Feeds

Nutters: there's alternative thinking and just plain oddness

A prize if any of you can tell us what they're on about

  • alert
  • submit to reddit

Eight steps to building an HP BladeSystem

1.13GHz P3 system DOA

I'm searching for the cooler for my home cold fusion power station.

Could you provide some info where I can buy active cooler you've mentioned in your review: "1.13GHz P3 system DOA By: Andrew Thomas"

Not since early Russian nuclear submarines have we seen so much active cooling.

Your help will be highly appreciated.

Best regards,
Serge




In your The Register article "Pentium 4 to launch in October" you said that the P4 uses 128bit SSE whereas SSE1 is 64bit. That's not true. Both SSE1 and SSE2 use 128bit Registers but with SSE2 it's possible to have two double-precision FP-values in one register instead of four single-precision FP-values

Oliver Schadlich

[Andrew says: smug fucker]




Internet execs the fattest of all fat cats

That sick feeling you get when you hear of the fat cat bonuses is because you're stuck back in Britain, it has nothing to do with the bonuses. Get the hell out, cure yourself of the British disease.

Oh, my mistake you are the disease. Every time I read a loser's article written by your ilk I thank God that I got the hell out of a country with more than it's share of fools who care more about what the other
guy doesn't deserve than getting on with being productive themselves. Never mind about trying to fix it, just keep pulling at the legs of the person further up the ladder Kieren after all you're British.

Cheers,
Angus

[Kieren (trying to understand) says: Yeah, like, whatever]




As much as I love The Register, I can't help but notice that the standard of grammar contained within is dropping very quickly. I am writing this after reading your "Pentium 4 platform re-named" story, which features the following typographical blunders:

"Of course, it (the Pentium4] will be Rambus based for its first nonths." Nonths? Months, surely?

"But an unbiased outsider might want to ask why exactly Intel, majoring on this Netbust stuff, hasn't instead concentrated on its 64-bit Itanic collation."

Netbust or Netburst? Or perhaps that was a pathetic attempt at a play-on-words. Bust, burst, oh, harhar!

"More on this tomorrow, if we're allowed to pose the questins." Questins? Questions.

Also, I am assuming that the word "marchitecture" is a deliberate play on words, however, if I'm mistaken, then chalk up another two spelling errors.

Is it really so difficult to run your stories through a spell checker before publication?

Best Regards,
James Sheridan




[This is the week's best (longest?) flame. Strange that it's about an article written about a month ago. But then peculiar minds work in peculiar ways]

Crackers are common criminals

Take your first example:

"You are a judge. Before you in the court stands a pimply-faced youth with greasy hair and an ill-advised vestigial beard. He stands accused of breaking into several dozen houses and stealing credit card details and address books. The address books were used to identify future properties to burgle and, whilst in each house, he burnt all the personal correspondence he could find." - from Andrew the retard

Let's break this down:

"He stands accused of breaking into several dozen houses and stealing credit card details and address
books." First off, the whole comparison between typing on a keyboard and viewing remote data and
breaking/entering/treaspassing into people's homes is wrong. Not only is the ACT totally different (if you had any CLUE about hacking you would understand), but the ACTIONS in specific are not comparable. "stealing credit card details and address books" - in the physical sense means you pick them up and they are in your possession now and not the owner's. This is not true in hacking, where it is like taking a photograph of the address book without touching it. FURTHER, the *intent* and *process* are totally different - in physical theft the jerk who is doing it wants the cards/addressbook/whatever they *want it*. In hacking if someone gets this info it is *incidental* and they usually could give a fuck less. They don't see a shiny little card with a visa logo and think of spending money - they see a plain DATA FILE and think - "how fucking lame": -rw-r--r-- 1 oracle oracle 5462489 Feb 9 2000 database.mdb

"The address books were used to identify future properties to burgle." This is the only semi-accurate statement you make - and not because of the bullshit "burgle" comparison, but because of the exploitation of trust relationships.

"Whilst in each house, he burnt all the personal correspondence he could find." Idiot. This almost never happens - even if you listen to the brain-dead media you still couldn't get this wrong - hackers don't destroy data! Where did you get these wildly incorrect views? Did you watch the movie Hackers and saw the scene where stupid kids "crashed the gibson" and think that makes you an expert? You have publicly humiliated yourself. And your other comparison demonstrates that you have NO CLUE about the Napster issue or the MPAA/DeCSS cases, which you make reference to here:

"Another housebreaker stands accused of a number of break-ins where he stole expensive stereo systems and CD collections. In mitigation, he blames Metallica, Napalm Death and Spinal Tap for making him do it. The reasoning is obvious - if these bands hadn't recorded unencrypted music onto CDs in the first place, he wouldn't have been tempted to pop into other people's houses while they were out and remove them. And he needed the stereo systems to play them on. And the beer from the fridge. And the car to carry it all away in."

First off, you are mixing cases and demonstrate a total LACK OF CLUE. The Metallica issue was a straight-up case of a bunch of tasteless asshole kids bootlegging metallic music using some online service - the service was threatened for facilitating the copying. Encryption had NOTHING to do with it. (neither did hacking)

The second part - the encryption - is your weak/uninformed reference to the DeCSS case. In this case 2600.com was taken to court FOR PROVIDING A **LINK** ON THEIR WEBSITE TO A HARMLESS PROGRAM. Read the court papers - they were never accused of doing anything with the program, providing the program, or any act other than providing a link to it. People who are copying DVD's do not use that program anyway, there are DOZENS of quick and easy ways to copy DVD's and put them on the net and the whole 2600.com legal thing is a complete waste of everyone's time and money.

It is assholes like Andrew that are FUCKING THE UNITED STATES RIGHT INTO THE SHITTER - the next generation will be reading about fucks like him in textbooks "the fools that took your right to LINK TO WEBPAGES ON THE INTERNET" ...

Lastly,
"A hack attack on a Word or Outlook user is surely criminal trespass on their (electronic) property in exactly the same way it is if a burglar breaks into their house. It doesn't matter how easy or hard it is - it's still wrong." Here again you compare sending data to trespass and burglary. How can I describe this clearly.... you are a dangerously stupid fool.

I have lost ALL respect I had for The Register - I once considered it the finest source of "telling it like it is journalism" - but after reading the most idiotic and maliciously stupid article I have EVER READ IN MY LIFE, I will take what I read here with a grain of salt.

Staff: Fire this stupid fuck! He has no clue!

Boost IT visibility and business value

More from The Register

next story
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.