Create an Account
username: password:
 
  MemeStreams Logo

Lost's MemeStream

search

Lost
Picture of Lost
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Lost's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
Technology

support us

Get MemeStreams Stuff!


 
FileSystemWatcher Class (System.IO) .NET
Topic: Technology 12:31 am EDT, Apr 10, 2006

FileSystemWatcher Class

Listens to the file system change notifications and raises events when a directory, or file in a directory, changes.

FileSystemWatcher Class (System.IO) .NET


Keying Hash Functions for Message Authentication
Topic: Technology 12:25 am EDT, Apr 10, 2006

The use of cryptographic hash functions like MD5 or SHA for message authentication has
become a standard approach in many Internet applications and protocols. Though very easy to
implement, these mechanisms are usually based on ad hoc techniques that lack a sound security
analysis.
We present new constructions of message authentication schemes based on a cryptographic
hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the un-
derlying hash function has some reasonable cryptographic strengths. Moreover we show, in a
quantitative way, that the schemes retain almost all the security of the underlying hash function.
In addition our schemes are efficient and practical. Their performance is essentially that of the
underlying hash function. Moreover they use the hash function (or its compression function) as
a black box, so that widely available library code or hardware can be used to implement them
in a simple way, and replaceability of the underlying hash function is easily supported.

Keying Hash Functions for Message Authentication


How To: Hash Data with Salt (C#/VB.NET)
Topic: Technology 11:41 pm EDT, Apr  9, 2006

How To: Hash Data with Salt (C#/VB.NET)

The code below demonstrates how to hash data and verify hashes. It supports MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashing algorithms. To help reduce the risk of dictionary attacks, the code appends random bytes (so-called "salt") to the original plain text before generating hashes. Please keep in mind that salt can only help against prebuilt dictionaries. If an intruder gets access to your system and uses a brute force attack, salt will not provide much value. Code samples are provided in C# and Visual Basic.NET. IMPORTANT: DATA HASHES CANNOT BE "DECRYPTED" BACK TO PLAIN TEXT.

How To: Hash Data with Salt (C#/VB.NET)


Zimbra - Blog - A Pint of ALE - Ajax Linking and Embedding
Topic: Technology 7:23 pm EDT, Apr  9, 2006

A Pint of ALE - Ajax Linking and Embedding

Recently I had to write a document which required the inclusion of some images, a chart, and a few drawings in the text - something that modern word processors allow you to simply and readily do. In fact, the ability to embed and edit rich content directly in a document is actually a pretty handy and powerful feature; arguably one of the more important and enabling features of modern day office suites, such as OpenOffice and Microsoft Office.What is really nice is that the embedded content is saved along with the enclosing document. So for example, if I email a document to a colleague, then the embedded objects I have included into the document follow it to their destination. This embedding capability has traditionally been enabled by leveraging component object models such as Microsoft’s COM/DCOM or IBM’s DSOM and has been the domain of fat desktop applications and office suites.

Zimbra - Blog - A Pint of ALE - Ajax Linking and Embedding


THE IRAN PLANS: Would President Bush go to war to stop Tehran from getting the bomb?
Topic: Current Events 12:01 pm EDT, Apr  9, 2006

There is a Cold War precedent for targeting deep underground bunkers with nuclear weapons. In the early nineteen-eighties, the American intelligence community watched as the Soviet government began digging a huge underground complex outside Moscow. Analysts concluded that the underground facility was designed for “continuity of government”—for the political and military leadership to survive a nuclear war. (There are similar facilities, in Virginia and Pennsylvania, for the American leadership.) The Soviet facility still exists, and much of what the U.S. knows about it remains classified. “The ‘tell’ ”—the giveaway—“was the ventilator shafts, some of which were disguised,” the former senior intelligence official told me. At the time, he said, it was determined that “only nukes” could destroy the bunker. He added that some American intelligence analysts believe that the Russians helped the Iranians design their underground facility. “We see a similarity of design,” specifically in the ventilator shafts, he said.

