Showing posts with label General. Show all posts
Showing posts with label General. Show all posts
Sunday, December 31, 2006
New Blog Launched
I have finished my new blog on http://rekahsoft.org so this my official last post. My Blog's address is http://rekahsoft.org/?q=blog . You will be redirected there in aproximately 10 seconds. Just enough time to say your goodbyes :)
Sunday, December 10, 2006
My Decision
I have decided that i would like to move my blog. I have not found web space yet but i am looking. So far the best i have found is at http://www.networksolutions.com. I have also decided to use drupal for content management. Anyways that was just a quick update...i don't know how long it will take for me to get the blog up and running but it will happen probably in the next few weeks. I have not picked out a domain yet nor do i have web space so it may take a little. I will keep blogging here until the switch is made and the new blog is ready. When the time comes this blog will redirect you to my new blog or give you the option to be redirected. At that time you might want to update your bookmarks and/or RSS feed subscription.
Friday, December 08, 2006
Possably Switching Blog
I have received a comment suggesting that i change my blog because of problems i have been running into like spam and the many bugs in blogger beta. I have not decided yet if i should do this but i am still thinking the idea over. If i decide to change my blog i will buy a domain, web space and use either wordpress or Roller. I really like the idea of having my own domain webspace because i then get more freedom to post files and like i have said i would like to start a podcast sometime soon. If anybody has any opinions of wordpress and/or Roller comment and let me know what you think. Also if you know of anywhere i can get good, affordable, reliable web hosting with a high bandwidth let me know; i also need to find a place to register a domain. Thanks.
Edit: I would like to use opensource software and have found druple. It looks very powerful, reliable and worthy to do the job. If you have any experiance with it let me know what you think. I still have to find hosting.
Note: I have not made my decision yet but i am looking into the cost and how it will be better then what i currently have
Edit: I would like to use opensource software and have found druple. It looks very powerful, reliable and worthy to do the job. If you have any experiance with it let me know what you think. I still have to find hosting.
Note: I have not made my decision yet but i am looking into the cost and how it will be better then what i currently have
Friday, December 01, 2006
Updated my Blog
I have been waiting to update my blog to blogger beta and found out to do so i would have to delete my other blog (TTR Linux) which i gave up on because this is more visited. Today i deleted my other unactive blog and i was able to update to blogger beta. I am still looking around at new features but it is definitly an improvement.
Thursday, November 30, 2006
My Blog has be recieving SPAM comments
Lately my blog has been receiving SPAM comments so i have had to turn on word verification. If it happens to be a bot doing the SPAMing then it will stop it otherwise i will have to turn on comment moderation :( I do not want it to come to this but it might if SPAM comments keep on being posted. So if anybody is doing this please stop, and if a bot is then it isn't going to work anymore :)
Friday, November 24, 2006
Learning - another entry on endless information
I have blogged a couple times on the idea of "endless information" although i have specifically looked at computer topics. Today in my grade 11 university physics class my interest was sparked when we where looking at motion. I was thinking away and then the idea of time travel came to my mind. I knew that Einstein has a theory on the topic so i asked my teacher about Einstein's theory of time travel. He explained to me and i was intrigued and wanted to learn more. I started with google and wikipedia and have found some very interesting, very very abstract theories and ideas (i provide the links at the end of this entry). I am very interested so i am going to look into it more. Specifically i like to see how the future might be when it comes to computers and technology. I was thinking out of the box and thaught of some things i would like to see in the far future; they include:
For your reading pleasure:
Time Travel --> Special Relativity, General Relativity, Grandfather paradox
Teleportation --> Quantum Entanglement, Quantum Measurement, Quantum Teleportation, Quantum feedback
- Life synthesis on other planets
- Teleportation
- Computers that can be controlled with the mind
- Robotics that can make decisions as if it had a human mind
- Holographic computer monitors
- Time travel
- Perpetual motion
For your reading pleasure:
Time Travel --> Special Relativity, General Relativity, Grandfather paradox
Teleportation --> Quantum Entanglement, Quantum Measurement, Quantum Teleportation, Quantum feedback
Tuesday, September 26, 2006
"Un-invention" : imagine
For english i had to write a small essay on what i would "un-invent" if i had a chance and why. And because i picked a topic that is tech related and that some might find interesting i decided i would share it with you...btw i am sorry i am not blogging more regularily but i have been very busy. I will soon let you readers know what i am doing that is interesting in school. Anyways here is my little essay (note this is not tottaly polished; comments are apreciated).
