Hacker News new | past | comments | ask | show | jobs | submit | classic959's comments login

If you're plotting primes, all the coordinates where you're not plotting are non-prime - so every 2nd coordinate will be blank. As will every 3rd and every 4th, 5th, 10th, 11th. etc etc.

Surely that's where the pattern comes from.


I think relying on the internet to have a trust mechanism built in is a bit like relying on our road-builders to ensure our vehicles are safe.

While the average internet user will just trust the sites and apps they use, there's nothing stopping those who are able from designing/building/using/sharing technology which they can reasonably trust. The building blocks are there (crypto / networking libraries etc.).

When open source software gets outlawed, I'll be worried.


> a bit like relying on our road-builders to ensure our vehicles are safe

And yet there are lots of ways road-builders can design roads so that they're safer.


I drop photos (from whatever device) into a folder on my NAS and they get automatically sanitized of EXIF data, and resized/bordered ready for posting to the internet.

It's simply a cron & bash script on a server that monitors one NAS folder, then drops the output into a second folder where I can pick them up and use them.

It uses ImageMagick & Exiftool.


Using kdenlive for video editing on Linux has served has a good reminder many times to save often.

Cloud and mobile apps are often very good at taking this task away from a user, but it's worth remembering to take responsibility for saving/backing up files that have value.

Even clouds can get blown away some times.


The interactive guide on that page is an effective way to visualise the components in relation to the attacks.

Does anyone know what this would have been built with?


Exactly what I was thinking.

I'd expect it to be quite high (deaths per TWh) while the technology is new or advancing fast, both because the energy production will be low, and because there must be more risk in newer industrial-scale technologies.

Deaths per TWh in Offshore wind vs Onshore wind production would be interesting to see too.


Wow, this comment just got me thinking. If I've got good at taking well composed photos, according to common photography techniques, might they have less of that time-machine, memory-jogging quality? I'd like to have both - maybe I need two sets for photos!


I think this may have been the result of banking malware (e.g. Zeus back in the day) which was hooking OS calls to capture keyboard input and steal passwords. I'm not sure whether the on-screen keyboards would be vulnerable in other ways though.


I have 4 RPi's in frequent use. The one in my kitchen (music player, Pi 2 model B) needs a clothes peg to squeeze the SD card into the reader otherwise it won't boot. So that's a 25% failure rate for me as far as hardware issues are concerned.

It has worked reliably for a few years with the clothes peg though!


I used the 'slug' (NSLU2) to run my first NAS. For me, that was a great introduction to setting up useful linux devices on my home network.

(A wee pang of nostagia there when I saw it mentioned)


Nice, I had two slugs. The community and Wiki were awesome. I eventually ended up adding a page about soldering a USB wireless card on to one of the unused USB headers on one. The other ran my website and an email server.

Happy days :)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: