Feeds

Nutters: there's alternative thinking and just plain oddness

A prize if any of you can tell us what they're on about

  • alert
  • submit to reddit

Security for virtualized datacentres

1.13GHz P3 system DOA

I'm searching for the cooler for my home cold fusion power station.

Could you provide some info where I can buy active cooler you've mentioned in your review: "1.13GHz P3 system DOA By: Andrew Thomas"

Not since early Russian nuclear submarines have we seen so much active cooling.

Your help will be highly appreciated.

Best regards,
Serge




In your The Register article "Pentium 4 to launch in October" you said that the P4 uses 128bit SSE whereas SSE1 is 64bit. That's not true. Both SSE1 and SSE2 use 128bit Registers but with SSE2 it's possible to have two double-precision FP-values in one register instead of four single-precision FP-values

Oliver Schadlich

[Andrew says: smug fucker]




Internet execs the fattest of all fat cats

That sick feeling you get when you hear of the fat cat bonuses is because you're stuck back in Britain, it has nothing to do with the bonuses. Get the hell out, cure yourself of the British disease.

Oh, my mistake you are the disease. Every time I read a loser's article written by your ilk I thank God that I got the hell out of a country with more than it's share of fools who care more about what the other
guy doesn't deserve than getting on with being productive themselves. Never mind about trying to fix it, just keep pulling at the legs of the person further up the ladder Kieren after all you're British.

Cheers,
Angus

[Kieren (trying to understand) says: Yeah, like, whatever]




As much as I love The Register, I can't help but notice that the standard of grammar contained within is dropping very quickly. I am writing this after reading your "Pentium 4 platform re-named" story, which features the following typographical blunders:

"Of course, it (the Pentium4] will be Rambus based for its first nonths." Nonths? Months, surely?

"But an unbiased outsider might want to ask why exactly Intel, majoring on this Netbust stuff, hasn't instead concentrated on its 64-bit Itanic collation."

Netbust or Netburst? Or perhaps that was a pathetic attempt at a play-on-words. Bust, burst, oh, harhar!

"More on this tomorrow, if we're allowed to pose the questins." Questins? Questions.

Also, I am assuming that the word "marchitecture" is a deliberate play on words, however, if I'm mistaken, then chalk up another two spelling errors.

Is it really so difficult to run your stories through a spell checker before publication?

Best Regards,
James Sheridan




[This is the week's best (longest?) flame. Strange that it's about an article written about a month ago. But then peculiar minds work in peculiar ways]

Crackers are common criminals

Take your first example:

"You are a judge. Before you in the court stands a pimply-faced youth with greasy hair and an ill-advised vestigial beard. He stands accused of breaking into several dozen houses and stealing credit card details and address books. The address books were used to identify future properties to burgle and, whilst in each house, he burnt all the personal correspondence he could find." - from Andrew the retard

Let's break this down:

"He stands accused of breaking into several dozen houses and stealing credit card details and address
books." First off, the whole comparison between typing on a keyboard and viewing remote data and
breaking/entering/treaspassing into people's homes is wrong. Not only is the ACT totally different (if you had any CLUE about hacking you would understand), but the ACTIONS in specific are not comparable. "stealing credit card details and address books" - in the physical sense means you pick them up and they are in your possession now and not the owner's. This is not true in hacking, where it is like taking a photograph of the address book without touching it. FURTHER, the *intent* and *process* are totally different - in physical theft the jerk who is doing it wants the cards/addressbook/whatever they *want it*. In hacking if someone gets this info it is *incidental* and they usually could give a fuck less. They don't see a shiny little card with a visa logo and think of spending money - they see a plain DATA FILE and think - "how fucking lame": -rw-r--r-- 1 oracle oracle 5462489 Feb 9 2000 database.mdb

"The address books were used to identify future properties to burgle." This is the only semi-accurate statement you make - and not because of the bullshit "burgle" comparison, but because of the exploitation of trust relationships.

"Whilst in each house, he burnt all the personal correspondence he could find." Idiot. This almost never happens - even if you listen to the brain-dead media you still couldn't get this wrong - hackers don't destroy data! Where did you get these wildly incorrect views? Did you watch the movie Hackers and saw the scene where stupid kids "crashed the gibson" and think that makes you an expert? You have publicly humiliated yourself. And your other comparison demonstrates that you have NO CLUE about the Napster issue or the MPAA/DeCSS cases, which you make reference to here:

"Another housebreaker stands accused of a number of break-ins where he stole expensive stereo systems and CD collections. In mitigation, he blames Metallica, Napalm Death and Spinal Tap for making him do it. The reasoning is obvious - if these bands hadn't recorded unencrypted music onto CDs in the first place, he wouldn't have been tempted to pop into other people's houses while they were out and remove them. And he needed the stereo systems to play them on. And the beer from the fridge. And the car to carry it all away in."

First off, you are mixing cases and demonstrate a total LACK OF CLUE. The Metallica issue was a straight-up case of a bunch of tasteless asshole kids bootlegging metallic music using some online service - the service was threatened for facilitating the copying. Encryption had NOTHING to do with it. (neither did hacking)

The second part - the encryption - is your weak/uninformed reference to the DeCSS case. In this case 2600.com was taken to court FOR PROVIDING A **LINK** ON THEIR WEBSITE TO A HARMLESS PROGRAM. Read the court papers - they were never accused of doing anything with the program, providing the program, or any act other than providing a link to it. People who are copying DVD's do not use that program anyway, there are DOZENS of quick and easy ways to copy DVD's and put them on the net and the whole 2600.com legal thing is a complete waste of everyone's time and money.

It is assholes like Andrew that are FUCKING THE UNITED STATES RIGHT INTO THE SHITTER - the next generation will be reading about fucks like him in textbooks "the fools that took your right to LINK TO WEBPAGES ON THE INTERNET" ...

Lastly,
"A hack attack on a Word or Outlook user is surely criminal trespass on their (electronic) property in exactly the same way it is if a burglar breaks into their house. It doesn't matter how easy or hard it is - it's still wrong." Here again you compare sending data to trespass and burglary. How can I describe this clearly.... you are a dangerously stupid fool.

I have lost ALL respect I had for The Register - I once considered it the finest source of "telling it like it is journalism" - but after reading the most idiotic and maliciously stupid article I have EVER READ IN MY LIFE, I will take what I read here with a grain of salt.

Staff: Fire this stupid fuck! He has no clue!

Providing a secure and efficient Helpdesk

More from The Register

next story
Are you a fat boy? Get to university NOW, you PENNILESS SLACKER
Rotund types paid nearly 20% less than people who didn't eat all the pies
Emma Watson should SHUT UP, all this abuse is HER OWN FAULT
... said an anon coward who we really wish hadn't posted on our website
Japan develops robot CHEERLEADERS which RIDE on BALLS
'Will put smiles on faces worldwide', predicts corporate PR chief
Bruges Booze tubes to pump LOVELY BEER underneath city
Belgian booze pumped from underground
Let it go, Steve: Ballmer bans iPads from his LA Clippers b-ball team
Can you imagine the scene? 'Hey guys, it's your new owner – WTF is that on your desk?'
Amazon: Wish in one hand, Twit in the other – see which one fills first
#AmazonWishList A year's supply of Arran scotch, ta
SLOSH! Cops dethrone suspect - by tipping over portaloo with him inside
Talk about raising a stink and soiling your career
Oz carrier Tiger Air takes terror alerts to new heights
Don't doodle, it might cost you your flight
Oi, London thief. We KNOW what you're doing - our PRECRIME system warned us
Aye, shipmate, it be just like that Minority Report
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.