Un-invention
If i were to un-invent somethings i would un-invent proprietary software vendors like Microsoft and Macintosh because they prevent innovation, spread of computer usage throughout the world, and many other things that Open Source can provide. Proprietary indicates that a party, or proprietor, exercises private ownership, control or use over an item of property, usually to the exclusion of other parties (Proprietary). In the case of software that means the source code. Source code is the computer code that makes up an application. The following statement, “Knowledge belongs to the world” (Anti Trust) raises a point about proprietary software versus open source software. Knowledge should not be kept from the world but distributed freely, proprietary software prevents this. Open Source has many positive effects. One is a very fast development cycle. Ubuntu an open source linux distro that is based on Debian linux has a development cycle of 6 months where as Windows has a development cycle that changes from 2 to 6 years!! The reason open source development is much quicker is because other developers can contribute patches and extra code. Because more than one team of developers are working on the code and that outside sources are contributing you get a more innovative product. Also because open source software is free it allows more people to have computer because they can afford a OS (Operating System) therefore spreading computer usage world wide. Over all if there was no such thing as proprietary software then our world would be a cheaper, faster, nicer computer world.
Un-invention
If i were to un-invent somethings i would un-invent proprietary software vendors like Microsoft and Macintosh because they prevent innovation, spread of computer usage throughout the world, and many other things that Open Source can provide. Proprietary indicates that a party, or proprietor, exercises private ownership, control or use over an item of property, usually to the exclusion of other parties (Proprietary). In the case of software that means the source code. Source code is the computer code that makes up an application. The following statement, “Knowledge belongs to the world” (Anti Trust) raises a point about proprietary software versus open source software. Knowledge should not be kept from the world but distributed freely, proprietary software prevents this. Open Source has many positive effects. One is a very fast development cycle. Ubuntu an open source linux distro that is based on Debian linux has a development cycle of 6 months where as Windows has a development cycle that changes from 2 to 6 years!! The reason open source development is much quicker is because other developers can contribute patches and extra code. Because more than one team of developers are working on the code and that outside sources are contributing you get a more innovative product. Also because open source software is free it allows more people to have computer because they can afford a OS (Operating System) therefore spreading computer usage world wide. Over all if there was no such thing as proprietary software then our world would be a cheaper, faster, nicer computer world.
Tuesday, September 12, 2006
Wow...i haven't blogged for a while!!
Sorry i have not blogged for a while...i started school and have been focusing on getting top-grade marks. I will update this post a little later with info about my Computer Engineering classes and the project i am working on which is a FireFighter Bot.
Saturday, August 12, 2006
Endless Information
I am setting some goals for myself for this year and in the future...Here is a list of all the things i would like to acomplish this school year (September to June).
1. Work hard at school and stay on the honor role all year
2. Do the best i can do (give a full effort)
Programming objectives (over the next couple of years)
1. Make sure i know all of J2SE like the back of my hand and make sure i know all the new Mustang API's
2. Learn J2ME and all of its API's
3. Learn J2EE and all the fun stuff that comes along with it.
4. Learn C
5. Learn C++
6. Learn the linux C API's (gtk)
7. Learn the linux C++ API's (gtkmm)
8. Learn C# and Mono
9. Learn some scripting languages like js, perl, groovy, beanshell, etc...
10. Learn Python
11. Keep up to date on all of the langauges and thier API's
It is quite the list but i think it is possable to do...it is a lot of learning but it will be fun :)
1. Work hard at school and stay on the honor role all year
2. Do the best i can do (give a full effort)
Programming objectives (over the next couple of years)
1. Make sure i know all of J2SE like the back of my hand and make sure i know all the new Mustang API's
2. Learn J2ME and all of its API's
3. Learn J2EE and all the fun stuff that comes along with it.
4. Learn C
5. Learn C++
6. Learn the linux C API's (gtk)
7. Learn the linux C++ API's (gtkmm)
8. Learn C# and Mono
9. Learn some scripting languages like js, perl, groovy, beanshell, etc...
10. Learn Python
11. Keep up to date on all of the langauges and thier API's
It is quite the list but i think it is possable to do...it is a lot of learning but it will be fun :)
Wednesday, August 09, 2006
Ignorance Kills
I was googling around looking for something interesting and come across an article called "Is You Son a Computer Hacker?" by Reginald Gibbons. I thaught i would look interesting so i went and started reading... after a couple minuites i was very, very upset because the article was total BS!! After a little bit of thinking i thaught it might be a joke but i found that it was not...i was frustrated by his ignorance in writting about something he had apsolutly no clue about. I will give you an overview of the article with my thaughts on each part.
How to determine if your kid is a Hacker Acording to Reginald Gibbons
1. Has your son asked you to change ISPs?
Gibbons: "If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider."
Me: This is tottal BS...changing to a different ISP is not a sign of becoming a hacker...especialy if you are switching from slow AOL...
2. Are you finding programs on your computer that you don't remember installing?
Gibbons: "Your son will probably try to install some hacker software." ... "Popular hacker software includes 'Comet Cursor', 'Bonzi Buddy' and 'Flash'."
Me: [[Comet Cursor: A program which allows websites to change your mouse cursor when you are on their website to get the full effect of the webpage]]. It is by no means a hacker program AT ALL. You would have to be a complete idiot to think so!! [[Bonzi Buddy: A web enhancing program packaged with various other programs]]...this is just a little app that is packed with spyware/malware/adware that helps you browse the internet...hackers have apsolutly no uses for this program...what are they going to do with it? ask the monkey what to do next? At the end of Gibbons list is 'Flash'...when i say this is was just shocked that somebody could be soo ignorant...Flash has no uses for hackers at all!! All it does is enhance the experiance of internet users.
3. Has your child asked for new hardware?
Gibbons: "Computer hackers are often limited by conventional computer hardware. They may request 'faster' video cards, and larger hard drives, or even more memory. " ... "If your son has requested a new 'processor' from a company called 'AMD', this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well."
Me: First off as a geek i love getting new hardware...not because i am a hacker and am "limited by conventional harware" but because i enjoy getting the best performance from my machine. Gibbons mentions that hackers may request hardware like a faster videocard, a larger harddrive or more memory...A hacker would not prosper by having a faster videocard..it would not effect him at all...most hacking is done through a console unlike most hacker movie show (eg. Swordfish and the hacking GUI). Then he comes to saying that "AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips." This is the one of the stupidest thing i think i have ever heard... [[AMD is the second largest microprocessor producer in the world]] and just because they leave thier processors more open so they can be overclocked easier does not mean they are more hacker friendly. [[Most computers you buy retail now have AMD chips in them, because they are less expensive, and much quicker, thus enhancing the computing experience]].
4. Does your child read hacking manuals?
Gibbons: "There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: 'Snow Crash' and 'Cryptonomicon' by Neal Stephenson; 'Neuromancer' by William Gibson; 'Programming with Perl' by Timothy O'Reilly; 'Geeks' by Jon Katz; 'The Hacker Crackdown' by Bruce Sterling; 'Microserfs' by Douglas Coupland; 'Hackers' by Steven Levy; and 'The Cathedral and the Bazaar' by Eric S. Raymond." ... "If you find any of these hacking manuals in your child's possession, confiscate them immediately."
Me: Sure there are many hacker books on the market...it is an interesting topic. [[Oh man...Programming With Perl? Your son would not like to become a hacker, but rather a coder for a large computer software company or internet company. Thanks, dad, for crushing his dreams of one day becoming a multimillionaire.]]
5. How much time does your child spend using the computer each day?
Gibbons: "If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites." ... "This can take up to eight hours."
Me: Most teens don't spend thier time on the computer using Dos to gain control of other peoples computer...they spend their time playing games and don't harm anything. By the way Dos'ing is more commonly known as 'flooding'. [[DOS'ing usually doesn't take 8 hours, although I can see that on AOL...It'd take 8 hours just to send out that many signals to one system, and more than likely it wouldn't be effective. ]]
6. Does your son use Quake?
Gibbons: "Quake is an online virtual reality used by hackers. t is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school."
Me: Quake is a GAME not a virtual reality used by hackers to train. Train in the use of variouse firearms? It is just a game...a first person shooter...the guns are not real!!
7. Is your son becoming argumentative and surly in his social behaviour?
Gibbons: "As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature."
Me: Just because a child is interested in computers doesn't mean he will become disconnected with the "real world". Hackers are people too, and they function like all other people...just becuase they are hackers doesn't mean they fit the hacker stereo type... Also note that adolence could be effecting thier behavior.
8. Is your son obsessed with "Lunix"?
Gibbons: "BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called 'xenix', which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.
Your son may try to install 'lunix' on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional."
Me: When i read this section i was enraged...Lunix is a usinx based operating system for the commador 64...if your kid is still using one of those you should consider upgrading. First off linux is not an illegal operating system!! Lunix is different from every other example Gibbons gave... the rest use the linux kernel where Lunix has it's own. The linux kernel developed by Linyos Torovoltos is not based on xenix but is inspired by Minix. I have no clue where Gibbons comes up with his facts but i have yet to find one that is true. I have no clue what gibbons was doing when he wrote this article but this section is TOTTAL BS and makes no sence what so ever. [[Break into their stereos? In case you didn't notice when you were setting up your system, you didn't hook your stereo up to your computer...or wait, did you? God knows what happened when you set that thing up. MP3 files are compressed CD Audio files, and are used widely in the daily range of activities. And what's this bullsh*t about not noticing if Linux is installed? IT'S A TOTALLY DIFFERENT OPERATING SYSTEM THAT REPLACES WINDOWS!!! It's impossible not to notice it. It'd be clear as day when your dumb ass couldn't figure out why the f*ck your system had completely changed. And Linux is very easily removed by inserting your Compaq Recovery CD. And just for your info, when you send your computer back to the manufacturer, they're going to just restore it using the recovery CD, and laugh all day because of how idiotic you are.]]
9. Has your son radically changed his appearance?
Gibbons: "If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences."

Me: In the section above Gibbons mentions that the creator of the linux kernel, Linyos Torovoltos is a computer hacker...to the left is a picture of him. Does he meet the description of a hacker acording to Gibbons? No because hes is NOT a hacker. [[I believer you're referring to the ever-growing group of stylists known as "ravers". They go to parties known as raves, and usually are on some form of sedative or the like. Special-K, i.e. Ketamine is highly popular, because it is easy to find and cheap to purchase. It is cat tranquilizer in small doses, and horse tranquilizer in large doses. Nextly, E, or extasy, is the next most popular drug. It is ingested in the form of a pill, and cause people to "roll" at raves, because of the intense lightshows. If your son was wearing raver clothing, more than likely you shouldn't worry about him being a hacker, but rather being under the influence of some drug or another. Nice detective work, Sherlock.]]