Its a little off topic but wow, this is under Ramenki, the neighborhood where I lived in southwest Moscow. There are air ducts popping up everywhere, entrances into sides of hills (now converted into a private auto repair shop), and supposedly you could fit 50,000 people down there for a long time, and deliver them there from Moscow's 'Metro 2', the government system that runs in parallel to the main metro. There's very little english press coverage of this.

THE IRAN PLANS: Would President Bush go to war to stop Tehran from getting the bomb?


In Ancient Document, Judas, Minus the Betrayal - New York Times
Topic: Miscellaneous 12:36 pm EDT, Apr  7, 2006

An early Christian manuscript, including the only known text of the Gospel of Judas, has surfaced after 1,700 years, and it portrays Judas Iscariot not as a betrayer of Jesus but as his favored disciple and willing collaborator.

This is some Davinci Code shit here. Crazy.

In Ancient Document, Judas, Minus the Betrayal - New York Times


Me and Bo Jackson, Eatin Chicken!
Topic: Recreation 11:53 pm EDT, Apr  6, 2006

ME: Where did you get that water? I'm thirsty.

COLLEEN: I got it from Bo Jackson.

ME: There ain't no Bo Jackson here.

COLLEEN: Follow me.

ME: Bo Jackson was my hero. (follows)

COLLEEN: Bo, this guy is thirsty and you're his hero.

ME: (wide eyes, open mouth)

BO: Boy, are you too scared to ask Bo Jackson for some water?

ME: Can I have some water?

BO: Yeah, get you a water.

ME: (gets water) Bo, you were my biggest hero, I had the Nike posted with the bat and the baseball pads (motions as though bat is behind head) and your baseball cards and your football cards and...

BO: (nodding) Try some of Bo Jackson's chicken.

ME: Oh, uhhh... I just ate. No thanks.

BO: Boy, you gonna drink Bo Jackson's water but you won't try Bo Jackson's chicken!?

ME: Oh, yes sir. (tries chicken)

EXEC DUDE: How is it?

ME: Really good! (and it was)

COLLEEN: Picture time!

BO: Right answer. You just earned yourself a picture with Bo!

BO AND ME: (smile)

Me and Bo Jackson, Eatin Chicken!


A Student-Hacker Showdown at the Collegiate Cyber Defense Competition - Day Three
Topic: Technology 6:24 pm EST, Mar 31, 2006

To keep the games interesting, and provide a bit of a educational anomaly, the Red Team had done what any criminal hacker would consider — they broke into the teams’ pods and installed backdoors. Using only the light from a glow stick (the hotel they were staying at didn't have any flashlights), they found a ladder, climbed up the outside of the room (12 foot ceilings), pulled back a drop ceiling tile, and climbed down a wooden rod they collected from nearby. With physical access granted, the Red Team went to town.

A Student-Hacker Showdown at the Collegiate Cyber Defense Competition - Day Three


NATIONAL JOURNAL: Insulating Bush (03/30/2006)
Topic: Society 6:08 am EST, Mar 31, 2006

Karl Rove, President Bush's chief political adviser, cautioned other White House aides in the summer of 2003 that Bush's 2004 re-election prospects would be severely damaged if it was publicly disclosed that he had been personally warned that a key rationale for going to war had been challenged within the administration. Rove expressed his concerns shortly after an informal review of classified government records by then-Deputy National Security Adviser Stephen J. Hadley determined that Bush had been specifically advised that claims he later made in his 2003 State of the Union address -- that Iraq was procuring high-strength aluminum tubes to build a nuclear weapon -- might not be true, according to government records and interviews.

NATIONAL JOURNAL: Insulating Bush (03/30/2006)


Georgia Civil Procedure Flowchart
Topic: Technology 5:41 am EST, Mar 31, 2006

This is a more detailed flowchart for Georgia civil procedure that I was working on. Would be a good starting point for anyone who intended to work on Hammurabi.

Georgia Civil Procedure Flowchart


(Last) Newer << 181 ++ 191 - 192 - 193 - 194 - 195 - 196 - 197 - 198 - 199 ++ 209 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0