Computing desk | ||
---|---|---|
< February 18 | << Jan | February | Mar >> | February 20 > |
Welcome to the Wikipedia Computing Reference Desk Archives |
---|
The page you are currently viewing is an archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
OK, computer experts. I am looking at my Windows 7 box right now as it displays a dialog box telling me my computer is low on memory and I should "Close programs to prevent information loss". The mouse cursor has disappeared, the keyboard does nothing, ctrl-alt-del doesn't display the Task Manager, and the computer appears unresponsive and inert ... except that the hard disk light on the tower flashes several times per second. The light is off, I'd estimate, 90% of the time in any given second, and the other 10% of a representative second, it's on (distributed throughout that second in a number of flashes, if I'm making sense.)
I've seen this phenomenon many times before on XP boxes, a few times on Vista boxes, and this is the first time on a Windows 7 box.
The question I put to you all is: What do you do when your machine locks up except that the hard disk light keeps flashing? Do you express faith in protected memory and the OS by waiting for an hour? Two hours? Begging for your mouse cursor to return? After all, maybe it's hitting the page file a lot and it's all fragmented, or something, and the computer will come to its senses any second now. Or do you swear explosively after sixty seconds of inactivity and cold boot the machine? Comet Tuttle ( talk) 00:20, 19 February 2011 (UTC)
This question isn't related to computing, moving to Wikipedia:Help desk. JIP | Talk 20:21, 19 February 2011 (UTC)
How does glasses less 3d works? I can't find an article. -- Tyw7 ( ☎ Contact me! • Contributions) Changing the world one at a time! 08:01, 19 February 2011 (UTC)
Wikipedia's article on branch predictors says that the IBM 7030 (of late 1950s vintage) did static prediction. I did some research, searching the web, books, and papers for any computer predating the 7030 that did any form of branch prediction. I could not find any. So my questions are: Was the 7030 the first computer to predict the outcome of branches? If the 7030 was the first computer to predict branches, then did the idea of predicting branches predate the 7030? Thanks in advance. Rilak ( talk) 08:15, 19 February 2011 (UTC)
I'm not an active programmer, but I know how a common protocol works, and by inserting two lines into the protocol, you could get a different, really interesting protocol. I'd like someone to do this for me, they can publish the results too, under their name. (They can keep maintaining the project, too, if they want,, which would add to their portfolio and might help them get jobs, etc). I just want use of the resulting protocol. (I've already checked with others, and my changes do work). How would I go about finding such a person? Anyone who knows C++ and can recompile an existing project with a few lines of changes in a few minutes, could do this whole thing in 20 minutes, and it's interesting and cool. Thanks. 109.128.192.218 ( talk) 10:24, 19 February 2011 (UTC)
just a reminder, that my question is "where to find someone" who is interested in that. IRC? Some special site? Where.
