-
Posts
611 -
Joined
-
Last visited
Content Type
Profiles
Forums
Developer Articles
KSP2 Release Notes
Everything posted by longbyte1
-
Not cheap for kids. Same deal with Minecraft: parents don't trust online shopping, it's too expensive for a game, blah blah blah. (Same working-class parents who are just now buying a previous generation console for their kids.) And after all that they only get to play the game 1 hour a day on the living room desktop, with all the settings set to low. For adults, perfectly fine. Why not, drop $1500 more to upgrade your rig. After all you need to reach your monitor's refresh rate of 120 Hz right?
-
I agree with Moach. Apple, just like YouTube, puts producers in a position just as inferior as that of the consumers. Bureaucracy is incredible, human contact is virtually nonexistent, very stringent guidelines, and if you have a connection to the inside then you are really lucky... Not to mention that iPads aren't really number-crunchers (aka computers). They just show some colorful squares and phone home based on where you tap, and a GPU in case you want to show some prettier stuff. The rest of the calculations are dependent on the cloud. So you could call the iPad just an interface to a wide variety of APIs. Sure you could "spin off" the main KSP game, but there is no way to cram aerodynamics model, an open world, 23 celestial bodies, an advanced particle system, a full-fledged hangar, and a KSC that doesn't look like something from 0.15. I'm expecting the KSP happy meal to be out by next year..
-
Well Rareden, it looks like you are just in time for the 2000th post! Rejoice! (what, you don't have something celebratory ready for us? )
-
Kerbal Stuff, an open-source Space Port replacement
longbyte1 replied to SirCmpwn's topic in KSP1 Mods Discussions
Some ideas in my head: api.kerbalstuff.com (useful because it can control request limits without completely blocking access to the site) cdn.kerbalstuff.com (image cache, etc.) blog.kerbalstuff.com (something simple, WordPress or a quick hack) status.kerbalstuff.com Less intelligent ideas in my head: [your secret easter egg].kerbalstuff.com www.www.kerbalstuff.com (bet the cert doesn't cover this ) users.kerbalstuff.com (useful for support mailing lists, so that email gets redirected to project managers. Just an idea.) ftp.kerbalstuff.com (I mean even Microsoft has an FTP, right??) gopher.kerbalstuff.com (-1 rep) tracker.kerbalstuff.com (in case you want to P2P download your mods..) That's it for now... -
If this doesn't take off, I think Google will consider shutting this down during spring cleaning time. (But a lot of good innovation gets thrown out the window too... )
-
It's available at gaming.youtube.com and it categorizes by game, and includes both live and recorded sessions of games. Maybe KSP streamers will try it out one day? Hopefully their lists will not expand as people come to see other alternatives to Twitch. Even though Twitch is the best game streaming website in the world :kappa:
-
Doesn't the scene come out extremely distorted when it's ripped?
-
RAID is for fault tolerance; it will protect you from physical drive failure. I have a very old server (still in use) that is set up in RAID 5. It's saved the server a couple of times, but since it is old, you can only find up to 75 GB drives. However, RAID will not protect you from software failure.
-
How did a thread about malware get derailed to backups..? Everyone knows you should make backups. But, we need to stop treating Windows/Linux backups as merely disposable iCloud backups. Please try to understand that not everyone can afford the money to install personal datacenters in their homes or the time to wipe a disk and start afresh. There must be a middle ground between keeping browsable drive backups in one's home and disposable drive images stored in the cloud. I can't go about restoring everything trying to look for an old file, neither can I waste terabytes upon terabytes a month for a service that only brings out the catches once you make your first backup.
-
Many thanks for the info, cantab. After one of your workstations got infected, did you ever find out later which executable carried the payload or how the user got it? I read from one victim that he opened what looked like a PDF file but actually was .exe format (but common suffixes are hidden by Windows Explorer). Another precaution to take is to disable hiding extensions in files to make sure they are not in fact executables. I wonder if these executables that carry the payload are Authenticode signed, so that the warning before opening an unknown file never shows... My planned response to when I am very certain that a virus has begun its work destroying my computer (and the AV didn't pick it up) is to first pull the plug on the Ethernet. If there is still hard drive activity, try to open Task Manager, but if the virus is killing Task Manager, shut the computer down immediately (hold the power button or just unplug it!) and run off WinPE until I can identify the virus and assess damages.
