Security and Obscurity

If you do not know the password but know how to use the password to gain access to something that was secured using this password, then this is security by obscurity.

On the other hand, if you know the password but do not know how to use the password, then this is obscurity by security.

(Sources of inspiration: The Butterfly DreamCategory Theory’s reversal of rows.)

Nandor's Exhaustive Chemical Words Pages

Few days ago I wrote about pangrams and today I saw in Slashdot another way to play with words – build them from chemical symbols. I think it would have been more interesting if chemical formulae and chemical reactions could be used rather than just chemical symbols. However I do not see any competitor to Perl Poetry.

One goat kid, one goat kid

One who knows?
One I know.
One world.

Two who knows?
Two I know.
Yen and Yang. Fractal duality.

Three who knows?
Three I know.
The basic linguistic concepts of subject, verb and object. The IDF tradition of dividing everything into three parts. The RDF triplet for linking two concepts together.

Four who knows?
Four I do not know.
Four only Arthur Clarke and his story-whispering extraterrestrial ghosts know.

Infinity who knows?
Infinity I know.
Infinite is the world.

The Un*x operating system version numbers

The small box titled Can’t tell the players without a program in the Web page discusses the ordering of the version numbers of the Un*x operating system. Those version numbers are ordered in a logical sequence. I have told you this three times. What I tell you three times is, by definition, True.

Yes! We have no bananas!

Yes! We have no bananas! Also, you can have both tea and no tea. However, you will be requested to leave your common sense to the loving care of your spouse.

Recently, there was a discussion in the Israeli Python mailing list about teaching the concept of a null string to schoolchildren in a Python course. The surprising thing is that in the world of Python and other programming languages, you can have both a string with characters and a string with no characters (“null string”), as long as they are assigned to different variables.

Few years ago, there was a Linux installation party in an obscure Israeli city. The compulsory trashcan got the label “/dev/null” (it was my own proud hand which wrote those fateful letters), and when it was emptied, someone took a shot of its location and labelled it as “/dev/null unmounted”.

The Philosophical Story of Beatrice Satmary

This is not her real name.
She does not exist.
She cannot be found in the Internet.
She does not live in Hungary.
The image in the old photo over there is not really her.
Santa Claus and the Tooth Fairy are her classmates.
Her name will be whispered by at least three participants in the long-waited for First Contact.

My blog is worthless :-(


My blog is worth $0.00.
How much is your blog worth?

After all the years of hard work, sweating blood over articles about Deaf events, writing about my crazy ideas, getting worked up about the social injustice of inaccessibility to deaf people, and the like.

WHAT A BUMMER.