109.128.192.218 (
talk)
12:14, 19 February 2011 (UTC)
Why on earth would anyone make such a promise? They don't even know what project it is. If it's something like Firefox, it takes hours to build from source. The reason I suggested that you post the idea here is so people can decide for themselves if it's interesting enough to spend any time on. Right now there's no evidence that it's even interesting. And it's not even clear what you're asking--someone is supposed to patch some C++ program, recompile it, and send you a compiled binary? Don't you know better than to run binaries from strangers over the internet? You don't even say what OS you're using, so any particular reader might have a tool chain for their OS but not for yours. Or wait, you're asking them to fork some existing codebase and maintain a fork for the rest of their lives? Why not just get the upstream devs to take the patch? Anyway, these guessing games are not very interesting. If you want to hire a programmer, I already suggested craigslist.org. 71.141.88.54 ( talk) 12:25, 19 February 2011 (UTC)
You could always learn a programming language and do it yourself, which would probably be the best option if you want to keep whatever it is you're doing up to date and just how you want it. 82.43.92.41 ( talk) 12:34, 19 February 2011 (UTC)
If you're as secretive and spend as much time trying to convince people it's a good idea and very easy but they need to make obscure promises before you even tell them what it is, I don't know if there is anywhere you can find someone willing to do it for $50. In fact considering the reason you say you don't want to tell people is because they won't do it if you do tell (not say because you're scared they'll steal the results and not give you credit which you don't even seem to care about), the only logical conclusion most people are going to make is there's either something dodgy which is why you're being so secretive or you're just wasting their time. On the other hand, if you actually tell people what they want to do when they ask without asking for obscure promises, and it really is as simple as you say, I'm sure you'll find someone somewhere like craiglist that's already mentioned who'll be willing to do it. It may not be everyone who reads your request but I don't see that matters. Nil Einne ( talk) 13:29, 19 February 2011 (UTC)
ugh. Fine, I'll tell you. Target: latest version of Debian, against which I've never programmed. Just make a private and public key using pgp etc. Then download source code to any bittorrent client and modify it thusly. In the part that checksums bad data you got from other peers, before you throw it out if it failed checksum, do one more thing: write it out to a file, and check to see if it was signed by keypair you made. (you only use the public key for this). if it was signed, then it means it's a new .torrent2 file (name of our protocol) and you start that in another copy of your client, as well as telling peers connected to you that you have it, giving it to them when they want it, etc. Even though it failed the checksum, you treat it as if it had passed it.
That's it. There are a couple of implementation details that will take the rest of the 20 minutes. (or, if you're not an 31337 hacker, the rest of your couple of hours.)
What does this do? This replaces an RSS server for a series of torrents. If you know you want to get the next episode, which doesn't exist at the time of the torrent creation (so you can't possibly include any reference to it in a normal .torrent file, since you can't checksum it, it's from the future) - normally what would happen then is that users have to wait until that file actually exists, and then download another torrent for the new file in a totally non-p2p way (RSS, direct http, etc). A torrent2 just lets you put that into the final chunks of the file. The implementation details I mentioned include checksuming just the first part of the file, not the extra payload (treated as 0's when checksuming the original files). Also torrent creation, which means creating a file with extra chunks at the end that later will deliver the next torrent file, and for the checksuming, treating those chunks as zeros.
The idea is that all these users are already in a p2p network, why should they have to do a direct file download for the next part of the series (which doesn't exist at time of torrent creation) - why not just use the same network they're in?
The protocol piggybacks on the bittorrent protocol. Thus, there are two layers: bittorrent layer, bittorrent2 layer.
At the bittorrent layer, this is what happens. Nobody is a seed, because nobody has the last chunk. Nevertheless, the users get to 99%, and, lacking any seeds, just stay in a network waiting for the last chunk.
At the bittorrent2 level, when they reach 99% they already decide to write out the original file, and they use the file's checksum (assuming 0's for the last chunk). They are done with the original file download and just waiting for the next torrent.
This way there doesn't need to be an RSS server or direct downloads. With trackerless torrents, the original server can be long gone. When the next episode exists, the 'server' can just join the same network as a client, but with the difference that it has the private key and can create, distribute and initiate the next torrent2 for the whole network waiting for it. (If you feel uncomfortable about automatically starting the torrent2 of the file from the future, as a security measure, the next torrent2 doesn't have to actually start, it can just be written out and the user could be prompted to see if he wants to start it. Either way, you save having to do a direct, centralized download of the next torrent2 file.)
All this, I swear to you, can be done in 20 minutes by an 31337 Unix hacker in a contest setting. Yes, it might take you a couple of hours, but this is super easy.
