jump to navigation

Sorting Algorithm Animations March 23, 2015

Posted by sandyclaus in Academic Technology, Computer Security.
add a comment

These pages show 8 different sorting algorithms on 4 different initial conditions. These visualizations are intended to:

Show how each algorithm operates.

Show that there is no best sorting algorithm.

Show the advantages and disadvantages of each algorithm.

Show that worse-case asymptotic behavior is not always the deciding factor in choosing an algorithm.

Show that the initial condition (input order and key distribution) affects performance as much as the algorithm choice.

The ideal sorting algorithm would have the following properties:

Stable: Equal keys aren’t reordered.

Operates in place, requiring O(1) extra space.

Worst-case O(n·lg(n)) key comparisons.

Worst-case O(n) swaps.

Adaptive: Speeds up to O(n) when data is nearly sorted or when there are few unique keys.

There is no algorithm that has all of these properties, and so the choice of sorting algorithm depends on the application.

Sorting is a vast topic; this site explores the topic of in-memory generic algorithms for arrays. External sorting, radix sorting, string sorting, and linked list sorting—all wonderful and interesting topics—are deliberately omitted to limit the scope of discussion

via Sorting Algorithm Animations.

Advertisements

Creating a bootable OS X installer in OS X Mavericks September 28, 2014

Posted by sandyclaus in Academic Technology, Computer Security.
add a comment

Creating a bootable OS X installer in OS X MavericksWith OS X Mavericks, you can create a bootable OS X installer which can be used to install the operating system while started from removable media, such as a USB flash drive.

via Creating a bootable OS X installer in OS X Mavericks.

A Bundle of Tor | Linux Journal July 4, 2014

Posted by sandyclaus in Computer Security, NSA.
add a comment

I don’t know how many readers know this, but my very first Linux Journal column “Browse the Web without a Trace”, January 2008 was about how to set up and use Tor. Anonymity and privacy on the Internet certainly take on a different meaning in the modern era of privacy-invading software and general Internet surveillance. I recently went back and read my original column, and although the first few paragraphs were written six years ago, they seem just as relevant today:Is privacy dead? When I think about how much information my computer and my gadgets output about me on a daily basis, it might as well be. My cell phone broadcasts my general whereabouts, and my Web browser is worse—every site I visit knows I was there, what I looked at, what browser and OS I use, and if I have an account on the site, it could know much more.Even if you

via A Bundle of Tor | Linux Journal.

NSA targets Linux Journal as ‘extremist forum’: Report | ZDNet July 4, 2014

Posted by sandyclaus in Computer Security, NSA, Security State.
add a comment

The Linux Journal, a Linux user community website, has been flagged as an “extremist forum” by the United States’ National Security Agency NSA, while its users have been flagged as “extremists” under the agency’s XKeyscore program, according to leaked source code.The source code, which was published this week by German public broadcaster, ARD, also identified at least two German Tor Directory Authority servers — one in Berlin, the other in Nuremberg — as being under surveillance by the NSA.

via NSA targets Linux Journal as ‘extremist forum’: Report | ZDNet.

Google’s Quantum Computer Proven To Be Real Thing Almost | Enterprise | WIRED May 29, 2014

Posted by sandyclaus in Computer Security.
add a comment

No doubt, the argument will continue. But today, researchers at the University of Southern California published a paper that comes that much closer to showing the D-Wave is indeed a quantum computer. USC houses and operates the D-Wave system owned by Lockheed, and the researchers — led by Daniel Lidar, a professor of electrical engineering, chemistry, and physics — say they have at least shown the machine is not using a computing model known as “simulated annealing,” which obeys the laws of classical physics the physics of everyday life rather than the more elusive properties of quantum physics.

via Google’s Quantum Computer Proven To Be Real Thing Almost | Enterprise | WIRED.

Slyck.com – Contact Us February 1, 2014

Posted by sandyclaus in Computer Security, Copyright and Trademark Enforcement, Politics, Privacy, Technology Reporting.
add a comment

AdministratorsThomas MenneckeWebsite Administrator / News Editor / WriterHouseCrowdForum Ringleader and Backroom Specialist?MrFredPFLSurly BastardNews WritersThomas MenneckeForum Moderators/AdminsMrs. 2pHouseCrowdMrFredPFLRenegadeSlyckChucksunnyd

via Slyck.com – Contact Us.

GRC | Security Now! Episode Archive   January 29, 2014

Posted by sandyclaus in Computer Security.
add a comment

TechTV\’s Leo Laporte and I take 30 to 90 minutes near the end of each week to discuss important issues of personal computer security. Sometimes we\’ll discuss something that just happened. Sometimes we\’ll talk about long-standing problems, concerns, or solutions. Either way, every week we endeavor to produce something interesting and important for every personal computer user.

via GRC | Security Now! Episode Archive  .

About Bruce Schneier January 29, 2014

Posted by sandyclaus in Computer Security.
add a comment

Bruce Schneier is an internationally renowned security technologist, called a \”security guru\” by The Economist. He is the author of 12 books — including Liars and Outliers: Enabling the Trust Society Needs to Thrive — as well as hundreds of articles, essays, and academic papers. His influential newsletter \”Crypto-Gram\” and his blog \”Schneier on Security\” are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation\’s Open Technology Institute, a board member of the Electronic Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the Chief Technology Officer at Co3 Systems, Inc.

via About Bruce Schneier.

About the Author — Krebs on Security January 29, 2014

Posted by sandyclaus in Computer Security.
add a comment

Brian Krebs worked as a reporter for The Washington Post from 1995 to 2009, authoring more than 1,300 blog posts for the Security Fix blog, as well as hundreds of stories for washingtonpost.com and The Washington Post newspaper, including eight front-page stories in the dead-tree edition and a Post Magazine cover piece on botnet operators. He was recently profiled in Business Week and by Poynter.org.

via About the Author — Krebs on Security.

Ex-official: FBI can secretly activate an individual’s webcam without indicator light – MacDailyNews – Welcome Home January 9, 2014

Posted by sandyclaus in Computer Security, FBI, NSA, Security, Security State.
add a comment

“The FBI has been able to covertly activate a computer’s camera — without triggering the light that lets users know it is recording — for several years, and has used that technique mainly in terrorism cases or the most serious criminal investigations, said Marcus Thomas, former assistant director of the FBI’s Operational Technology Division in Quantico, now on the advisory board of Subsentio, a firm that helps telecommunications carriers comply with federal wiretap statutes,” Timberg and Nakashima report. “The ability to remotely activate video feeds was among the issues cited in a case in Houston, where federal magistrate Judge Stephen W. Smith rejected a search warrant request from the FBI in April. In that case, first reported by the Wall Street Journal, Smith ruled that the use of such technology in a bank fraud case was ‘extremely intrusive’ and ran the risk of accidentally capturing information of people not under suspicion of any crime.

via Ex-official: FBI can secretly activate an individual’s webcam without indicator light – MacDailyNews – Welcome Home.