Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Zera

Pages: 1 [2] 3 4 ... 51
16
Miscellaneous / Re: Human Languages
« on: July 27, 2010, 09:38:43 pm »
Wow.

It's amazing how many more languages a person tends to speak in Europe compared to here in the U.S. :-|

I wouldn't use this thread as an accurate basis for such a generalization. Bearing in mind, people who participate in this community tend to be more on the educated side.

There are around 28 million Spanish-speakers in the U.S. French and German number around 1.5 million each. Chinese is around 2 million. There are some U.S. territories that are bi- or trilingual, due to their location, or cultural backgrounds. Given, it's probably not as intermixed as some parts of Europe. Where the U.S. is more of a melting-pot of every single culture, European areas tend to be more dense mixes of specific cultures and backgrounds.

17
Gaming Discussion / Re: SCII out!
« on: July 27, 2010, 04:03:41 pm »
You might be able to find a patcher to set your serverlist to another region. Not sure if any would be available this early on, but I'm sure something will eventually surface. There are plenty for the older Blizzard games.

I was kind of looking forward to the game, but I can't sacrifice that much HD space at the moment. I might be able to barely stretch my resources to get minimum performance, but I don't know if it's worth it.

18
Miscellaneous / Re: School pranks
« on: July 27, 2010, 12:41:39 am »
Throw some laxatives, opiates and lots of Olestra into a batch of hash brownies.

Sure, they'll literally crap themselves before they can get anywhere within the vicinity of a toilet, but they'll do it with a smile on their faces. :D

19
Miscellaneous / Re: Post your desktop
« on: July 26, 2010, 05:14:19 pm »
<a href="http://i29.tinypic.com/28jfwxg.png">Here is my desktop.</a>

Yes, I am a Ubuntu user, and yes, I actually play so much Pokémon Pinball that I need a launcher for it on my desktop. It is one of the reasons why nothing ever gets done.

Did you know that Xubuntu's implementation of Xfce actually uses more RAM than Gnome? (scroll down to "Simple comparisons") Even though Xubuntu aimed to be more lightweight, it became something of an oxymoron, just because they included so much robust software with it.

If you want a more lightweight Ubuntu derivative, look into Lubuntu. LXDE is not only more memory-efficient, but it also consumes less energy. Pretty ideal for green PCs.

20
Other / Re: What computer OS do you use?
« on: July 26, 2010, 03:25:17 am »
XP for full-volume encryption, (since I can't find any decent encryption software for Linux) Lucid Pup embeded in XP via Oracle, and T(A)ILS (Live) for anonymous operations.

21
Miscellaneous / Re: Post your desktop
« on: July 26, 2010, 03:17:30 am »


Didn't want to embed a huge image.

I tend to keep my desktop tidy. :P

22
cool Zera 1 more post to 500. :D

Hah. I didn't notice that.

w00t! 500 posts now. :P

23
Maybe if the game / program is a community-driven project. I wouldn't really include a logo in my projects; but I do include "Omnimaga.org" in the credits, since project discussion is hosted here. I pretty much try to include any person or site I got any additional help or advice from, as well.

Although, I'm sure "Ragnarok Development TI" exclusively links back to Omni in Google searches, anyway. :P

24
I checked the XDA community, but they only seem to focus on smart phones. My model isn't listed there. Thanks for the resource, anyway.

I doubt these kinds of phones are really hacked. Maybe the hardware is substantially different from smart phones, which are more oriented like conventional computers. (and thus easier to do *something* with)

25
I was looking into possibilities with my current mobile phone, and I'm wondering if there are any third-party systems or firmwares that could be flashed to the device. It's a Casio g'zOne Boulder. The phone's default software is very restrictive, and quite limited with multimedia support. The data protocol that allows files to be freely exchanged from the phone to a computer has been purposefully obstructed for whatever reason, so I had to get creative about how I put files on the device. (ended up placing the files on a MicroSD card, which now acts as a middle-man between my computer and the phone) It would be nice to have some operating system that doesn't throw a wall up anytime I try to install software or add multimedia. Actually, I can't install any software at all, since the phone's OS only supports BREW apps. (which have to be signed, and aren't free)

If anyone has experience with this sort of hacking, I would appreciate any insight about what sort of options might be available for my device.

If there's nothing available, I may just get a smart phone in the future.

