creed, mandating uniform observance of the date of Easter, and promulgation of early canon law.

Discussed on

πŸ”— Charlie Brown and Franz Stigler Incident

πŸ”— Military history πŸ”— Military history/Military aviation πŸ”— Military history/World War II πŸ”— Military history/German military history πŸ”— Military history/European military history πŸ”— Military history/British military history

The Charlie Brown and Franz Stigler incident occurred on 20 December 1943, when, after a successful bomb run on Bremen, 2nd Lt Charles "Charlie" Brown's B-17 Flying Fortress (named "Ye Olde Pub") was severely damaged by German fighters. Luftwaffe pilot Franz Stigler had the opportunity to shoot down the crippled bomber but did not do so. After an extensive search by Brown, the two pilots met each other 50 years later and developed a friendship that lasted until Stigler's death in March 2008.

Discussed on

πŸ”— Cool stuff you can do with netcat

πŸ”— Computing πŸ”— Computing/Software πŸ”— Computing/Free and open-source software

netcat (often abbreviated to nc) is a computer networking utility for reading from and writing to network connections using TCP or UDP. The command is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and investigation tool, since it can produce almost any kind of connection its user could need and has a number of built-in capabilities.

Its list of features includes port scanning, transferring files, and port listening, and it can be used as a backdoor.

Discussed on