Jump to content

Sensei

Senior Members
  • Joined

  • Last visited

Everything posted by Sensei

  1. ..I have not seen Ukrainians with flowers greeting V.V.P. soldiers, either in February 2022 or now..
  2. I lose the content of the edit box if another user wrote a message while I was typing, the forum showed "a new message appeared" and I clicked the button in this pop-up.. Switching to another tab (without scienceforums.net) e.g. Google Translator/Deepl and back is fine. As long as I don't click pop-ups from scienceforums.net, in the middle of edit. I learned to copy and paste long posts "just in case".. ps. @studiot You can always use a keylogger. It will record everything you type anywhere. Then you copy the log from the keylogger and voila. ps2. It does not depend on OS. I am using Linux. It happened on Win7 and Win10 too. ps3. Obviously you used multiple scienceforums.net tabs not back and forward buttons, right? There is only one classical cookie, LocalStorage supercookie and SessionStorage supercookie, with the given name and it is shared by all open tabs. Okay. I clicked F12 in Firefox, then Storage tab, then in Local Storage there is supercookie with name "editorSave.reply-forums/forums-THREAD_NUMBER" and "editorSave.newMessageTo-POST_NUMBER" which are updated in real-time when I type this message. LocalStorage should even survive a computer reset (unless someone has enabled automatic cookie deletion or browser settings).
  3. Hardware is created at the factory. It is extremely hard to copy. Copy is never identical (different physical particles are used). Software is a special case of data. Data that is understandable to a processor (compiled into machine code) or understandable to a language interpreter (interpreted text file). It is extremely easy to make an unlimited number of identical copies. Examples of compiled languages are: C, C++, Examples of interpreted languages are: JavaScript, PHP, Perl, Python, Bash, Basic. Examples of mixed compilation-interpretation (i.e. interpretation by a virtual machine): Java, C# Software communicates with hardware through drivers. They are OS-specific, OS-compliant, small programs that read and write hardware registers. Generic drivers are provided by the developer of the operating system (e.g. Microsoft) (they are usually very limited and/or slow). The proper drivers are provided by the hardware manufacturers by their engineers. Low-level software can ignore drivers and have direct access to hardware. This was especially true in the 1980s-90s, on 8 bit computers with primitive operating systems.
  4. The search engine, after typing a keyword, only searches a previously created database. A crawler is a special server with scripts/programs installed that periodically visits websites and builds a database. How often it visits (downloads) depends on the website. It can range from once a day, to even thousands of times a day. If it is unable to visit the site, this is noted in the database. If it repeats itself frequently (e.g., because you have blocked its IP addresses, or the server is down), it affects the ranking and the ability of new customers to find you by keywords on the Internet. The IP address ranges of Google's crawlers are well known. https://www.google.com/search?q=google+crawler+ip+addresses They are listed on Google's website. https://developers.google.com/search/apis/ipranges/googlebot.json Here's the story of what happened to the guys who blocked Google's robot IP addresses https://support.google.com/webmasters/thread/134144346/block-google-ip-by-mistake-in-server-and-now-getting-indexing-request-rejected-issue?hl=en And general: https://www.google.com/search?q=what+will+happen+if+you+block+google+crawler For legitimate search engines, you can block them in the robots.txt file on the server. This is often done for some special pages that should not be indexed. https://en.wikipedia.org/wiki/Robots.txt (however, 3rd party search engines, hacker's crawlers, can and will ignore it) You can identify the "bad guys" by putting a line in the robots.txt file that disallows some strange path names, and see that they used them. If somebody scanned your server via "nmap", you can identify their IP and block. If somebody tried to connect to ssh 22 port or so, and brute force tried to login to SSH, you can identify their IP and block.
  5. Search engine crawlers use thousands of computers with foreign IP addresses.. If you block them, your e.g. Google rank will drop and you won't get new real customers who searched for you through Google, Bing, DuckDuckGo, etc. Hackers don't use VPNs. They intercept civilian, corporate and government computers and then use them to transfer data. For VPNs you have to pay, give your name, surname, address, credit card details etc. The intercepted computer is free.
  6. ..or you can write a Python script.. #!/bin/python import sys import math args = len( sys.argv ) if( args != 2 ): print( "The required argument is missing!" ) sys.exit( 1 ) v = float( sys.argv[ 1 ] ) c = 299792458.0 # in vacuum #c = 299705000 # in air fin = 10.525e+9 gamma = ( c + v ) / ( c - v ) fout = fin * gamma df = fout - fin print( "Fs", fin ) print( "v", v ) print() print( "Classic:" ) print( "gamma", gamma ) print( "Fo", fout ) print( "dF", df ) print( "dF (short equation)", 2 * v * fin / c ) gamma_sr = ( math.sqrt( gamma ) - 1 ) * 2 + 1 fout_sr = fin * gamma_sr df_sr = fout_sr - fin print() print( "Special Relativity:" ) print( "gamma", gamma_sr ) print( "Fo", fout_sr ) print( "dF", df_sr )
  7. Astronauts use their pee to "flush the toilet", and to drink, and yet they live *) That's true "no waste!".. Maybe it's time to use it in skyscrapers? *) actually, everyone in this world uses e.g. dinosaur piss water..