10. Is your son struggling academically?
Gibbons: "
If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.
I encourage all parents to read through this guide carefully. Your child's future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously."
Me: Computers help chiI was googling around looking for something interesting and come across an article called "Is You Son a Computer Hacker?" by Reginald Gibbons. I thaught i would look interesting so i went and started reading... after a couple minuites i was very, very upset because the article was total BS!! After a little bit of thinking i thaught it might be a joke but i found that it was not...i was frustrated by his ignorance in writting about something he had apsolutly no clue about. I will give you an overview of the article with my thaughts on each part.
How to determine if your kid is a Hacker Acording to Reginald Gibbons
1. Has your son asked you to change ISPs?
Gibbons: "If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider."
Me: This is tottal BS...changing to a different ISP is not a sign of becoming a hacker...especialy if you are switching from slow AOL...
2. Are you finding programs on your computer that you don't remember installing?
Gibbons: "Your son will probably try to install some hacker software." ... "Popular hacker software includes 'Comet Cursor', 'Bonzi Buddy' and 'Flash'."
Me: . It is by no means a hacker program AT ALL. You would have to be a complete idiot to think so!! ...this is just a little app that is packed with spyware/malware/adware that helps you browse the internet...hackers have apsolutly no uses for this program...what are they going to do with it? ask the monkey what to do next? At the end of Gibbons list is 'Flash'...when i say this is was just shocked that somebody could be soo ignorant...Flash has no uses for hackers at all!! All it does is enhance the experiance of internet users.
3. Has your child asked for new hardware?
Gibbons: "Computer hackers are often limited by conventional computer hardware. They may request 'faster' video cards, and larger hard drives, or even more memory. " ... "If your son has requested a new 'processor' from a company called 'AMD', this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well."
Me: First off as a geek i love getting new hardware...not because i am a hacker and am "limited by conventional harware" but because i enjoy getting the best performance from my machine. Gibbons mentions that hackers may request hardware like a faster videocard, a larger harddrive or more memory...A hacker would not prosper by having a faster videocard..it would not effect him at all...most hacking is done through a console unlike most hacker movie show (eg. Swordfish and the hacking GUI). Then he comes to saying that "AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips." This is the one of the stupidest thing i think i have ever heard... and just because they leave thier processors more open so they can be overclocked esiar does not mean they are more hacker friendly.
4. Does your child read hacking manuals?
Gibbons: "There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: 'Snow Crash' and 'Cryptonomicon' by Neal Stephenson; 'Neuromancer' by William Gibson; 'Programming with Perl' by Timothy O'Reilly; 'Geeks' by Jon Katz; 'The Hacker Crackdown' by Bruce Sterling; 'Microserfs' by Douglas Coupland; 'Hackers' by Steven Levy; and 'The Cathedral and the Bazaar' by Eric S. Raymond." ... "If you find any of these hacking manuals in your child's possession, confiscate them immediately."
Me: Sure there are many hacker books on the market...it is an interesting topic.
5. How much time does your child spend using the computer each day?
Gibbons: "If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites." ... "This can take up to eight hours."
Me: Most teens don't spend thier time on the computer using Dos to gain control of other peoples computer...they spend their time playing games and don't harm anything. By the way Dos'ing is more commonly known as 'flooding'.
6. Does your son use Quake?
Gibbons: "Quake is an online virtual reality used by hackers. t is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school."
Me: Quake is a GAME not a virtual reality used by hackers to train. Train in the use of variouse firearms? It is just a game...a first person shooter...the guns are not real!!
7. Is your son becoming argumentative and surly in his social behaviour?
Gibbons: "As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature."
Me: Just because a child is interested in computers doesn't mean he will become disconnected with the "real world". Hackers are people too, and they function like all other people...just becuase they are hackers doesn't mean they fit the hacker stereo type... Also note that adolence could be effecting thier behavior.
8. Is your son obsessed with "Lunix"?
Gibbons: "BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called 'xenix', which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.
Your son may try to install 'lunix' on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional."
Me: When i read this section i was enraged...Lunix is a usinx based operating system for the commador 64...if your kid is still using one of those you should consider upgrading. First off linux is not an illegal operating system!! Lunix is different from every other example Gibbons gave... the rest use the linux kernel where Lunix has it's own. The linux kernel developed by Linyos Torovoltos is not based on xenix but is inspired by Minix. I have no clue where Gibbons comes up with his facts but i have yet to find one that is true. I have no clue what gibbons was doing when he wrote this article but this section is TOTTAL BS and makes no sence what so ever.
9. Has your son radically changed his appearance?
Gibbons: "If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences."
Me: In the section above Gibbons mentions that the creator of the linux kernel, Linyos Torovoltos is a computer hacker...to the left is a picture of him. Does he meet the description of a hacker acording to Gibbons? No because hes is NOT a hacker.
10. Is your son struggling academically?
Gibbons: "
If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.
I encourage all parents to read through this guide carefully. Your child's future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously."
Me: Computers help childern learn...i am done commenting on Gibbons total disregard to the truth and the facts. [[Well since you bought a new computer, emissions standards have virtually eliminated all radiation by computers, disproving your brain and eye damage theory. Most hackers are very intelligent, and excel in such subjects as math and foreign languages. And for everyone's knowledge, meningitis is NOT A PSYCHOLOGICAL DISEASE!!! IT'S BACTERIAL!!!]]
Note: text enclosed by [[]] is quoted from here
Conclusion:
Answering Gibbons questions:
1. Yes...i have changed my ISP a couple times [i wanted a faster conection].
2. I have flash on my linux laptop (the other programs do not work on linux i believe)
3. Yes i have asked for new hardware for variose computers in my house.
4. Yes i read hacking manuals because they are interesting (The unofficial guide to ethical hacking)
5. I spend many many hours a day on my computer. A lot more than 30 minuites a day...if i had the restriction i would die.
6. I have never played Quake but i have played quake 4 and 3...
7. No...just because i am a geek doesn't mean i do not have a life
8. Yes i love linux :)
9. Sometimes for fun :)
10. I only struggle accademicly when i don't work
So...acording to Gibbons i am a hacker. (Note that Gibbons is using the term 'Hacker' in a foul way. As in breaking the law.) I am not denying that i am a hacker...i will leave it up to you to decide (see this [note the bottom text])
Note: the term hacker takes on many meanings. Some of which are:
1. One who is proficient at using or programming a computer; a computer buff.
2. One who uses programming skills to gain illegal access to a computer network or file
ldern learn...i am done commenting on Gibbons total disregard to the truth and the facts.
Note: text enclosed by [[]] is quoted from here
Conclusion:
Answering Gibbons questions:
1. Yes...i have changed my ISP a couple times [i wanted a faster conection].
2. I have flash on my linux laptop (the other programs do not work on linux i believe)
3. Yes i have asked for new hardware for variose computers in my house.
4. Yes i read hacking manuals because they are interesting (The unofficial guide to ethical hacking)
5. I spend many many hours a day on my computer. A lot more than 30 minuites a day...if i had the restriction i would die.
6. I have never played Quake but i have played quake 4 and 3...
7. No...just because i am a geek doesn't mean i do not have a life
8. Yes i love linux :)
9. Sometimes for fun :)
10. I only struggle accademicly when i don't work
So...acording to Gibbons i am a hacker. (Note that Gibbons is using the term 'Hacker' in a foul way. As in breaking the law.) I am not denying that i am a hacker...i will leave it up to you to decide (see this [note the bottom text])
Note: the term hacker takes on many meanings. Some of which are:
1. One who is proficient at using or programming a computer; a computer buff.
2. One who uses programming skills to gain illegal access to a computer network or file
How to determine if your kid is a Hacker Acording to Reginald Gibbons
1. Has your son asked you to change ISPs?
Gibbons: "If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider."
Me: This is tottal BS...changing to a different ISP is not a sign of becoming a hacker...especialy if you are switching from slow AOL...
2. Are you finding programs on your computer that you don't remember installing?
Gibbons: "Your son will probably try to install some hacker software." ... "Popular hacker software includes 'Comet Cursor', 'Bonzi Buddy' and 'Flash'."
Me: [[Comet Cursor: A program which allows websites to change your mouse cursor when you are on their website to get the full effect of the webpage]]. It is by no means a hacker program AT ALL. You would have to be a complete idiot to think so!! [[Bonzi Buddy: A web enhancing program packaged with various other programs]]...this is just a little app that is packed with spyware/malware/adware that helps you browse the internet...hackers have apsolutly no uses for this program...what are they going to do with it? ask the monkey what to do next? At the end of Gibbons list is 'Flash'...when i say this is was just shocked that somebody could be soo ignorant...Flash has no uses for hackers at all!! All it does is enhance the experiance of internet users.
3. Has your child asked for new hardware?
Gibbons: "Computer hackers are often limited by conventional computer hardware. They may request 'faster' video cards, and larger hard drives, or even more memory. " ... "If your son has requested a new 'processor' from a company called 'AMD', this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well."
Me: First off as a geek i love getting new hardware...not because i am a hacker and am "limited by conventional harware" but because i enjoy getting the best performance from my machine. Gibbons mentions that hackers may request hardware like a faster videocard, a larger harddrive or more memory...A hacker would not prosper by having a faster videocard..it would not effect him at all...most hacking is done through a console unlike most hacker movie show (eg. Swordfish and the hacking GUI). Then he comes to saying that "AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips." This is the one of the stupidest thing i think i have ever heard... [[AMD is the second largest microprocessor producer in the world]] and just because they leave thier processors more open so they can be overclocked easier does not mean they are more hacker friendly. [[Most computers you buy retail now have AMD chips in them, because they are less expensive, and much quicker, thus enhancing the computing experience]].