Now queue all you people saying "yeah that'll probably work" and is obviously super-simple, and no one doing anything about it. I'll pay $100 to the first person who tells me they will do this by midnight UTC (about ten hours from when I post this) at my e-mail address listed above, M8R-0489c01@mailinator.com and will update the status here to show that the prize has been taken. If they don't deliver I'll repost tomorrow. They can also use it on their portfolio. Seriously, aren't there any 31337 hackers here who want $100? This is not a contest: this is just you. It's obvious you can do the above in a few hours, if not 20 minutes. Write me. 109.128.192.218 ( talk) 14:12, 19 February 2011 (UTC)
2. Describe the project and make clear that payment is upon completion You'll get better offers than $50/20 minutes. —Preceding unsigned comment added by 212.169.182.73 ( talk) 15:37, 19 February 2011 (UTC)
Thanks for your feedback. My original question is where to find someone who is interested in making this, freely and open-source, for everybody, just because it is interesting. I would just be one of their users. This is in no way a commercial enterprise or relationship. This is not some get-rich-quick scheme or something. It's get-not-bored-for-a-very-short-period-of-time scheme. Like, get not bored for 20 minutes type deal. Let me give you my thoughts:
- "This project will take much longer than 20 minutes. Even somebody with specific experience in a particular bittorrent source code would not be able to correctly make the modifications you suggest in 20 minutes."
The modifications I suggest by definition are not "correct", they are a hack. That's because the bittorrent protocol can have extensions, and I'm not suggesting we use one, just butcher the protocol so that it isn't bittorrent anymore. Further, almost all of the action is out of the executable, it is just a couple of lines of script you execute, the scripts just call gpg or something, which is totally stand-alone. Look, check out the old CLI (command line interface) code for Transmission:
https://trac.transmissionbt.com/browser/branches I can find the places to change code myself in a couple of minutes. Really, this is not that much work.
- "You are suggesting a modification to an existing standardized network-application protocol. How will that work? Who will connect to your (now-incompatible) bittorrent client? Your software is not standalone - to succeed, it will require aggressive marketing to acquire
network effect critical mass; otherwise, you simply have created an incompatible bittorrent client."
Sorry, you misunderstand. I'm not trying to "succeed". bittorrent2 has nothing to do with bittorrent - it's totally incompatible. Any bittorrent user would NEVER be able to finish downloading from bittorrent2, since it will never accept the garbage data that bittorrent2 users pass around for the final chunk. (they accept it because it is signed properly). So, it has really nothing to do with bittorrent. You're mistakenly thinking that this thing requires some kind of adoption or something. It doesn't. It's a one-off project that can be done in 20 minutes. For example, you don't even have to change the public and private key (for example, include either in the original .torrent2 file, etc). It's a one-off hack that's interetsing but takes 20 minutes.
- "Are you sure you thoroughly understand the way
bittorrent protocol works"
Yes.
- "Are you sure you understand the risks of accepting binary data from a peer-to-peer network that explicitly failed an identity-verification checksum"
It's not executable data, as you're implying. It's like this: the person who signed it is the person who made the .torrent2 The only difference is that instead of including the data and checksuming it on the spot, you include data from the future and instead of checksuming it, use signing to verify it later. If I don't trust the torrent file that is going to get signed by the creator of the torrent2 later, why would I trust it if it were in a traditional torrent, checksummed then? It doesn't make sense. Besides, there's no trust involved. It's not an executable file.
- "Do you realize that many Bittorrent sourcecode is free and open-source, and that you could make these experimental modifications yourself?"
Absolutely, but it sure as shit wouldn't take me 20 minutes, unlike a Unix hacker, an 31337 one. The reason I'm asking you guys to do is cuz' you can do it super-fast, and I can't. No, the modifications are in no way user except to me and others. All of whom would install the bittorrent2 client you fork from a bittorrent client, since it's the only one right now that supports the bittorrent2 protocol. Even if nobody else ever downloads it, it's still there on your portfolio. You can even publish a specification for it, if you really wanted. At the moment this is a 20-minute hack that I'm saying is worth it in terms of your portfolio. If you judge that sinking an additional 10 hours into a spec and more options (like creating torrents that include a new public key somewhere, so that it's not "hard coded" into the implementation) you can always do it. If not, you can always drop it. Really, we're talking about twenty minutes of YOUR time, and we've been arguing about it for hours. That makes sense for me, since I couldn't have done it in that time, but it doesn't make sense for you, since you could have.
109.128.192.218 (
talk)
16:23, 19 February 2011 (UTC)
109.128.192.218 ( talk) 17:07, 19 February 2011 (UTC)
So, overall, I'm not convinced the idea is workable, and even if it is, I'm not convinced it's a sane technical approach, and even if it is, there are various deployment and usability obstacles that others have already mentioned further up (plus others, like how are you going to distribute the public keys?). The OP also seriously underestimates the amount of work it would take to make such a thing. I'd suggest going to some BT developer forum or IRC channel and discussing the subscription idea in more high-level terms, with a considerably different attitude than the one shown here. I can tell you as a programmer sometimes involved in hiring other programmers, that if I saw a hack like that in someone's "portfolio", it would make me less likely rather than more likely to want to hire them. I'd be more impressed by a well-designed and documented extension that made actual sense. 71.141.88.54 ( talk) 22:02, 19 February 2011 (UTC)
What is the purpose/function of Eq in Haskell (i.e. what restrictions does it place)? For example, what arguments could be passed to a function of type f :: [a] -> a but not to a function of type f :: Eq a => [a] -> a ? Widener ( talk) 10:32, 19 February 2011 (UTC)
C++ concepts were certainly inspired by Haskell type classes, so might not be so useful as examples. I agree the analogy with Java interfaces isn't perfect. The main point is that interfaces and type classes both give you a way to have the same operation supported on multiple types with separate implementations per type. I'm not sure what you mean about the choice of implementation being up to the caller. It's true that Haskell typeclasses are "open", which means you can declare a type to be an instance of a class anywhere in the program, if it isn't already one. But I'm pretty sure if you try to do it in more than one place, the compiler will complain. 71.141.88.54 ( talk) 07:05, 20 February 2011 (UTC)
Hello,
I have an area of my site which I only want to be accessed via a certain port that is rotated every week, for additional security. Is there any way that I can do this using a file on my server, say htaccess or something of that sort?-- 213.168.117.109 ( talk) 11:25, 19 February 2011 (UTC)
Hi, I am posting this on here and the Entertainment helpdesk as it seems to span both - forgive me if that breaks any rules.
I have some old PC games that I used to play under Win95 and Win XP but Win 7 doesn't seem to recognise them - I am now running a 64 bit set-up which probably doesn't help.
My question is, can anyone tell me if I can still buy some of the old games (Monkey Island series; Disc World series; Kyrandia; Gabriel Knight; etc.) but written to run on a modern PC under Win 7? If so, where can I get them?
Hoping you can help. Gurumaister ( talk) 11:37, 19 February 2011 (UTC)
I get this message:
"name_of_the_file/ga.js could not be saved, because the source file could not be read.
Try again later, or contact the server administrator."
212.169.182.73 ( talk) 14:26, 19 February 2011 (UTC)
can i lock a file in a folder in sd card with a software which can run directly with that software without unlocking? I want to do this silently with cmd command. —Preceding unsigned comment added by 202.56.7.131 ( talk) 14:29, 19 February 2011 (UTC)
If two usb storage devices are connected to a computer via a usb hub and you transfer a file from one device to the other, does the data travel via 1st device -> hub -> computer -> hub -> 2nd device, or 1st device -> hub -> second device? 82.43.92.41 ( talk) 16:42, 19 February 2011 (UTC)
Thanks 82.43.92.41 ( talk) 20:25, 19 February 2011 (UTC)
A friend of mine has problems running some games ( Left 4 Dead 2 specifically) so I asked him to download Speccy to get a quick list of all of his specifications, so we could find out what the problem was. This revealed that his graphics card was running at 95 degrees C. Neither of us know a lot about computers, so:
The only thing that's been done to the computer is installing a case fan. The card is an nVidia GeForce 9100. Vimescarrot ( talk) 21:31, 19 February 2011 (UTC)
Computing desk | ||
---|---|---|
< February 18 | << Jan | February | Mar >> | February 20 > |
Welcome to the Wikipedia Computing Reference Desk Archives |
---|
The page you are currently viewing is an archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
OK, computer experts. I am looking at my Windows 7 box right now as it displays a dialog box telling me my computer is low on memory and I should "Close programs to prevent information loss". The mouse cursor has disappeared, the keyboard does nothing, ctrl-alt-del doesn't display the Task Manager, and the computer appears unresponsive and inert ... except that the hard disk light on the tower flashes several times per second. The light is off, I'd estimate, 90% of the time in any given second, and the other 10% of a representative second, it's on (distributed throughout that second in a number of flashes, if I'm making sense.)
I've seen this phenomenon many times before on XP boxes, a few times on Vista boxes, and this is the first time on a Windows 7 box.
The question I put to you all is: What do you do when your machine locks up except that the hard disk light keeps flashing? Do you express faith in protected memory and the OS by waiting for an hour? Two hours? Begging for your mouse cursor to return? After all, maybe it's hitting the page file a lot and it's all fragmented, or something, and the computer will come to its senses any second now. Or do you swear explosively after sixty seconds of inactivity and cold boot the machine? Comet Tuttle ( talk) 00:20, 19 February 2011 (UTC)
This question isn't related to computing, moving to Wikipedia:Help desk. JIP | Talk 20:21, 19 February 2011 (UTC)
How does glasses less 3d works? I can't find an article. -- Tyw7 ( ☎ Contact me! • Contributions) Changing the world one at a time! 08:01, 19 February 2011 (UTC)
Wikipedia's article on branch predictors says that the IBM 7030 (of late 1950s vintage) did static prediction. I did some research, searching the web, books, and papers for any computer predating the 7030 that did any form of branch prediction. I could not find any. So my questions are: Was the 7030 the first computer to predict the outcome of branches? If the 7030 was the first computer to predict branches, then did the idea of predicting branches predate the 7030? Thanks in advance. Rilak ( talk) 08:15, 19 February 2011 (UTC)
I'm not an active programmer, but I know how a common protocol works, and by inserting two lines into the protocol, you could get a different, really interesting protocol. I'd like someone to do this for me, they can publish the results too, under their name. (They can keep maintaining the project, too, if they want,, which would add to their portfolio and might help them get jobs, etc). I just want use of the resulting protocol. (I've already checked with others, and my changes do work). How would I go about finding such a person? Anyone who knows C++ and can recompile an existing project with a few lines of changes in a few minutes, could do this whole thing in 20 minutes, and it's interesting and cool. Thanks. 109.128.192.218 ( talk) 10:24, 19 February 2011 (UTC)
just a reminder, that my question is "where to find someone" who is interested in that. IRC? Some special site? Where.
109.128.192.218 (
talk)
12:14, 19 February 2011 (UTC)
Why on earth would anyone make such a promise? They don't even know what project it is. If it's something like Firefox, it takes hours to build from source. The reason I suggested that you post the idea here is so people can decide for themselves if it's interesting enough to spend any time on. Right now there's no evidence that it's even interesting. And it's not even clear what you're asking--someone is supposed to patch some C++ program, recompile it, and send you a compiled binary? Don't you know better than to run binaries from strangers over the internet? You don't even say what OS you're using, so any particular reader might have a tool chain for their OS but not for yours. Or wait, you're asking them to fork some existing codebase and maintain a fork for the rest of their lives? Why not just get the upstream devs to take the patch? Anyway, these guessing games are not very interesting. If you want to hire a programmer, I already suggested craigslist.org. 71.141.88.54 ( talk) 12:25, 19 February 2011 (UTC)
You could always learn a programming language and do it yourself, which would probably be the best option if you want to keep whatever it is you're doing up to date and just how you want it. 82.43.92.41 ( talk) 12:34, 19 February 2011 (UTC)
If you're as secretive and spend as much time trying to convince people it's a good idea and very easy but they need to make obscure promises before you even tell them what it is, I don't know if there is anywhere you can find someone willing to do it for $50. In fact considering the reason you say you don't want to tell people is because they won't do it if you do tell (not say because you're scared they'll steal the results and not give you credit which you don't even seem to care about), the only logical conclusion most people are going to make is there's either something dodgy which is why you're being so secretive or you're just wasting their time. On the other hand, if you actually tell people what they want to do when they ask without asking for obscure promises, and it really is as simple as you say, I'm sure you'll find someone somewhere like craiglist that's already mentioned who'll be willing to do it. It may not be everyone who reads your request but I don't see that matters. Nil Einne ( talk) 13:29, 19 February 2011 (UTC)
ugh. Fine, I'll tell you. Target: latest version of Debian, against which I've never programmed. Just make a private and public key using pgp etc. Then download source code to any bittorrent client and modify it thusly. In the part that checksums bad data you got from other peers, before you throw it out if it failed checksum, do one more thing: write it out to a file, and check to see if it was signed by keypair you made. (you only use the public key for this). if it was signed, then it means it's a new .torrent2 file (name of our protocol) and you start that in another copy of your client, as well as telling peers connected to you that you have it, giving it to them when they want it, etc. Even though it failed the checksum, you treat it as if it had passed it.
That's it. There are a couple of implementation details that will take the rest of the 20 minutes. (or, if you're not an 31337 hacker, the rest of your couple of hours.)
What does this do? This replaces an RSS server for a series of torrents. If you know you want to get the next episode, which doesn't exist at the time of the torrent creation (so you can't possibly include any reference to it in a normal .torrent file, since you can't checksum it, it's from the future) - normally what would happen then is that users have to wait until that file actually exists, and then download another torrent for the new file in a totally non-p2p way (RSS, direct http, etc). A torrent2 just lets you put that into the final chunks of the file. The implementation details I mentioned include checksuming just the first part of the file, not the extra payload (treated as 0's when checksuming the original files). Also torrent creation, which means creating a file with extra chunks at the end that later will deliver the next torrent file, and for the checksuming, treating those chunks as zeros.
The idea is that all these users are already in a p2p network, why should they have to do a direct file download for the next part of the series (which doesn't exist at time of torrent creation) - why not just use the same network they're in?
The protocol piggybacks on the bittorrent protocol. Thus, there are two layers: bittorrent layer, bittorrent2 layer.
At the bittorrent layer, this is what happens. Nobody is a seed, because nobody has the last chunk. Nevertheless, the users get to 99%, and, lacking any seeds, just stay in a network waiting for the last chunk.
At the bittorrent2 level, when they reach 99% they already decide to write out the original file, and they use the file's checksum (assuming 0's for the last chunk). They are done with the original file download and just waiting for the next torrent.
This way there doesn't need to be an RSS server or direct downloads. With trackerless torrents, the original server can be long gone. When the next episode exists, the 'server' can just join the same network as a client, but with the difference that it has the private key and can create, distribute and initiate the next torrent2 for the whole network waiting for it. (If you feel uncomfortable about automatically starting the torrent2 of the file from the future, as a security measure, the next torrent2 doesn't have to actually start, it can just be written out and the user could be prompted to see if he wants to start it. Either way, you save having to do a direct, centralized download of the next torrent2 file.)
All this, I swear to you, can be done in 20 minutes by an 31337 Unix hacker in a contest setting. Yes, it might take you a couple of hours, but this is super easy.
Now queue all you people saying "yeah that'll probably work" and is obviously super-simple, and no one doing anything about it. I'll pay $100 to the first person who tells me they will do this by midnight UTC (about ten hours from when I post this) at my e-mail address listed above, M8R-0489c01@mailinator.com and will update the status here to show that the prize has been taken. If they don't deliver I'll repost tomorrow. They can also use it on their portfolio. Seriously, aren't there any 31337 hackers here who want $100? This is not a contest: this is just you. It's obvious you can do the above in a few hours, if not 20 minutes. Write me. 109.128.192.218 ( talk) 14:12, 19 February 2011 (UTC)
2. Describe the project and make clear that payment is upon completion You'll get better offers than $50/20 minutes. —Preceding unsigned comment added by 212.169.182.73 ( talk) 15:37, 19 February 2011 (UTC)
Thanks for your feedback. My original question is where to find someone who is interested in making this, freely and open-source, for everybody, just because it is interesting. I would just be one of their users. This is in no way a commercial enterprise or relationship. This is not some get-rich-quick scheme or something. It's get-not-bored-for-a-very-short-period-of-time scheme. Like, get not bored for 20 minutes type deal. Let me give you my thoughts:
- "This project will take much longer than 20 minutes. Even somebody with specific experience in a particular bittorrent source code would not be able to correctly make the modifications you suggest in 20 minutes."
The modifications I suggest by definition are not "correct", they are a hack. That's because the bittorrent protocol can have extensions, and I'm not suggesting we use one, just butcher the protocol so that it isn't bittorrent anymore. Further, almost all of the action is out of the executable, it is just a couple of lines of script you execute, the scripts just call gpg or something, which is totally stand-alone. Look, check out the old CLI (command line interface) code for Transmission:
https://trac.transmissionbt.com/browser/branches I can find the places to change code myself in a couple of minutes. Really, this is not that much work.
- "You are suggesting a modification to an existing standardized network-application protocol. How will that work? Who will connect to your (now-incompatible) bittorrent client? Your software is not standalone - to succeed, it will require aggressive marketing to acquire
network effect critical mass; otherwise, you simply have created an incompatible bittorrent client."
Sorry, you misunderstand. I'm not trying to "succeed". bittorrent2 has nothing to do with bittorrent - it's totally incompatible. Any bittorrent user would NEVER be able to finish downloading from bittorrent2, since it will never accept the garbage data that bittorrent2 users pass around for the final chunk. (they accept it because it is signed properly). So, it has really nothing to do with bittorrent. You're mistakenly thinking that this thing requires some kind of adoption or something. It doesn't. It's a one-off project that can be done in 20 minutes. For example, you don't even have to change the public and private key (for example, include either in the original .torrent2 file, etc). It's a one-off hack that's interetsing but takes 20 minutes.
- "Are you sure you thoroughly understand the way
bittorrent protocol works"
Yes.
- "Are you sure you understand the risks of accepting binary data from a peer-to-peer network that explicitly failed an identity-verification checksum"
It's not executable data, as you're implying. It's like this: the person who signed it is the person who made the .torrent2 The only difference is that instead of including the data and checksuming it on the spot, you include data from the future and instead of checksuming it, use signing to verify it later. If I don't trust the torrent file that is going to get signed by the creator of the torrent2 later, why would I trust it if it were in a traditional torrent, checksummed then? It doesn't make sense. Besides, there's no trust involved. It's not an executable file.
- "Do you realize that many Bittorrent sourcecode is free and open-source, and that you could make these experimental modifications yourself?"
Absolutely, but it sure as shit wouldn't take me 20 minutes, unlike a Unix hacker, an 31337 one. The reason I'm asking you guys to do is cuz' you can do it super-fast, and I can't. No, the modifications are in no way user except to me and others. All of whom would install the bittorrent2 client you fork from a bittorrent client, since it's the only one right now that supports the bittorrent2 protocol. Even if nobody else ever downloads it, it's still there on your portfolio. You can even publish a specification for it, if you really wanted. At the moment this is a 20-minute hack that I'm saying is worth it in terms of your portfolio. If you judge that sinking an additional 10 hours into a spec and more options (like creating torrents that include a new public key somewhere, so that it's not "hard coded" into the implementation) you can always do it. If not, you can always drop it. Really, we're talking about twenty minutes of YOUR time, and we've been arguing about it for hours. That makes sense for me, since I couldn't have done it in that time, but it doesn't make sense for you, since you could have.
109.128.192.218 (
talk)
16:23, 19 February 2011 (UTC)
109.128.192.218 ( talk) 17:07, 19 February 2011 (UTC)
So, overall, I'm not convinced the idea is workable, and even if it is, I'm not convinced it's a sane technical approach, and even if it is, there are various deployment and usability obstacles that others have already mentioned further up (plus others, like how are you going to distribute the public keys?). The OP also seriously underestimates the amount of work it would take to make such a thing. I'd suggest going to some BT developer forum or IRC channel and discussing the subscription idea in more high-level terms, with a considerably different attitude than the one shown here. I can tell you as a programmer sometimes involved in hiring other programmers, that if I saw a hack like that in someone's "portfolio", it would make me less likely rather than more likely to want to hire them. I'd be more impressed by a well-designed and documented extension that made actual sense. 71.141.88.54 ( talk) 22:02, 19 February 2011 (UTC)
What is the purpose/function of Eq in Haskell (i.e. what restrictions does it place)? For example, what arguments could be passed to a function of type f :: [a] -> a but not to a function of type f :: Eq a => [a] -> a ? Widener ( talk) 10:32, 19 February 2011 (UTC)
C++ concepts were certainly inspired by Haskell type classes, so might not be so useful as examples. I agree the analogy with Java interfaces isn't perfect. The main point is that interfaces and type classes both give you a way to have the same operation supported on multiple types with separate implementations per type. I'm not sure what you mean about the choice of implementation being up to the caller. It's true that Haskell typeclasses are "open", which means you can declare a type to be an instance of a class anywhere in the program, if it isn't already one. But I'm pretty sure if you try to do it in more than one place, the compiler will complain. 71.141.88.54 ( talk) 07:05, 20 February 2011 (UTC)
Hello,
I have an area of my site which I only want to be accessed via a certain port that is rotated every week, for additional security. Is there any way that I can do this using a file on my server, say htaccess or something of that sort?-- 213.168.117.109 ( talk) 11:25, 19 February 2011 (UTC)
Hi, I am posting this on here and the Entertainment helpdesk as it seems to span both - forgive me if that breaks any rules.
I have some old PC games that I used to play under Win95 and Win XP but Win 7 doesn't seem to recognise them - I am now running a 64 bit set-up which probably doesn't help.
My question is, can anyone tell me if I can still buy some of the old games (Monkey Island series; Disc World series; Kyrandia; Gabriel Knight; etc.) but written to run on a modern PC under Win 7? If so, where can I get them?
Hoping you can help. Gurumaister ( talk) 11:37, 19 February 2011 (UTC)
I get this message:
"name_of_the_file/ga.js could not be saved, because the source file could not be read.
Try again later, or contact the server administrator."
212.169.182.73 ( talk) 14:26, 19 February 2011 (UTC)
can i lock a file in a folder in sd card with a software which can run directly with that software without unlocking? I want to do this silently with cmd command. —Preceding unsigned comment added by 202.56.7.131 ( talk) 14:29, 19 February 2011 (UTC)
If two usb storage devices are connected to a computer via a usb hub and you transfer a file from one device to the other, does the data travel via 1st device -> hub -> computer -> hub -> 2nd device, or 1st device -> hub -> second device? 82.43.92.41 ( talk) 16:42, 19 February 2011 (UTC)
Thanks 82.43.92.41 ( talk) 20:25, 19 February 2011 (UTC)
A friend of mine has problems running some games ( Left 4 Dead 2 specifically) so I asked him to download Speccy to get a quick list of all of his specifications, so we could find out what the problem was. This revealed that his graphics card was running at 95 degrees C. Neither of us know a lot about computers, so:
The only thing that's been done to the computer is installing a case fan. The card is an nVidia GeForce 9100. Vimescarrot ( talk) 21:31, 19 February 2011 (UTC)