26
Wow. I didn't expect the community to be so divided over this. :P

27
Miscellaneous / Re: Digressions
« on: July 22, 2010, 07:13:52 pm »
-The problem with lessons that take a lifetime to learn is that when you finally learn them, it's too late.

This tends to be true. I think most people go through the whole, "I wish I knew what I know now when I was younger" stage at some point in their lives.

Sometimes, I fear regression more than anything. If I were ever brain-damaged or somehow lost some degree of higher reasoning, I would be miserable at the thought of existing as anything less than what I am now. It's difficult to look back on my developing life and think that I could ever bear to live in such a manner again.

28
Miscellaneous / Digressions
« on: July 22, 2010, 07:03:21 am »
I'm not sure if many people would be interested in this, but I thought it might be a curious idea to start a topic about any proverbs, sayings, quotes, etc. you've come up with during the course of your life. These can be related to anything - philosophical, religious, technical, et al. Basically, any sayings you've created for whatever situation or purpose. You can even post excerpts from a journal or diary.

I'll start with some personal philosophy.

Quote
Am I sorrowed? Then I am a slave to sorrow. Am I angered? Then I am a slave to anger. If I am either, then my emotions are tethered to the things that elicit these feelings. Peace of mind results from separating the internal self from external occurrences and influences.

I am what I am by nature - nothing more, nothing less. Should I be wrong, then so should nature, itself, be wrong; so should all products of nature be wrong. How, then, can a person accuse another of wrong? He, too - a product of nature - suffers from some intrinsic imperfection.

Truth has no inherent value. To presuppose that a possibility or an outcome is veracious based only on merit of its desirability is to shield oneself from the nature of truth.

Every person is a standard of perfection.

Justice is a sin against the sinner. Agression cannot be surmounted with more agression. Agressive values enslave us, and - as we meditate on those values - drive us toward internal destruction. Reprisal in defense of immediate danger - independent of meditated agression - is the only justifiable use of violence.

To cast aspersions against others of responsibility, (fault) imperfection and wrong is to be a slave to jaundice - jealousy, bitterness, and adversarial values. By nature, no occurrence is any of these things. It is our own value-judgments that influence our observations of these occurrences, and cause us to feel emotional and psychological disturbances. When these value-judgments are abandoned, so then are internal disturbances.

Most of my views on these subjects are based in very apathic interpretations of Stoicism, and the premise that the universe is entirely deterministic. If we lack any agency of free-will and none of our choices are truly our own, then the outcome of our lives has already been determined by some antecedent that set everything into motion. If a person has knowledge that their actions are beyond their direct control, then for them to find this life disturbing, to experience guilt or responsibility for their own actions, or to engage in adversary, is entirely futile.

The logical consequence of awareness of predestination is removal from traditional interpretations of action and consequence. The traditional belief is that consequences are logical to personal choices made as a result of some agency of free-will. This places an unrealistic burden of responsibility upon every person subscribing to this belief. If, by nature, I am inclined to engage in some behavior that is socially unacceptable, then I will be made to suffer some internal conflict as a consequence of that behavior. This is senseless, because my nature cannot be altered.

Throughout my life, I have watched so many suffer internal conflicts over values they were indoctrinated with as children, and mutually exclusive qualities they possessed as a result of their very nature. Some people are able to modify these values in order to continue living their lives, simultaneously remaining true to their own nature; some people become so enslaved by these values that they attempt to modify their nature instead, and inexorably fail. These people are slaves to externals. If only they could realize their own nature, and be true only to themselves, they would find peace in this life. This is a piece of insight I wish I could give to every person.

29
Other Calculators / Re: Regarding NSpire cracking
« on: July 22, 2010, 03:33:25 am »
Oh, I see. I was mistaken, then.

Well, so much for my idea. :P

30
Other Calculators / Regarding NSpire cracking
« on: July 21, 2010, 11:24:20 pm »
Forgive me if I'm mistaken about the details here, as I don't understand the subject too well; but are people attempting to decrypt keys used by NSpire to circumvent some type of memory protection? If so, I wonder if a cold-boot attack against the system is possible. (or something like it) That is, if the calculator is used in a manner where the system processes this key and stores it in memory, (e.g., a signed application is executed, and provides the appropriate verification key to the system) then perhaps the key can be extracted from memory as it's loaded. This type of attack works against encrypted computer systems, where decryption keys are stored in RAM for some time after the system powers down. This information can be carefully extracted from RAM before it is erased.

Pages: 1 [2] 3 4 ... 51