4. Does your child read hacking manuals?
Gibbons: "There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: 'Snow Crash' and 'Cryptonomicon' by Neal Stephenson; 'Neuromancer' by William Gibson; 'Programming with Perl' by Timothy O'Reilly; 'Geeks' by Jon Katz; 'The Hacker Crackdown' by Bruce Sterling; 'Microserfs' by Douglas Coupland; 'Hackers' by Steven Levy; and 'The Cathedral and the Bazaar' by Eric S. Raymond." ... "If you find any of these hacking manuals in your child's possession, confiscate them immediately."
Me: Sure there are many hacker books on the market...it is an interesting topic. [[Oh man...Programming With Perl? Your son would not like to become a hacker, but rather a coder for a large computer software company or internet company. Thanks, dad, for crushing his dreams of one day becoming a multimillionaire.]]
5. How much time does your child spend using the computer each day?
Gibbons: "If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites." ... "This can take up to eight hours."
Me: Most teens don't spend thier time on the computer using Dos to gain control of other peoples computer...they spend their time playing games and don't harm anything. By the way Dos'ing is more commonly known as 'flooding'. [[DOS'ing usually doesn't take 8 hours, although I can see that on AOL...It'd take 8 hours just to send out that many signals to one system, and more than likely it wouldn't be effective. ]]
6. Does your son use Quake?
Gibbons: "Quake is an online virtual reality used by hackers. t is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school."
Me: Quake is a GAME not a virtual reality used by hackers to train. Train in the use of variouse firearms? It is just a game...a first person shooter...the guns are not real!!
7. Is your son becoming argumentative and surly in his social behaviour?
Gibbons: "As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature."
Me: Just because a child is interested in computers doesn't mean he will become disconnected with the "real world". Hackers are people too, and they function like all other people...just becuase they are hackers doesn't mean they fit the hacker stereo type... Also note that adolence could be effecting thier behavior.
8. Is your son obsessed with "Lunix"?
Gibbons: "BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called 'xenix', which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.
Your son may try to install 'lunix' on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional."
Me: When i read this section i was enraged...Lunix is a usinx based operating system for the commador 64...if your kid is still using one of those you should consider upgrading. First off linux is not an illegal operating system!! Lunix is different from every other example Gibbons gave... the rest use the linux kernel where Lunix has it's own. The linux kernel developed by Linyos Torovoltos is not based on xenix but is inspired by Minix. I have no clue where Gibbons comes up with his facts but i have yet to find one that is true. I have no clue what gibbons was doing when he wrote this article but this section is TOTTAL BS and makes no sence what so ever. [[Break into their stereos? In case you didn't notice when you were setting up your system, you didn't hook your stereo up to your computer...or wait, did you? God knows what happened when you set that thing up. MP3 files are compressed CD Audio files, and are used widely in the daily range of activities. And what's this bullsh*t about not noticing if Linux is installed? IT'S A TOTALLY DIFFERENT OPERATING SYSTEM THAT REPLACES WINDOWS!!! It's impossible not to notice it. It'd be clear as day when your dumb ass couldn't figure out why the f*ck your system had completely changed. And Linux is very easily removed by inserting your Compaq Recovery CD. And just for your info, when you send your computer back to the manufacturer, they're going to just restore it using the recovery CD, and laugh all day because of how idiotic you are.]]
9. Has your son radically changed his appearance?
Gibbons: "If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences."
Me: In the section above Gibbons mentions that the creator of the linux kernel, Linyos Torovoltos is a computer hacker...to the left is a picture of him. Does he meet the description of a hacker acording to Gibbons? No because hes is NOT a hacker. [[I believer you're referring to the ever-growing group of stylists known as "ravers". They go to parties known as raves, and usually are on some form of sedative or the like. Special-K, i.e. Ketamine is highly popular, because it is easy to find and cheap to purchase. It is cat tranquilizer in small doses, and horse tranquilizer in large doses. Nextly, E, or extasy, is the next most popular drug. It is ingested in the form of a pill, and cause people to "roll" at raves, because of the intense lightshows. If your son was wearing raver clothing, more than likely you shouldn't worry about him being a hacker, but rather being under the influence of some drug or another. Nice detective work, Sherlock.]]
10. Is your son struggling academically?
Gibbons: "
If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.
I encourage all parents to read through this guide carefully. Your child's future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously."
Me: Computers help chiI was googling around looking for something interesting and come across an article called "Is You Son a Computer Hacker?" by Reginald Gibbons. I thaught i would look interesting so i went and started reading... after a couple minuites i was very, very upset because the article was total BS!! After a little bit of thinking i thaught it might be a joke but i found that it was not...i was frustrated by his ignorance in writting about something he had apsolutly no clue about. I will give you an overview of the article with my thaughts on each part.
