Jump to content

Wikipedia:Reference desk/Computing: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Line 165: Line 165:
* Signed zeroes aren't numbers, they're bit patterns that ''represent'' a number. There are potentially multiple bit patterns that can represent the same number. Mathematically this is all just the same one number. This is a nuisance - it makes comparisons more complicated.
* Signed zeroes aren't numbers, they're bit patterns that ''represent'' a number. There are potentially multiple bit patterns that can represent the same number. Mathematically this is all just the same one number. This is a nuisance - it makes comparisons more complicated.
: A similar problem exists in [[Talk:Truthiness#.22Truthy.22_and_.22falsy.22_in_programming:_pre-Colbert_or_post-Colbert.3F|truthiness]] (read the talk: - one editor's ego keeps removing it from the page), where one value is defined as "false" and all ''other'' values (very many of them, up to the size of the words used) are treated as "true". This too can be a tricky situation to work with for the unwary. Comparing values for equality to a true value (rather than inequality to the singleton false) will fail with many false negatives. [[User:Andy Dingley|Andy Dingley]] ([[User talk:Andy Dingley|talk]]) 08:25, 24 May 2017 (UTC)
: A similar problem exists in [[Talk:Truthiness#.22Truthy.22_and_.22falsy.22_in_programming:_pre-Colbert_or_post-Colbert.3F|truthiness]] (read the talk: - one editor's ego keeps removing it from the page), where one value is defined as "false" and all ''other'' values (very many of them, up to the size of the words used) are treated as "true". This too can be a tricky situation to work with for the unwary. Comparing values for equality to a true value (rather than inequality to the singleton false) will fail with many false negatives. [[User:Andy Dingley|Andy Dingley]] ([[User talk:Andy Dingley|talk]]) 08:25, 24 May 2017 (UTC)
::<small>most processors have a "compare with zero" or similar instruction (xor a register with itself and set flags etc). why is checking for nonzero a problem? [[User:Asmrulz|Asmrulz]] ([[User talk:Asmrulz|talk]]) 14:20, 24 May 2017 (UTC)</small>

Revision as of 14:21, 24 May 2017

Welcome to the computing section
of the Wikipedia reference desk.
Select a section:
Want a faster answer?

Main page: Help searching Wikipedia

   

How can I get my question answered?

  • Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
  • Post your question to only one section, providing a short header that gives the topic of your question.
  • Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Don't post personal contact information – it will be removed. Any answers will be provided here.
  • Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we'll help you past the stuck point.
    • We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.



How do I answer a question?

Main page: Wikipedia:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:


May 19

WannaCry

Could someone please give me a quick answer here? Many thanks, Anna Frodesiak (talk) 21:22, 19 May 2017 (UTC)[reply]

May 20

Windows 10 S and the future of Windows

Could Windows completely go the way of 10 S - no choice of browser, search engine, and all software must be bought through the Windows store?

Last summer the free upgrade to Windows 10 ended (at least that is what they said). I had three or four computers still with Windows 7, and since support for W7 is to end in 3 years, I decided to go from W7 to W10. Shortly after that, I read someone's opinion that future versions of Windows may force you to get software from the Windows store. That is what Windows 10 S does - could that be the future for all Windows? Bubba73 You talkin' to me? 03:04, 20 May 2017 (UTC)[reply]

Why are you asking here? We do not have an insider access to Microsoft. Ruslik_Zero 12:23, 20 May 2017 (UTC)[reply]
Agree we don't have a crystal ball. It is pretty clear what Windows 10 S is for though - to counter Chromebook. And yes they would like a locked down system which gave less support problems and gave them a revenue stream. But I hardly see why they would abandon their traditional market and risk losing them to Apple. Dmcq (talk) 14:57, 20 May 2017 (UTC)[reply]
Various Linux groups and Linux-focused-software devs are probably hoping they do exactly that. But I doubt it. They're greedy, but not stupid. ᛗᛁᛟᛚᚾᛁᚱPants Tell me all about it. 16:47, 20 May 2017 (UTC)[reply]

