Jump to content

Sensei

Senior Members
  • Joined

  • Last visited

Everything posted by Sensei

  1. ...I think you should knock yourself on the head. Romanticism and positivism are successive eras in literature.. at least in my country.. https://en.wikipedia.org/wiki/Romanticism https://en.wikipedia.org/wiki/Positivism
  2. The Italian version of Wikipedia says something about it: https://it.wikipedia.org/wiki/Romanticismo "The term “Romanticism” derives from the English romantic (from romance, translatable into Italian as “romanzesco,” in the sense of “not real”), which in the mid-18th century indicated those literary genres, such as chivalric novels, that depicted fantastic events within a more or less accurate historical setting. Alongside this early meaning there developed and eventually prevailed in the 18th century that of “picturesque,” referring not only to what was artistically depicted, but especially to the feeling aroused by it.[3 " (translated by AI) Romanticism = unrealistic, emotional, focusing on feelings Positivism = hard-headedness, logical drawing of conclusions, science, etc. etc. Romanticism and positivism were in different countries in different years. Where Romanticism ended in the West, it was just beginning in the East. In fact, this only applies to the “higher-ups.” Because most people in Europe, peasants, townsman, workers, were illiterates.
  3. Sensei replied to m_m's topic in Ethics
    You have a property, and your neighbor has a property. Your neighbor decides to open a pig farm, a poultry farm or a hazardous waste landfill. Restaurant, steak house in a less extreme version. The stench from them will fly to you and make your life unbearable. Your real estate prices will drop. Do you have the right to own your property in a clean environment, or does your neighbor have the right to do what he wants with his land? Your neighbor created a steak house, and made your life miserable with barbecue smells all day and night. Should you make him a dumping ground, and flush out his customers? He will be just as unhappy as you were after making a barbecue 24/7 at his place.. The vast majority of economic initiatives can fall under this.
  4. "A popular theory holds that the Mafia began with the Sicilian Vespers and is an abbreviation for "Morte ai Francesi, Italia Anela!"[47] ("Italy desires the death of the French")." https://en.wikipedia.org/wiki/War_of_the_Sicilian_Vespers On Wikipedia it is mistranslated, as it should be “Death to the French, Italian breathe hard.” IOW, such a combat saying, to warm up the soldiers to fight. The origin of all ancient words is very difficult to determine. Unless you create an acronym for yourself. ps. Soldiers returning from the war, do not have a job, so they begin to commit crimes, and as they were already in one organized crime organization ("the army"), so the hierarchy and organization they have ready.. ps2. Did you try Wikipedia? https://en.wikipedia.org/wiki/Mafia#Etymology "maʿfī (معفي) = exempted. In Islamic law, jizya is the yearly tax imposed on non-Muslims residing in Muslim lands, and people who pay it are "exempted" from prosecution." "maʿāfir (معافر) = the name of an Arab tribe that ruled Palermo.[14][10] The local peasants imitated these Arabs and as a result the tribe's name entered the popular lexicon. The word Mafia was then used to refer to the defenders of Palermo during the Sicilian Vespers against rule of the Capetian House of Anjou on 30 March 1282.[15]"
  5. What did they eat during the trip and right after landing.. ? Two lions and two antelopes sit side by side. And lions waiting months for these antelopes to reproduce before they can be hunted.. Right. Every farmer, even an ancient one, knows that from one hen and one rooster a flock will not be made, because the young males and young females would have to have sex with their mother and father..
  6. In a thread similar to this one,~ ten years ago, I calculated that there is not enough ice/water in the entire Solar System to cover the entire Earth with Himalayas. Also water has to go somewhere after flooding. Did it disappear? The flood, however, is not a myth. It is a real event that took place, which has been embellished and fabricated by storytellers over millennia of passing these tales of the past on to each other For example, it was possible to go from Europe to Britain and Ireland barefoot. The water level was 120 meters lower than today. After the melting of the glaciers that covered the entire world, water flooded the coastal areas. If a similar event happened today and the water surface would rise another 120 meters Paris, Berlin and Warsaw would be under water. Do you know where Paris, Berlin and Warsaw are, right? Practically in the middle of the countries.. Hundreds of kilometers from the coastline..
