![]() |
Design Flaw in iPhone 4, Testers Say
On Wed, 04 Aug 2010 12:56:46 -0700, John Smith
wrote: On 8/4/2010 11:00 AM, Registered User wrote: Nope, try an external hardware device which acts as a security key for a specific piece of software. A major CAD (computer assisted drafting) software company made that a popular term for its' copy protection. Anyone coming though an industry heavily dependent on such, and working is such a department, would certainly share your view. After VAX boxes and other minicomputers appeared, many types of commercial productivity applications besides CAD tool relied on dongles as security devices. As computers moved to the desktop this did not change. There was even a C-64 accounting application that required a dongle. It was primitive but effective security. This is much the same as the term "Computer Hacker"--used to denote one who is tops in their field; This term was usurped by the news and now in joe-blow-six-packs minds is associated with computer criminal. Their error. Not quite. Journalism isn't the only field where hack writers can be found. Quick and dirty code is often referred to by the author as a being a quick hack. It's an acknowledgement that the code is not particularly elegant or robust, just a temporary solution to resolve an issue or answer a question. If a computer professional describes them self as a hacker today (without using the word hat), it's an admission their skills and training could be better. Calling any computer professional a hack is a insult. The term was coined back in the early 70's Nope, wrong decade. It was coined before CAD existed. Given CAD software has been around for almost fifty years, it appears you're disagreeing with yourself WRT computer dongles. and used to be applied to differing externals plugged in to differing ports of a computer. I guess you learn something new everyday. Apparently not you as you profess to have all the answers already. I don't profess any such thing, you do. I'm not the one who wrote - quote - It is time to end the stone age of electronics! - end quote - and then offered USB devices as the path to enlightenment. |
Design Flaw in iPhone 4, Testers Say
On 8/4/2010 3:30 PM, Registered User wrote:
Not quite. Journalism isn't the only field where hack writers can be found. Quick and dirty code is often referred to by the author as a being a quick hack. It's an acknowledgement that the code is not particularly elegant or robust, just a temporary solution to resolve an issue or answer a question. If a computer professional describes them self as a hacker today (without using the word hat), it's an admission their skills and training could be better. Calling any computer professional a hack is a insult. Absolutely could not disagree with you more. I do all computer languages (Assembly, Cobol, Snobal, BASIC, C/C++, Pascal, etc., etc.), but prefer assembly and C/C++. Only hackers (doctorates) work within my circle. We all enjoy being called hackers, we worked hard to win that title. Anyone in disagreement works for some corporation practicing security though obscurity, i.e. part of the security are dumb-ed down software engineers. Or, is a member of the joe-blow-six-pack club which watches the 11 P.M. news. Given CAD software has been around for almost fifty years, it appears you're disagreeing with yourself WRT computer dongles. Let me cut to the chase, there are four types of dongles, in the context we are discussing. One will plug into a computer port, the other is in my pants, the third type is obsolete, the forth is walking around with similar characteristics to the one in my pants. ROFLOL! I'm not the one who wrote - quote - It is time to end the stone age of electronics! - end quote - and then offered USB devices as the path to enlightenment. I did no such thing. Make a computer a cell phone ... or any damn other thing you wish. USB dongles are the quickest/cheapest route. It takes too much time to keep correcting your errors in text, thinking, etc. Go play with someone else not ... Regards, JS |
Design Flaw in iPhone 4, Testers Say
John Smith wrote:
Absolutely could not disagree with you more. I do all computer languages (Assembly, Cobol, Snobal, BASIC, C/C++, Pascal, etc., etc.), but prefer assembly and C/C++. Only hackers (doctorates) work within my circle. We all enjoy being called hackers, we worked hard to win that title. Anyone in disagreement works for some corporation practicing security though obscurity, i.e. part of the security are dumb-ed down software engineers. Or, is a member of the joe-blow-six-pack club which watches the 11 P.M. news. And yet you come down to grace us lowlife with your wisdom, looking for all the world like an anonymous Troll. You don't get the recognition you deserve, John. How come you're not using your superior skills to implement this system? - Mike - |
Design Flaw in iPhone 4, Testers Say
On Wed, 04 Aug 2010 21:39:53 -0700, John Smith
wrote: On 8/4/2010 3:30 PM, Registered User wrote: Not quite. Journalism isn't the only field where hack writers can be found. Quick and dirty code is often referred to by the author as a being a quick hack. It's an acknowledgement that the code is not particularly elegant or robust, just a temporary solution to resolve an issue or answer a question. If a computer professional describes them self as a hacker today (without using the word hat), it's an admission their skills and training could be better. Calling any computer professional a hack is a insult. Absolutely could not disagree with you more. I do all computer languages (Assembly, Cobol, Snobal, BASIC, C/C++, Pascal, etc., etc.), but prefer assembly and C/C++. You "do" all languages huh? Maybe I should be impressed but I'm not. Reeling off a list of programming languages (with one mis-spelled) says little about depth of knowledge and corresponding skillsets. The list does suggest most if not all of what you do involves procedural programming. Only hackers (doctorates) work within my circle. We all enjoy being called hackers, we worked hard to win that title. Anyone in disagreement works for some corporation practicing security though obscurity, i.e. part of the security are dumb-ed down software engineers. Or, is a member of the joe-blow-six-pack club which watches the 11 P.M. news. Once again you make grand assumptions, your little circle is correct and everyone else is wrong, wrong, wrong. AFA working with a bunch of doctorates, what should be inferred? Both the top and bottom of a graduating class get the same piece of paper. All the document means is the course of study has been successfully completed, nothing more. Given CAD software has been around for almost fifty years, it appears you're disagreeing with yourself WRT computer dongles. Let me cut to the chase, there are four types of dongles, in the context we are discussing. One will plug into a computer port, the other is in my pants, the third type is obsolete, the forth is walking around with similar characteristics to the one in my pants. ROFLOL! It's good you're able to keep yourself amused. I'm not the one who wrote - quote - It is time to end the stone age of electronics! - end quote - and then offered USB devices as the path to enlightenment. I did no such thing. Funny thing, the written record appears to disagree. Make a computer a cell phone ... or any damn other thing you wish. USB dongles are the quickest/cheapest route. Re-read what you've written previously and consider the differences between the "is a" and "has a" relationships. It takes too much time to keep correcting your errors in text, thinking, etc. Go play with someone else not ... Like where I wrote the term dongle was coined in the early seventies and existed before CAD applications? Oh wait you wrote that and I pointed out that the generally-acknowledged first CAD application was produced in the early sixties. I'll give up and will concede that you are indeed a hack programmer. Wear the title well. |
All times are GMT +1. The time now is 07:47 PM. |
Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
RadioBanter.com