Thank you for your replies. Bubba73 You talkin' to me? 01:25, 21 May 2017 (UTC)[reply]

gedit won't highlight my bookmarks

Hi, just got myself a new computer (hence the spate of computing questions). Downloaded gedit again, and installed the bookmark plugin. It does bookmarks fine, but it won't actually give me the yellow highlighting on that bookmark (it's not text highlighting; it highlights the whole line with a big yellow bar). It knows the bookmark is there (it can jump to it), but won't display it. This was the best feature. How can I get it back? IBE (talk) 21:17, 20 May 2017 (UTC)[reply]

Well, my instinct is to recommend GNU Emacs, but this package might solve your problem (assuming we are talking about the gedit). It looks like you need to install a proper language definition file. But what is your OS? It might be just an apt-get install, or a config option. --Stephan Schulz (talk) 21:25, 20 May 2017 (UTC)[reply]
Thanks, although that link is not so likely, as this is syntax highlighting, whereas the bookmark plugin is something totally different. I'm using Windows 10. But I may do syntax highlighting as a hack. IBE (talk) 05:31, 21 May 2017 (UTC)[reply]

May 21

What is jsfiddle?

Please reply at Wikipedia talk:WikiProject JavaScript#What is jsfiddle?. The Transhumanist 20:47, 21 May 2017 (UTC)[reply]

Making money through ads and blocking ads

There are people who want to make money through online ads. Advertisers put ads on a website and pay money to the website for hosting ads. If the ad is clicked, then advertisers pay the webmaster money. Then, there are people who block ads. If the website needs to make money from the ads, and many visitors block the ads, then how can the website make any money? Will the website be forced to go out of business or try to look for something to sell? 50.4.236.254 (talk) 23:46, 21 May 2017 (UTC) and also we earn money by <ref><google adsense and through Digital Marketing.[reply]

1) They are always finding ways to get around ad blockers.
2) They can simply make it mandatory to view the ad. If it's blocked, they don't display the content you are after. Of course, there may also be software developed to fool them into thinking you viewed their ad, when you did not.
3) There are other revenue models, such as a subscriptions or freemium pricing. StuRat (talk) 00:29, 22 May 2017 (UTC)[reply]

May 22

Natural monopolies

I'm looking for sources about natural monopolies in relation to the recent Net Neutrality debate. Benjamin (talk) 09:47, 22 May 2017 (UTC)[reply]

How does Gmail only have a Alexa rank of 11,361

When Gmail has one billion active users worldwide how can it have such a low Alexa rank Flow 234 (Nina) talk 23:56, 22 May 2017 (UTC)[reply]

I assume most of the activity is on google.com and not gmail.com. PrimeHunter (talk) 00:05, 23 May 2017 (UTC)[reply]
It's also possible their traffic is heavily diluted by people using apps instead to access their mail and Gmail users sometimes having multiple accounts (including business and work accounts) to account for the billion active users. Thanks Jenova20 (email) 10:09, 23 May 2017 (UTC)[reply]
In fact, according to Techcrunch there's been 1 billion downloads of the Gmail app and additionally 75% of people read their Gmail email on their mobile. A large portion of that is likely to be through app. Source. Thanks Jenova20 (email) 10:15, 23 May 2017 (UTC)[reply]

May 23

Thinking about hardware firewall

This latest talk about the ransom ware scared me to death. I am thinking about purchasing a hardware firewall. I checked Amazon.com and found that there are varieties. Some of them got bad reviews, like no tech support, upgrades only by subscription with additional fees, etc. I can afford a piece of electronics up to about a grand and a half but I definitely want to study the issue in depth before I committed even a couple of hundred dollars. I wonder if anybody could comment on the issue and recommend a model? Additional description as to how the model works would be appreciated as well. Thanks, - --AboutFace 22 (talk) 00:57, 23 May 2017 (UTC)[reply]

Sounds to me like you are over-reacting. Worst-case scenario, you need to wipe your hard disk and reinstall. Just make sure you have a backup of everything, stored elsewhere. Also, I recommend you have an offline computer, you use for things like balancing your bank statement, that has no connection with the outside world. An old, obsolete PC is a good choice for this. StuRat (talk) 01:00, 23 May 2017 (UTC)[reply]
  • Firewalls need to be managed, as an on-going investment in IT infrastructure. They can have vulnerabilities themselves. They can require new facilities provided in the future. This might be as simple as some new must-have app, like a 3D Skype version with added smell, that used a new series of TCP ports and so required them to be opened up. For any "fit and forget" box, I would be wary of trusting it long term.
Most such boxes are internally just simply computers (often fairly vanilla Linux) with multiple network ports. To provide the hardware for such, you can buy "a box" or you can use an existing PC running a suitable unix distro. The important need is to have it configured correctly, then managed in a small, but on-going, fashion by a competent network admin. Although there are businesses managing such boxes remotely (so that the "packaged box" solution can have a secure long-term future), I don't see the packaged box as having too much of an advantage over a PC that is more obviously a PC.
You can also do much of this through a good broadband router, without needing a second box of different type. There is a large jump in performance and features from the £50 domestic routers to the £200 small office routers. You can also use such a router (they're available cheaply S/H as people upgrade their outermost DSL modem to support the new vDSL protocol and allow a FTTC fibre broadband connection) as a pure router (not using its DSL modem) within your network.
There are many hardware options. But look at the human aspects of having it correctly managed first - who's going to do that, and what do they recommend? Andy Dingley (talk) 07:43, 23 May 2017 (UTC)[reply]
  • I am not sure a "hardware firewall" is what you expect it to be. In the context of computers, a firewall is a "something" that blocks network connections depending on a certain set of rules. Unless those rules are extremely simple (a gap of air will refuse all connections, after all), you cannot have a hardware-level, no-software firewall.
Andy described above what is sold as "hardware firewall": basically a stripped-down computer that takes care only of the network rules. It should be less vulnerable to exploits because of the reduced attack surface, but that is it. It would have offered little protection against the recent ransomware episode, which did not exploit (as far as we know) any vulnerability in the firewall itself.
The only very small advantage I can see (in that context) is if you have particularly stringent firewall rules in place e.g. to deny any connection to non-authorized websites, but that is probably not the case (for instance, this prevents casual web surfing; if your browser can use port 80 to visit any URL, in particular it can visit evilmalware.com, and so can the malware - the computer firewall even has an edge here, because it can know which program attempted the connection). If your computer gets infected by a malware installer which tries to reset firewall rules to download the payload, the malware will have a harder time with an external firewall. But I am not sure this scenario ever happened. TigraanClick here to contact me 08:55, 23 May 2017 (UTC)[reply]
  • You're better off dealing with the problem at your computer end. Have a means of backup that is disconnected or not visible between backups, that'll protect your data from being destroyed. If you are responsible for a lot of money have a separate computer dedicated to that job and do not use it for any email at all or for any website except those necessary for the purpose. And don't use any passwords from it on your general use PC. With something like that you will be by far the weakest link not the software, so if a friend sounds odd or sends you something strange or that requires you to click 'accept' or 'ok' ask yourself if it really is them or do you really want to accept a potential virus. And in the case you're worried about they didn't do the basics of keeping the OS up to date and having an antivrus. Dmcq (talk) 09:14, 23 May 2017 (UTC)[reply]

Thank you very much. A lot of important information that I really need. Yes, at this point all I do is backups and probably should continue to do them. Thank you. - --AboutFace 22 (talk) 13:40, 23 May 2017 (UTC)[reply]

  • I know I'm late to the party, but I agree with all of the advice given here. A firewall box really isn't going to increase your security that much, and it requires a much larger investment of time and effort. Unless you're running a server room that looks like a goldmine to hackers and virus makers, you're not going to see any real benefit from it. ᛗᛁᛟᛚᚾᛁᚱPants Tell me all about it. 14:08, 23 May 2017 (UTC)[reply]
    Well, a thousand low-computing power units with ridiculously low security can be a more attractive target than a super-secure "goldmine" server room, see Mirai (malware).The Mirai botnet was used for its DDoS capabilities, not its computing power, but the point still stands. So while the particular value of cracking the OP's devices is too low to justify the effort, if an exploit against it can be scaled up to many more targets, it could very well happen. But it is by no means obvious that the home router is more vulnerable to any attack than the firewall box, so the gain in that particular scenario is dubious. TigraanClick here to contact me 16:01, 23 May 2017 (UTC)[reply]
Good point. Replace "a server room" with "something" and my point still stands.
But it is by no means obvious that the home router is more vulnerable to any attack than the firewall box, so the gain in that particular scenario is dubious. If he's running something that looks like a goldmine to hackers, I would absolutely recommend a dedicated firewall box. Of course, I'd also recommend a lot of other things (like a well paid, full-time security professional to manage the box and other security infrastructure), without which the firewall box is almost completely pointless. ᛗᛁᛟᛚᚾᛁᚱPants Tell me all about it. 16:14, 23 May 2017 (UTC)[reply]

Largely because people occasionally hire me to secure their networks, I make it a point to make my own computers secure. (I have systems running Windows, Android, BSS, Linux, and macOS and randomly switch from one to the other, because I don't know what a future customer might be running.) In the past, I connected everything directly to the Internet, using firewall software that ran on the systems themselves. I was always able to honestly say that I have never, every detected any malware or visus on my systems (and I have used every popular antivirus tool, again because I don't know what a future customer might be running.)

Then came the fateful day that I discovered that it was impossible to install Windows 2000 and apply the security updates available only on the Microsoft website without the PC becoming infected before I could finish installing the updates. At that time I added what is commonly called a "hardware firewall" but is actually a separate computer wthe two Ethernet connections running dedicated firewall software. Now I could complete the install and apply the security updates without becoming infected.

Thankfully, Microsoft fixed that particular problem, but I still recommend a separate firewall for any business running more than a handful of PCs.

Here is an onlline utility that tests your firewall to see how well it is protecting you: [ https://www.grc.com/x/ne.dll?bh0bkyd2 ] --Guy Macon (talk) 17:59, 23 May 2017 (UTC)[reply]

Thank you all again for your insights. In a bizarre twist I started thinking about writing my own stateful firewall. You see I already picked up some strange terms for the start. I can write C,C++,C#, FORTRAN codes. I am very proficient in all those languages, however I don't understand how such a firewall should work. All descriptions I've read so far are too vague. Is it doable? Thank you all again. --AboutFace 22 (talk) 19:43, 23 May 2017 (UTC)[reply]

That is a really, really bad idea. Anyone can write a security system that they themselves cannot defeat. Just get an old PC and run Smoothwall on it. --Guy Macon (talk) 03:05, 24 May 2017 (UTC)[reply]

@Guy Maçon, thank you but you should indent your paragraphs. It is a rule in here. --AboutFace 22 (talk) 19:45, 23 May 2017 (UTC)[reply]

No it isn't. Indentation signifies a reply to another comment. My comment was a standalone comment about the topic in the section heading. --Guy Macon (talk) 03:05, 24 May 2017 (UTC)[reply]
I once wrote a program that used a series of one time pads to encrypt and decrypt data, thinking that since OTP's are theoretically unbreakable, that would make the ensuing ciphertext unbreakable. Makes sense, right? And they were: I submitted them to a cryptography forum and asked people to decrypt them, and they couldn't. Since my pads were random, each byte in the cyphertext was stochastic, with a stochastic relationship to every other byte. But every single person who tried knew I used OTPs to encrypt the data, and they all asked me about my method. So I described my method without giving away any of my pads, and uploaded a copy of the executable so they could see it in action.
Ten minutes later somebody posted the plaintext of the cypher I had submitted. Because all he had to do was run the program and watch memory for strings (the pads), then try each pad until it worked. My 'uncrackable' encryption turned out to be only 30 seconds of work for a competent attacker, because -being an amateur- it didn't occur to me that there were angles of attack other than pure cryptography.
So lets say you build a firewall to use on a server on a VPN. You want to be ultra-strict with it, so what you do is configure it only to let devices with a MAC address that appears on a list connect. It's awesome! It's impervious to attack, because no-one but the specified computers can connect! Then you're editing WP one day and come across MAC spoofing. Oops. So you do some research, and decide to add IP filtering to that. It works great! Now no-one can spoof their way on. Then a few hours later, one of the remote computers can't connect. Why? Well, because they have a Dynamic IP address, which has just changed.
So you permit IP ranges. Now you're covered! Right up until one of the authorized laptops gets taken over by a hacker while its owner is surfing the web at a coffee shop and used to run a buffer overflow that lets them into the configuration tool for your firewall, at which point they promptly dump ransomware on every machine on the network.
So you discover a flaw in the ransomware (the private key is hardcoded into the executable! Yay!) and fix it. Only to find a year later that, while you were infected, the ransomware installed a hidden copy of VNC on all your machines and has been using them to DDOS US government institutions, who are now quite unhappy about what your network has been doing. And so on, and so forth.
You, as an amateur security programmer can be wickedly smart, cunning and downright devious. You can have as much knowledge as a guy with a fresh Infosec degree about the subject. Yet none of that matters, because someone who's aware of some obscure little vulnerability that you've never even heard of can still own your network the moment they try it. So as Guy said: Don't try to do it yourself. Trust the pros, because the pros have proven that they can defeat hackers. A firewall built by a dozen competent pros is always going to win out over a firewall built by one wickedly smart amateur. ᛗᛁᛟᛚᚾᛁᚱPants Tell me all about it. 13:11, 24 May 2017 (UTC)[reply]

How many people in the world use smartphones?

How many people in the world use smartphones or how many active smartphones are there? What's a good, recent source to verify this? I was surprised not to find it in the WP article on smartphones. Thank you for your help! --122.108.141.214 (talk) 10:20, 23 May 2017 (UTC)[reply]

How about these pages...?
CiaPan (talk) 10:36, 23 May 2017 (UTC)[reply]
There's a bit of a dispute over the ways to measure "active smartphones" as a lot of online stat counters use internet usage as a defining factor. This heavily cuts Android phone numbers and massively increases iphone users to the point where they're pretty much pointless to look at. Our own articles that include these tend to struggle with the issue... Thanks Jenova20 (email) 10:43, 23 May 2017 (UTC)[reply]
Thanks CiaPan - I did try DuckDuckGo-ing for it myself, but I didn't recognise Statista as a good source to use. Jenova, where is this discussed on WP? I looked in the main smartphone article and briefly in the bottom navigation box there (as well as doing a search for smartphone use and smartphone usage), but couldn't readily find such information. Is it only available on individual brand/model pages? --122.108.141.214 (talk) 11:01, 23 May 2017 (UTC)[reply]
I've seen it crop up on both Android sales figures a few years back and recently on the Ipad article, where the figures are blatantly not possible to gauge without estimating or using something like internet usage to estimate. Both are unreliable as i've mentioned. It may have happened other times but those are two that I know of. Thanks Jenova20 (email) 12:05, 23 May 2017 (UTC)[reply]

Why does Japan have only 39% smartphone use ?

As per http://www.businessinsider.com/how-many-people-own-smartphones-around-the-world-2016-2?IR=T.

I am guessing heavy taxation ? StuRat (talk) 11:31, 23 May 2017 (UTC)[reply]

See Galápagos syndrome. --122.108.141.214 (talk) 11:43, 23 May 2017 (UTC)[reply]
Thanks, that led me to feature phones, which are apparently a popular alternative in Japan, where phones have built-in features that would require downloads on smartphones. I have to admit, that sounds better, and more secure, to me. I have a smartphone but no time to research and download apps, so it currently does very little. StuRat (talk) 12:27, 23 May 2017 (UTC)[reply]
Japan has a very mature/old population in general. Old people don't adapt to new tech like youngsters. Could that be it? Thanks Jenova20 (email) 12:05, 23 May 2017 (UTC)[reply]
Yes, and those old people may also prefer phones that do everything from day 1, versus phones that require downloading apps to become useful. StuRat (talk) 12:29, 23 May 2017 (UTC)[reply]
Coincidentally my dad only just started using his smartphone to it's full. He was content with texting and calls for the last 3 years, but we've finally got him using Whatsapp and youtube now. I never realised he was Japanese so this has come as a very big shock. Sorry. Thanks Jenova20 (email) 12:44, 23 May 2017 (UTC)[reply]
What I'd really like is a hybrid. That is, a phone that comes preloaded with features, perhaps from a list I choose when I order it, which have already been installed and tested. I could then download additional apps, if I choose to do so. StuRat (talk) 13:17, 23 May 2017 (UTC)[reply]
Old people are smart. Why pay 900$ for a superphone when one for 50$ does everything a phone should do? Young people are stupid! Also why should old people want to watch youtube on a 4" micro display? You ever noticed most old people put on glasses to read? --Kharon (talk) 13:32, 23 May 2017 (UTC)[reply]
I paid $5 for my phone (LG-L38C), and would only choose to watch video on a tiny screen as a last resort, so I guess that makes me super-old. :-) StuRat (talk) 16:37, 23 May 2017 (UTC) [reply]
So when you get a smartphone, you have to download basically everything? It doesn't come with most features pre-loaded? Nyttend (talk) 02:21, 24 May 2017 (UTC)[reply]
Most features, yes. Candy Crush, no (thankfully). Thanks Jenova20 (email) 08:52, 24 May 2017 (UTC)[reply]

May 24

Signed zeroes

In most contexts, zero holds a unique place: it's neither negative nor positive, because it sits in the very middle, and the numerical values of all other numbers represent their distance from zero in a number line context. In computing contexts with signed zeroes, does anything occupy the median, neither-negative-nor-positive place occupied by zero in other contexts? Nyttend (talk) 02:20, 24 May 2017 (UTC)[reply]

The standard IEEE 754 number system has only the two signed zeros, and I'm not aware of any other number system that has three zeros (Positive, negative, and neutral.), if that's what you're asking.
They both occupy the center of the number-line, of course. And they equal each other.
ApLundell (talk) 03:48, 24 May 2017 (UTC)[reply]

Do you mean like a datum?--Shantavira|feed me 08:02, 24 May 2017 (UTC)[reply]

  • Signed zeroes aren't numbers, they're bit patterns that represent a number. There are potentially multiple bit patterns that can represent the same number. Mathematically this is all just the same one number. This is a nuisance - it makes comparisons more complicated.
A similar problem exists in truthiness (read the talk: - one editor's ego keeps removing it from the page), where one value is defined as "false" and all other values (very many of them, up to the size of the words used) are treated as "true". This too can be a tricky situation to work with for the unwary. Comparing values for equality to a true value (rather than inequality to the singleton false) will fail with many false negatives. Andy Dingley (talk) 08:25, 24 May 2017 (UTC)[reply]
most processors have a "compare with zero" or similar instruction (xor a register with itself and set flags etc). why is checking for nonzero a problem? Asmrulz (talk) 14:20, 24 May 2017 (UTC)[reply]