|
Register | Blogging | Today's Posts | Search |
|
Thread Tools | Display Modes |
04-23-2018, 11:02 AM | #621 (permalink) | |||
Born to be mild
Join Date: Oct 2008
Location: 404 Not Found
Posts: 26,992
|
Quote:
I did. Quote:
Quote:
In the words of the late George Michael: one more try. Look at some of the other threads, where people have wildly opposing views. Look at discussions between Frownland and me, or Chula and Frownland, or Elphenor and Occulthawk. Look at the difference: these people discuss things, they don't endless recycle and repeat the same garbage posts and think that that somehow makes or helps their case. I refuse to believe you are this stupid. Can you not understand what you're being told here? Am I wasting my time? ****ing exactly. In a goddamn nutshell. (Case, more like...)
__________________
Trollheart: Signature-free since April 2018 |
|||
04-24-2018, 06:18 AM | #623 (permalink) |
Born to be mild
Join Date: Oct 2008
Location: 404 Not Found
Posts: 26,992
|
The final analysis on Nick1976 I leave to Don McLean:
"They would not listen, They're not listening still: Perhaps they never will."
__________________
Trollheart: Signature-free since April 2018 |
04-24-2018, 02:26 PM | #624 (permalink) | |
ask me about cosmology
Join Date: Oct 2016
Location: Milky Way Galaxy
Posts: 9,014
|
Quote:
__________________
https://www.instagram.com/shhons_meme_agency |
|
04-24-2018, 06:43 PM | #625 (permalink) | |||
Jacob Sartorius
Join Date: May 2016
Location: Dank memes
Posts: 4,033
|
Quote:
Quote:
Quote:
|
|||
04-25-2018, 05:42 PM | #626 (permalink) | |
Music Addict
Join Date: Mar 2018
Posts: 151
|
Quote:
|
|
04-25-2018, 05:56 PM | #627 (permalink) | |
Music Addict
Join Date: Mar 2018
Posts: 151
|
Quote:
|
|
04-25-2018, 05:56 PM | #628 (permalink) | ||
carpe musicam
Join Date: Apr 2009
Location: Les Barricades Mystérieuses
Posts: 7,710
|
Quote:
__________________
Quote:
"it counts in our hearts" ?ºº? “I have nothing to offer anybody, except my own confusion.” Jack Kerouac. “If one listens to the wrong kind of music, he will become the wrong kind of person.” Aristotle. "If you tried to give Rock and Roll another name, you might call it 'Chuck Berry'." John Lennon "I look for ambiguity when I'm writing because life is ambiguous." Keith Richards |
||
04-25-2018, 06:03 PM | #629 (permalink) | |
Out of Place
Join Date: Nov 2011
Location: in an abstract house
Posts: 4,111
|
Yea cause sweet ego stroking solos are everything..
Quote:
Cause it's 2018 man, Kurt is dead. You can count that as a win.
__________________
"Hey Kids you got to meet the MIGHTY PIXIES!" http://www.youtube.com/watch?v=JbRbCtIgW3A |
|
04-25-2018, 06:10 PM | #630 (permalink) | |
SOPHIE FOREVER
Join Date: Aug 2011
Location: East of the Southern North American West
Posts: 35,541
|
Quote:
where and when they are required. Historically, encryption systems used what is known as symmetric cryptography. Symmetric cryptography uses the same key for both encryption and decryption. Using symmetric cryptography, it is safe to send encrypted messages without fear of interception (because an interceptor is unlikely to be able to decipher the message); however, there always remains the difficult problem of how to securely transfer the key to the recipients of a message so that they can decrypt the message. A major advance in cryptography occurred with the invention of public-key cryptography. The primary feature of public-key cryptography is that it removes the need to use the same key for encryption and decryption. With public-key cryptography, keys come in pairs of matched “public” and “private” keys. The public portion of the key pair can be distributed in a public manner without compromising the private portion, which must be kept secret by its owner. An operation (for example, encryption) done with the public key can only be undone with the corresponding private key. Prior to the invention of public-key cryptography, it was essentially impossible to provide key management for large-scale networks. With symmetric cryptography, as the number of users increases on a network, the number of keys required to provide secure communications among those users increases rapidly. For example, a network of 100 users would require almost 5000 keys if it used only symmetric cryptography. Doubling such a network to 200 users increases the number of keys to almost 20,000. Thus, when only using symmetric cryptography, key management quickly becomes unwieldy even for relatively small-scale networks.
__________________
Studies show that when a given norm is changed in the face of the unchanging, the remaining contradictions will parallel the truth. |
|
|