-
The private key is stored on the criminal's server. When you pay, CL will give you a key. This does work; cybercriminals are cunning and quite honest as well. When the police shut down the original CryptoLocker operation, the hard drive containing all of the private keys was found, and a service was set up to retrieve them at no cost. You can find some CL archives on Gibson Research Corporation's website. Obviously you can hardly reverse engineer it without IDA or OllyDbg. Packet capture will of course show some periodic HTTP requests like getting a public key from the server and checking if the private key is available from the server for decryption.
-
Actually, paying the ransom does give you a key to decrypt the files, given that you didn't get infected with CryptoLocker from another malware that downloaded it and put another layer of encryption. The man who created CryptoLocker did not devise this method of encrypting files. People all over the world use RSA-2048 public/private keys knowing that it is extremely difficult, if not virtually impossible, to crack such a system. "Sufficient time" would be in dozens of years given a present day supercomputer and a research team devoted to breaking it. The only way to decrypt, then, would be to find the hard drive that contains all of the private keys and try to fit each one into a file and see if it works. Cloud companies already use encryption in their services by default. But yes you are right, people should not depend on having to pay terrorists ransom money to get their data back.
-
I'm subscribed to a mailing list for a backup software and there was this strange question asked: "Is this software safe against ransomware?" I replied that ransomware that could destroy remote backups, or even ransomware in general, was pretty rare if you browsed safely. But the same person made another thread called "restore backup after CryptoLocker 3.0." It's been a long time since I've heard about ransomware being developed and used against present-day systems. And to be honest, that's pretty scary. Since the MS-DOS times, ransomware has done the same thing pretty much: encrypt all of your data and make you desperate to have it decrypted. But imagine that with modern technology: 2048-bit RSA plus Tor/Bitcoin to keep the payment process completely anonymous. CryptoLocker was supposed to have been shut down a few years ago, but variants like this one seem to have popped up. My questions, since I can't find anything about this variant: How is it being propagated? The original one was through a botnet, and the whole operation got shut down spectacularly by the police. Does it actually destroy backups such as those in UNC shares? What about shadow volumes? Is it possible to pay the ransom through credit card and then do a chargeback? If you speak with the credit card company first you might be able to come up with a plan so that they don't shut down your card for illegal activity. I haven't been infected by malware for quite a long time, but this one poses a real threat to my home server or desktop if it ever gets to either one of them, as my home server has limited storage and I must move my old backups offsite before I can begin a new set of "real" backups.
-
I seem to have divided by zero...
longbyte1 replied to twidlerofthumbs's topic in KSP1 Mission Reports
Fission mailed. Remember Snake, you can always troll a second time. -
Well hopefully we'll have superseded NTP with GTP (Galactic Time Protocol) through FTL/IP or something like that.
-
Well, all you'd have to do is replace each part folder with the old part models right? Or am I missing something crucial here?
-
Well, you have the elementary sepatron+decoupler missiles, which are very cheap and fly fast toward your target. There's the fuel tank with wings and a tiny engine, or just an SRB with wings. You can latch onto enemy ships with the Klaw (the asteroid grabber) and sap all their fuel or even deorbit the ship. Watch Danny2462 and you will get... ideas.
-
I believe he has said time and time again that he is reluctant to render crafts with mod parts because of the need to download all the stuff associated with your craft.
-
Have you read up on displacement using particle systems or a smoke modifier? It would make those jet takeoff scenes look really cool. You should also experiment with manual smoke using a texture to displace a very simple mesh; they would make the smoke for the big launches very high fidelity without having to fiddle with generated smoke.
-
Very nice! One bit of criticism is that the trees look really ugly. How does the image look without the ones at the left?
-
Excellent work! It needs another pass of smoothing though, as you can see the angle velocity deltas should be interpolated as well. (It's funny how we still haven't gotten this right yet)
-
Useful Reactionsâ„¢ - Smoke-free hydrogen combustion
longbyte1 replied to Gustavo6046's topic in Science & Spaceflight
Extracting ozone for rockets might murder our planet. -
Starwhip's Renderfarm [Stock Craft Requests Open]
longbyte1 replied to Starwhip's topic in KSP Fan Works
Looks like he outright posted the wrong thing, as he edited his post to a different request. -
Don't forget to remove SecuROM once you're done. People on Reddit are suspecting that the entirety of Agar has been sold off to Miniclip. First the mobile app shows the publisher to be Miniclip, then the website has Facebook integration and a ToS which were not present when Agar was first created. Not to mention that it claims Miniclip's app to be official. For a while now, Redditors have been "hating" on Zeach for being overly secretive about his future plans for Agar. Really, the guy just does whatever he wants, pipes in whenever he wants. For example he never responded to an AMA (Ask Me Anything) request.