  7. Sensei replied to Genady's topic in Computer Help
    12 UKP per month... I pay that much per entire year having 200-400 GB/mo of Internet transfer on LTE/5G with physical SIM. But I have to use clever-mode. A regular price here is ~ 5-6 UKP/mo with 200-400 GB limit (13 GB per a day). You can watch movies in Full HD all day long. If this is the price for VoIP alone, without the Internet, which you have to pay for yourself separately, then these prices in the UK are awful..
  8. Sensei replied to Genady's topic in Computer Help
    Virtual telephone number (VoIP) or real mobile operator.. ? I have tested very many real operators (i.e. who give physical SIM) in my country, and such a question makes little sense - in different places (where even meters and altitude are important, not to mention tens of meters) there is different signal coverage. It depends on the location of the cell-tower antennas and the height above ground level of our apartment. You simply have to buy one SIM, another SIM, a third SIM, etc. and test the transfer speeds. And move around with a connected phone. Even the timing of doing speed tests matters. In the middle of the night, of course, you get the best Internet transfers. IOW, where one person has a good transfer with a particular operator, there another person has a poor transfer, and vice versa. I know someone who in one location (a complete shithole, flyover) had about 600-700 MB/s in 5G.. In the same location I had 50-60 MB/s on 4G/LTE. To test Internet speed we use https://www.speedtest.net Have you tried it? Run a test on your fiber Internet (if you have one) and on your cell phone (don't install their app, even if they ask! it's unnecessary) and take screen-shots. Walk around the city doing speed tests. You'll see how they change.
  9. Sensei replied to Genady's topic in Computer Help
    @Genady It's hard to understand what you actually want from us. If you want to keep your current phone number that Skype assigned to you, then you should contact Skype Support/Microsoft Support and ask them if it will be possible to transfer the number to another carrier or not. Because if not, then you have no choice but to buy a new SIM, or a new eSIM, or buy some kind of virtual number. And then distribute to your contacts before Skype one shuts down. On Android phone with Termux you can do this with a script (if you have hundreds/thousands of numbers in your contact list).. Google "phone number transfer procedure united kingdom" https://www.google.com/search?q=phone+number+transfer+procedure+united+kingdom In different countries, the transfer procedure may vary. But since here we have US company vs UK country, it may not be possible at all.
  10. I get the Wikipedia article about the book. The author died in 1982, so there is no concern that it is our OP simply advertising his/her book. https://en.wikipedia.org/wiki/Philosophy:_Who_Needs_It There is only one wise philosophical phrase worth remembering: https://en.wikipedia.org/wiki/I_know_that_I_know_nothing
  11. The difference is 0.556 MeV/c2 = 556 keV/c2 https://en.wikipedia.org/wiki/Beryllium-10 (on the right properties panel) (slightly more than one electron mass ) https://en.wikipedia.org/wiki/Isotopes_of_beryllium https://en.wikipedia.org/wiki/Isotopes_of_boron 10.01353469 u - 10.012936862 u = 0.000597828 u * 931.494 MeV/u = 0.556 MeV The mass spectrometer does not distinguish by the difference in mass, but by the difference in mass-to-charge ratio. https://en.wikipedia.org/wiki/Mass-to-charge_ratio "This differential equation is the classic equation of motion for charged particles. Together with the particle's initial conditions, it completely determines the particle's motion in space and time in terms of m/Q. Thus mass spectrometers could be thought of as "mass-to-charge spectrometers". When presenting data in a mass spectrum, it is common to use the dimensionless m/z, which denotes the dimensionless quantity formed by dividing the mass number of the ion by its charge number.[1]" 10.01353469 / 4 = 2.5 10.012936862 / 5 = 2 For this reason, a beam of fully ionized particles in a strong magnetic field deflects differently and hits the detector at a different location.
  12. Sensei replied to Genady's topic in Computer Help
    A version of the secure channel via SSH (data transmission is encrypted): The second (rightmost) client is logged in via SSH and has direct access to the server's local port 2345. The first client is logged in via SSH, but has access via local machine port 1234 which only goes (forwarded) to the server via SSH (the -R parameter causes reverse port forwarding/reverse tunneling)
  13. Sensei replied to Genady's topic in Computer Help
    ..but creating your own proxy server and establishing a connection from one client to the other client is easier than downloading and installing some 3rd party communication application... See: It took maybe 15 seconds to set everything up and running.. ps. On Kali Linux you don't need to install any application. On some Debian-based distributions (Ubuntu, Mint) you can do sudo apt install socat (it's a versatile general networking tool). ps2. It can be configured with the socat itself.
  14. I am in such a position, I don't have to believe.. ..you (not personally, plural) keep saying that people making extraordinary arguments have to back up them by extraordinary evidence.. and when it happens to you, you run away like a wounded lion.. ..because these are just lies.. I for one am convinced that the sole purpose is to intimidate the owners of other social media that the same thing could happen to them.. Durov can only admit that he did not want to give access to the governments of European countries and USA to spy on all people who use Telegram (as Facebook, Twitter and others do). The aim is to make backdoors to all IT systems so that email passwords do not have to be hacked, but simply IT companies themselves give/make access to their data voluntarily ("under pressure from “the authorities”). (If the government has a backdoor, everyone has a backdoor) https://pl.wikipedia.org/wiki/Anti-Counterfeiting_Trade_Agreement In ACTA, the whole anti-piracy thing is just a bunch of bullshit designed to obscure what the law was all about (as with the Patriot Act).. IOW, remote access to all phones and all computers from anywhere at any time at will (just like me).. How to create a universal backdoor to all IT systems so that no one will notice? (except God ) ? Force all IT companies to make their users provide their telephone numbers during the registration, verification process, etc. The user logs in normally via e-mail/nickname and password (it does not matter how long or complex it is). When government agents want to log in, they approach the client at night, jam his/her cell phone, and the SIM doesn't work.. And in the meantime, his/her duplicate SIM works elsewhere.. and they log in via phone with a one-time password sent via SMS to that cell phone...they get a code and have full access to everything that required F2A.. The purpose of this F2A was to simply have a backdoor to all your data. https://en.wikipedia.org/wiki/Multi-factor_authentication A transmission from a duplicate SIM card is indistinguishable from a transmission from a real SIM card. The SMS code has been sent. Signed into the network and access granted. You don't have to ask for permission every time you want to read the victim's data. You don't have to ask the judge etc. etc. If you can get the data, you (they) can send it too.. And by downloading/uploading anything, you can look like a criminal.. No one can prove it's not you. A duplicate SIM card is indistinguishable from the real one.
  15. I can have the web server on my phone and clear it anytime if I want. I described how to configure it in this post:
  16. Unbelievable things happened here.. I did not expect that someone here is a supporter of surveillance and hacking into computers and cell phones of all people in the world.. The job of the U.S. postmaster is to open all the mail and all the letters, and make copies of what's in those letters, and close those mailings to pretend they haven't been opened? ..methinks you have understood nothing.. So you can not prove the truth of your words that Telegram (or any other social media portal) was used for such activities.. All your references to the media and these media to other sources, and these sources to other sources, simply do not have any solid and confirmable basis in the real world. There are now about 195 countries in the world. With which of them the IT company should cooperate? What would be the criteria for accepting certain law enforcement agencies from certain countries and rejecting them? An email comes to you (IT company owner) from, say, Guatemala, and says that some guy named Tom, and surname Swanton, is suspected by them, because he did something, *** knows what, sent a picture of a naked child, for example, or something like that.. What is IT company support team supposed to do with such an email? Replace Guatemala, with Paraguai, North Korea, France, Sweden, Israel, Norway, UAE/Abu Dhabi, or whatever... As a social media operator, how are you supposed to verify if this is a real email from the government of this country from a request from some jerk who is impersonating it? It doesn't matter if it's an e-mail or if it's real mail. Anyone who has a child is guilty of registering pedophile videos.... Everyone who has a child takes pictures of their child. There was a situation here where someone took a picture of a child, took his own face, put it together and was convicted of possession of child pornography. Only it was he himself who was in the photograph.... The best part is that this person was in prison. In prison he had a computer that was given to him by the prison guards, and they gave him his photos, and they gave him photos of some children (they were not naked at all). He edited them himself (according to the prosecution) in Windows Paint, so he cut out himself sitting naked and pasted on the child's head or something like that. And on that basis they convicted him of possession of child pornography. Except he was naked on these photos..
  17. If you go from England to the normal world, you switch from foots to meters, from yards to kilometers and so on. Does it count? and I almost forgot: and from left-hand traffic to right-hand traffic.. btw, this is called unit conversion.. ps2. You are searching for this: https://en.wikipedia.org/wiki/Planck_units
  18. What is the short version of your statement? If someone uses the word "ChatGPT", I'm already sick of reading the rest.. Why should I waste my time on nonsense? ps. The source/reference is reddit? Google search is too stupid to find the right phrase to name what I wanted to say, and I don't want to swear..
  19. You make the erroneous assumption that all his voters are as aware as you are.. It's just that most of them don't have a clue where the various states of the US are.. You can't be that stupid to vote for a rapist.. They haven't even seen the film in 2016.. His constituents live in their information bank, to which information from your information bank (and vice versa) is not allowed to enter. From what I've seen on, my locals who live in the US, and voted for this Russian sockpuppet, the only thing they care about is that it will reduce their taxes. Foreign policy? These losers don't give a damn about it! Climate policy? These losers don't give a damn about it! That's how to know losers that the only thing that turns them on is more money in their pockets..
  20. ..and do you believe (buy) such lies.. ? Show me public posts, threads, groups, etc. about child pornography on Telegram. Provide the URL to such content on Telegram. The mailman's job is not to check every package before it is delivered to make sure it does not contain illegal materials.. If two child rapists make two accounts on SFN, and later send PM ("private messages") between each other, should Dave, Swansont, Phi For All be arrested.. ? You seem to say 'yes' to such approach..
  21. This is a top secret message that should cause hallucinations.. :) He has more such gestures in his library.. https://cdn.theguardian.tv/mainwebsite/2017/05/25/170525macrontrumphandshake2_desk.mp4 Src: https://www.theguardian.com/us-news/2025/feb/28/donald-trump-body-language-keir-starmer-us-president ps. By the way, he forgot to say “nice to meet you, Mr. Governor of France”. ps2. There is even study about his gestures: https://www.google.com/search?q=trump+gestures
  22. Can you run in the terminal: dd if=/dev/zero of=file bs=1MiB count=1024 oflag=direct,sync status=progress or sudo dd if=/dev/zero of=file bs=1MiB count=1024 oflag=direct,sync status=progress (for example, in your home directory) ??? Make screen-shot or copy'n'paste result here.. Then rm -rf file when you are done, 25 GB is definitely not enough for modern standards.. Where did you get this HDD from? It's doubtful that it's an SSD drive.. The easiest way to solve the problems is to buy a 2.5” SSD with a capacity of 120 GB, for example, on eBay. I am getting such 120 GB SSD here, used one for $4 (four dollars). A brand new 120 GB is for $14 (120 GB is the lowest size sold now) According to the chart, most of the data is in system libraries. It is not clear which libraries are used by which applications. If you remove them, some applications may stop working.. $4 isn't much (unless you live in Africa, which I'm sure you don't). At this price you will get a new 120 GB drive that will have ~ 5x more capacity than what you have at the moment.. Looking at the specs of the T430s in 2012 they were sold with 128GB - 180 GB disks the lowest version.. So what happened? https://psref.lenovo.com/syspool/sys/pdf/withdrawnbook/thinkpad_t430s.pdf The entire T430s used one with 180 GB SSD is for $38 here. To remove the application, use sudo apt purge Read the article: https://askubuntu.com/questions/187888/what-is-the-correct-way-to-completely-remove-an-application Try also sudo apt-get autoremove
  23. Nonsense. If the authority steps in and says to IT company “give me all your data between X and Y” or give me all the data of “X” (the client).. It's all a matter of IT. Because you have no idea how it is all implemented internally. The social media server should only be a proxy between two parties talking to each other, when they do a private correspondence, not a backup server of any data. It's even desirable for an IT company not to make backups of transmission, regardless if it is encrypted or unencrypted, because it means less data has to be stored on disks, which means lower costs. Your point of view on this issue depends on your point of standing. As if Trump ordered Telegram/FB/X etc. to give data of private conversations of Kamala Harris, Biden, or your own, you would be outraged and screaming about authoritarian inclinations of a dictator-to-be/dictator. When this happens to someone else, your point of view suddenly changes 180 degrees and you suddenly defend the other side.. In the old days, when people regularly used e-mail rather than webmails it was the e-mail program that downloaded data from the POP3/IMAP server and deleted it later (POP3 DELE [mail-index] command https://www.rfc-editor.org/rfc/rfc1939.html ). The data disappeared from the server! And now you have the government stepping in and telling the IT company hosting the mailboxes and forcing them pretend to delete the emails while internally storing them (just in case gov step in and want them in any time in the future)..A user can't access his/her messages after deleting them, but the government has access to them. Crazy. I can see that you like such pathologies when they are done by those you consider “good” and if it was done by Trump and his team you would immediately be outraged.. We have several things here: 1) Intercepting the future correspondence of anyone the government wants to. 2) Reading past correspondence already carried out (which may be impossible to do if the IT system was not designed for it and didn't do it in advance). 3) Introduction of backdoors to read future messages. Destroying your own Internet security of your server at the behest of some government.. This is simply hacking on behalf of the government of its own clients.. Durov didn't want to do it on behalf of the Kremlin, so they stole his company and fired him from the company and he had to flee the country. And now he didn't want to do it at the behest of Western governments and they locked him up in prison. He was/is competition for Musk, Zuckerberg, Brin and Page. He didn't want to comply and spy on his clients at the behest and order of the government, so they shut him down. ..interesting that you wonder why all the billionaires stood behind POTUS at the inauguration and kissed his ass..
  24. The arrest occurred because the IT programmer refused to create a backdoor for his own security systems.. A Kremlin mafia gang took over his “Russian Facebook” in 2015: https://www.businessinsider.com/the-founder-of-russias-facebook-explains-how-the-kremlin-took-his-company-away-2015-5?IR=T Now the French courts, influenced by politicians, are attacking him after he was exiled from Russia..
  25. @TheVat You clearly have no idea what we're talking about. Or you pretend you have no idea.. We only have two options: 1) end-to-end encryption (and no way to guess what people are talking about, without hacking their devices) or 2) full surveillance (due to the ability to tell what people were/are talking about). Nobody talks about child porn. This is about whether the social media IT company has (or has not) access to anything you (and anyone else on the planet) are talking about in a private message. If you're having an affair with a woman, Google and Apple will be the first to know about it, long before you tell your friends and your wife is the last to know. If you have end-to-end encryption, they (Google/Apple/X/FB etc) don't know. If you don't have end-to-end encryption at all times (no opt-in/opt-out), they know. If I am creating an application, a communications application, that encrypts everything a person says on their computer, and then the encrypted data is transmitted. The social media operator has no idea what this data is, so no government can ask the social media to disclose it. Social media has no idea what they are talking about. It's encrypted, encoded, compressed, whatever. Asking to reveal a private transmission by social media operator between X and Y makes no sense. This is end-to-end encryption. There is no child exploitation or serious crime.. ..you don't know what people X and Y were talking about.. ..the data are encrypted and court nor social media operator has no access to it.. If you lost your phone and someone found it and stole it, Google knows who stole it by name and surname and where that person lives. the police don't know this. the government doesn't know this. And Google knows. (if you registered/signed in to a Google account on this phone) What trolling? You're the one trolling. Read Wikipedia if you don't understand what we're talking about: https://en.wikipedia.org/wiki/End-to-end_encryption This is the same (equivalent) situation as the "USA Patriot Act" (which has nothing to do with patriotism). https://en.wikipedia.org/wiki/USA_Patriot_Act Fox News or other extremist TV reporters ask people "do you support The Patriot Act?" They have no idea what the act is about, but the name is constructed in such a way that you can't say you are against it, so they say they are for it.. Are you for or against "the act to combat child pornography"? How can you say no to something like that? In that law you can insert anything that literally makes you a slave.

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.