How to determine if your kid is a Hacker Acording to Reginald Gibbons
1. Has your son asked you to change ISPs?
Gibbons: "If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider."
Me: This is tottal BS...changing to a different ISP is not a sign of becoming a hacker...especialy if you are switching from slow AOL...
2. Are you finding programs on your computer that you don't remember installing?
Gibbons: "Your son will probably try to install some hacker software." ... "Popular hacker software includes 'Comet Cursor', 'Bonzi Buddy' and 'Flash'."
Me: . It is by no means a hacker program AT ALL. You would have to be a complete idiot to think so!! ...this is just a little app that is packed with spyware/malware/adware that helps you browse the internet...hackers have apsolutly no uses for this program...what are they going to do with it? ask the monkey what to do next? At the end of Gibbons list is 'Flash'...when i say this is was just shocked that somebody could be soo ignorant...Flash has no uses for hackers at all!! All it does is enhance the experiance of internet users.
3. Has your child asked for new hardware?
Gibbons: "Computer hackers are often limited by conventional computer hardware. They may request 'faster' video cards, and larger hard drives, or even more memory. " ... "If your son has requested a new 'processor' from a company called 'AMD', this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well."
Me: First off as a geek i love getting new hardware...not because i am a hacker and am "limited by conventional harware" but because i enjoy getting the best performance from my machine. Gibbons mentions that hackers may request hardware like a faster videocard, a larger harddrive or more memory...A hacker would not prosper by having a faster videocard..it would not effect him at all...most hacking is done through a console unlike most hacker movie show (eg. Swordfish and the hacking GUI). Then he comes to saying that "AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips." This is the one of the stupidest thing i think i have ever heard... and just because they leave thier processors more open so they can be overclocked esiar does not mean they are more hacker friendly.
4. Does your child read hacking manuals?
Gibbons: "There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: 'Snow Crash' and 'Cryptonomicon' by Neal Stephenson; 'Neuromancer' by William Gibson; 'Programming with Perl' by Timothy O'Reilly; 'Geeks' by Jon Katz; 'The Hacker Crackdown' by Bruce Sterling; 'Microserfs' by Douglas Coupland; 'Hackers' by Steven Levy; and 'The Cathedral and the Bazaar' by Eric S. Raymond." ... "If you find any of these hacking manuals in your child's possession, confiscate them immediately."
Me: Sure there are many hacker books on the market...it is an interesting topic.
5. How much time does your child spend using the computer each day?
Gibbons: "If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites." ... "This can take up to eight hours."
Me: Most teens don't spend thier time on the computer using Dos to gain control of other peoples computer...they spend their time playing games and don't harm anything. By the way Dos'ing is more commonly known as 'flooding'.
6. Does your son use Quake?
Gibbons: "Quake is an online virtual reality used by hackers. t is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school."
Me: Quake is a GAME not a virtual reality used by hackers to train. Train in the use of variouse firearms? It is just a game...a first person shooter...the guns are not real!!
7. Is your son becoming argumentative and surly in his social behaviour?
Gibbons: "As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature."
Me: Just because a child is interested in computers doesn't mean he will become disconnected with the "real world". Hackers are people too, and they function like all other people...just becuase they are hackers doesn't mean they fit the hacker stereo type... Also note that adolence could be effecting thier behavior.
8. Is your son obsessed with "Lunix"?
Gibbons: "BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called 'xenix', which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.
Your son may try to install 'lunix' on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional."
Me: When i read this section i was enraged...Lunix is a usinx based operating system for the commador 64...if your kid is still using one of those you should consider upgrading. First off linux is not an illegal operating system!! Lunix is different from every other example Gibbons gave... the rest use the linux kernel where Lunix has it's own. The linux kernel developed by Linyos Torovoltos is not based on xenix but is inspired by Minix. I have no clue where Gibbons comes up with his facts but i have yet to find one that is true. I have no clue what gibbons was doing when he wrote this article but this section is TOTTAL BS and makes no sence what so ever.
9. Has your son radically changed his appearance?
Gibbons: "If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences."
Me: In the section above Gibbons mentions that the creator of the linux kernel, Linyos Torovoltos is a computer hacker...to the left is a picture of him. Does he meet the description of a hacker acording to Gibbons? No because hes is NOT a hacker.
10. Is your son struggling academically?
Gibbons: "
If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.
I encourage all parents to read through this guide carefully. Your child's future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously."
Me: Computers help childern learn...i am done commenting on Gibbons total disregard to the truth and the facts. [[Well since you bought a new computer, emissions standards have virtually eliminated all radiation by computers, disproving your brain and eye damage theory. Most hackers are very intelligent, and excel in such subjects as math and foreign languages. And for everyone's knowledge, meningitis is NOT A PSYCHOLOGICAL DISEASE!!! IT'S BACTERIAL!!!]]
Note: text enclosed by [[]] is quoted from here
Conclusion:
Answering Gibbons questions:
1. Yes...i have changed my ISP a couple times [i wanted a faster conection].
2. I have flash on my linux laptop (the other programs do not work on linux i believe)
3. Yes i have asked for new hardware for variose computers in my house.
4. Yes i read hacking manuals because they are interesting (The unofficial guide to ethical hacking)
5. I spend many many hours a day on my computer. A lot more than 30 minuites a day...if i had the restriction i would die.
6. I have never played Quake but i have played quake 4 and 3...
7. No...just because i am a geek doesn't mean i do not have a life
8. Yes i love linux :)
9. Sometimes for fun :)
10. I only struggle accademicly when i don't work
So...acording to Gibbons i am a hacker. (Note that Gibbons is using the term 'Hacker' in a foul way. As in breaking the law.) I am not denying that i am a hacker...i will leave it up to you to decide (see this [note the bottom text])
Note: the term hacker takes on many meanings. Some of which are:
1. One who is proficient at using or programming a computer; a computer buff.
2. One who uses programming skills to gain illegal access to a computer network or file
ldern learn...i am done commenting on Gibbons total disregard to the truth and the facts.
Note: text enclosed by [[]] is quoted from here
Conclusion:
Answering Gibbons questions:
1. Yes...i have changed my ISP a couple times [i wanted a faster conection].
2. I have flash on my linux laptop (the other programs do not work on linux i believe)
3. Yes i have asked for new hardware for variose computers in my house.
4. Yes i read hacking manuals because they are interesting (The unofficial guide to ethical hacking)
5. I spend many many hours a day on my computer. A lot more than 30 minuites a day...if i had the restriction i would die.
6. I have never played Quake but i have played quake 4 and 3...
7. No...just because i am a geek doesn't mean i do not have a life
8. Yes i love linux :)
9. Sometimes for fun :)
10. I only struggle accademicly when i don't work
So...acording to Gibbons i am a hacker. (Note that Gibbons is using the term 'Hacker' in a foul way. As in breaking the law.) I am not denying that i am a hacker...i will leave it up to you to decide (see this [note the bottom text])
Note: the term hacker takes on many meanings. Some of which are:
1. One who is proficient at using or programming a computer; a computer buff.
2. One who uses programming skills to gain illegal access to a computer network or file
Saturday, July 29, 2006
Vacation / update
As you have probably noticed i have not blogged for over a week now...that is because i am on vaction at a lake in the north of Ontario, Canada. I can't not do much becuase of my broken leg so i brought a couple of books (C++ Primer, Linux Application Development and Beginning Linux Development) so i have been doign quite a bit of reading. When i get home i get my server because i had to fix some computers before i could recieve it...My house is now all running linux (except one computer which is running windows XP because my mom won't let me switch it). Anyway...i am hoping to start that podcast soon and am looking for somebody to do it with so if you are interested then give me a shout at my email . Anyway enjoy your summer (my vaction ends next weekend).
Tuesday, July 18, 2006
My Misfourtune
Sorry i have not posted in a while....on Thursday July 13 at aproximately 10:25AM i was playing soccer with some friends in a courtyard surrounded by a foot and a half concrete wall that enclosed a garden. A wooden bench was attached to the wall all the way around. The soccer ball got kicked up onto the garden and i went up to retrive it...i got the ball off the flower bed and kicked the ball off the bench which was wet because it rained the day before...I slipped and because i was moving fast went quite a distance and hit the ground at aproximately a 30 degree angle and twisted my right leg. Thirty minutes later the ambulance arived and and put me on a streacher and brought me to the hostpital where i was told i have a broken leg. That night i went into surgery. I am now back at home although i am in quite a bit of pain [not to mention i can't work anymore so i can't make any money :'( ] Anyway...i will be able to post a lot more because i am home for the rest of the summer.
Monday, June 19, 2006
What i am doing this Summer
This summer is going to be a very busy summer for me...I am working full time (10 hour days) at Elite Machine and Gear Inc. (EMG) and part time at Egar tool and Die. I wish i could be working coding but that is just not going to happen because it is basicly impossable to get imployed at my age for Computer Science. If anyone want to employ me give me a shout at my email address ;) Anyway...from July 4 to 14 i am going to summer school to prepare for Grade 11 University Math. Then during the last week of July i am taking holidays and going up north to Nipissing (a decent size lake). Then i am back to work until i start school.
Now on the technical side of my summer i would like to learn more about C/C++, C#, coding in linux, the linux kernel, gtk and netbeans platform and API's. I was thinking about writing some stuff on top of banshee (front end to encode video to ipods) and i would really like to write a program like Alcohol 120%. If anyone would like to join me or has any suggestions, feel free to comment. Thanks.
Now on the technical side of my summer i would like to learn more about C/C++, C#, coding in linux, the linux kernel, gtk and netbeans platform and API's. I was thinking about writing some stuff on top of banshee (front end to encode video to ipods) and i would really like to write a program like Alcohol 120%. If anyone would like to join me or has any suggestions, feel free to comment. Thanks.
Subscribe to:
Comments (Atom)