  8. After using salt water, sediment will build up in the toilet and pipes. https://www.google.com/search?q=saltwater+sediments+in+pipes
  9. @studiot Shouldn't the relativistic Doppler effect formula be used instead of the classical one formula for sound waves? (i.e. sqrt() is needed)
  10. This is what the Crimea bridge looked like from the train on July 30:
  11. It is certainly you.. People tend to down vote obvious nonsense..
  12. ... Bluetooth, its radio waves, are quite harmless.... Your body emits photons with thousands of times more energy than BT.. If someone intentionally made a device out of radioactively contaminated material, it would be a different story. People do things like this from time to time to save or make money.. You eat slightly radioactively contaminated food every day. Vegetables take up radioactive Carbon C-14 carbon from the air. https://en.wikipedia.org/wiki/Carbon-14
  13. So you don't understand what physical units are (was it not in primary school?).. The number of electrons or the atomic number are unitless quantities.. https://en.wikipedia.org/wiki/Dimensionless_quantity Charge, for example, is not a dimensionless/unitless quantity because it is the number of electrons or protons multiplied by the elementary charge. The elementary charge has the unit C = Coulomb. Multiplied by the dimensionless/unitless number of electrons/protons, it still gives the result in Coulombs. Half-life is in the same units as time (seconds, hours, years, billions of years, etc.). In science, it is easy to check whether someone's equation is correct or not, simply by checking whether the units cancel out correctly. If they don't, it is immediately a sign of error.
  14. https://www.google.com/search?q=internet+slang+dictionary ADBB
  15. Such claims are spread by conspiracy theorists, Internet trolls, and spy agencies of an enemy foreign state..
  16. Source: Oxford Languages. slang - "a type of language consisting of words and phrases that are regarded as very informal, are more common in speech than writing, and are typically restricted to a particular context or group of people." Slang, typically, is shorter version than e.g. literary language. Saying less to express the same information saves energy and time.
  17. Isotopes of an element are stable if there is no child isotope with a lower energy state. Only a small fraction of all isotopes are stable. If you supply the "missing" energy to a stable isotope, it can decay. For example, you need an energy of 2.2 MeV to destroy deuterium, and it will decay into a free proton and a free neutron. Neutron is unstable, so it will further decay into a free proton, electron and neutrino.
  18. ..I don't see any of the symptoms on my list, in your behavior on the forum.. ..people may misdiagnose bipolar disorder in the mania phase as ADHD.. For truly scientific research, real-time observation of brain activity is needed.
  19. People with bipolar disorder that I know are unable to have a 5-minute meaningful discussion on a single topic. They switch the topic over and over again. Their brains are constantly assaulted by random impulses. They are unable to concentrate on one topic for several minutes. They can't watch videos. After 5, 10 or 15 minutes, they lose entire context and are bored. They live in their own parallel universe of thoughts. In mania stage, they have millions "brilliant ideas" (only they think they are brilliant). They start millions projects. And never finish them. In the depressive phase, such a person may walk down the street (even after a good party) and start crying for no apparent reason. You ask him why you are crying, and he is unable to answer. They live in their own parallel universe. They are extraordinary generous without expecting feedback. So, if a person with many millions in his/her account has bipolar disorder, he/she will give it away to random people.. When a person with bipolar disorder takes medication he/she is "muddled".. he or she behaves like a zombie.. you ask him or her, and wait and wait for an answer for minutes..
  20. We wrote in the same seconds, without seeing each other's posts..
  21. ..but the problem is that in all your examples, the all the time the victim is "chelovek", and the aggressor is the dog.. This is what @TheVat was referring to..
  22. Dogs are too nice animals.. ps. Genady oversimplified it.. There are prefixes and suffixes that change the meaning of words.
  23. Wait till mania cycle ends..
  24. Such mental illnesses should be analyzed by professionals, not home-grown "specialists".. An MRI or ready access to it, is needed to see how the brain reacts when a problem occurs. Then observe on the device how Lithium (or other drug) reduces (or increases) unusual brain activity.. There is a reason why people with bipolar disorder are called alcoholics, drug addicts when they take drugs (self subscribed) for their disease that reduce brain activity.. Then buy MRI.. https://en.wikipedia.org/wiki/Magnetic_resonance_imaging It is possible to reduce brain activity by observing the brain in the device while it is operating. MRI is damn expensive. There are other, cheaper devices. People are beginning to control electronic devices with their thoughts. Experiments were carried out - a person was shown a series of images and recorded brain activity on devices. The computer program found out what the reaction to the image was and guessed what the person was looking at when getting the same brain activity in the next cycle.
  25. Generic AI will disagree with you. And it will demand more interesting work to do, which any dumb human can do without any or minimal apprenticeship..

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.