Hacker News new | past | comments | ask | show | jobs | submit | brs's comments login

Well, another five years until it shows up on http://olduse.net/ (which is worth a nostalgic browse if you haven't tried it)


More details on the main site: http://www.omscs.gatech.edu/#np-855

Self-taught computer scientists should also note:

Formal admission into the OMS CS program will require a Bachelor of Science degree in computer science from an accredited institution, or a related Bachelor of Science degree with a possible need to take and pass remedial courses


There's a long extract from the book here: http://www.guardian.co.uk/books/2011/aug/19/genius-downstair...


This reminds me of hacking ANSI.SYS escape sequences back in the day. You could create a text file which would be "executed" when someone entered "type readme.txt" at the DOS prompt, by using keyboard remappings and so on.

I remember creating a fairly unsuccessful "text file virus" that would try to copy itself around our school network and reboot people's machines. Good times...


Perhaps everyone is trying out siege.


Looks interesting. I imagine a common use case would be for all exceptions to trigger an AJAX post back to your server, so they can be logged alongside normal server-side errors.


Actually the award Go won was "the highest rise in ratings in a year". That said, I do agree their methodology is pretty suspect. The thing is, a lot of developers look to Tiobe to decide what language to learn next, so it's interesting to follow even if the data is flawed.


The full article is at http://www.tiobe.com/index.php/content/paperinfo/tpci/index....

I couldn't put it in the submission because of HN's dupe detection.


Slightly off topic, but does anyone have experience of the Software Engineering course mentioned at the end of the linked page? The functional/concurrent programming courses look quite interesting, speaking as someone who hasn't studied CS formally, but has dabbled in Haskell/PL theory and would like to learn more.


I work in the department, so I can at least tell you who to ask if you've got any questions: Email is in my profile.


For what it's worth, my password was 8 random alphanumerics, and it's not in the list, while /.,mnbvcxz (12 alphanumerics with symbols) is there. The cracker must have some sort of algorithm that looks for consecutive patterns on the keyboard.

It goes to show that the old rules - non-dictionary word, mixed case, etc - really don't cut it anymore. Psychologically, picking a password that has high entropy is quite difficult, and the crackers are only going to develop better algorithms in the future. I think using a good random generator is the only way to ensure you have a decent password these days.


I dunno, they managed to crack "G7io5639*%V64ioT5h9" -- 19 characters including lowercase, uppercase, numbers, and symbols. It doesn't seem to follow any pattern on a QWERTY layout -- maybe another layout?

I wasn't aware they could crack passwords that long though -- wasn't that supposed to take years, even with a GPU?


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: