jeanjq | 12 years ago | on: How to launch and defend against a DDoS attack [pdf]
jeanjq's comments
jeanjq | 12 years ago | on: Predicted market correct last 13 days in row
(1/2)^13 = 1/8192
jeanjq | 12 years ago | on: How the Internet hurts your sleep schedule, productivity and personal life
Headline says one thing; final paragraph says another: "Bottom line? The Internet is quickly changing the way we allocate our time, but there’s no call to panic yet. You might want to stop reading this thing on the Internet and get back to work, though."
jeanjq | 12 years ago | on: Woz Is Unimpressed By Apple’s New iPads
jeanjq | 12 years ago | on: Can I Be Trusted?
jeanjq | 12 years ago | on: Lua: the world's most infuriating language?
jeanjq | 12 years ago | on: Lua: the world's most infuriating language?
jeanjq | 12 years ago | on: A quick look at the Redis source code
Congratulations on the exploring.
jeanjq | 12 years ago | on: Air Gaps
jeanjq | 12 years ago | on: Air Gaps
jeanjq | 12 years ago | on: Air Gaps
jeanjq | 12 years ago | on: Jonathan Ive designs Leica camera for Red charity
jeanjq | 12 years ago | on: Meet the Nest Protect smoke and CO alarm
jeanjq | 12 years ago | on: Meet the Nest Protect smoke and CO alarm
http://www.amazon.com/Kidde-Sentry-Battery-Operated-Ionizati...
Reviews seem good.
jeanjq | 12 years ago | on: Meet the Nest Protect smoke and CO alarm
BTW Why do smoke alarm batteries die at night? Because temperature drops and a weak battery's voltage output drops with temperature.
jeanjq | 12 years ago | on: The cold emails which got me meetings at Twitter, LinkedIn and GitHub
jeanjq | 12 years ago | on: Edward Snowden Q&A
Question: Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.
Pfft. What size RSA keys are unbroken (2 048, 4 096, 8 192)? Is there a backdoor in the ECC NIST P256 (or similar) curve? How many TOR exit nodes does the US government manage and how good are they at in/out correlation?