Monday, June 26, 2006
I just want to use the opportunity to direct the valued readers of this blog to the Wikipedia entry regarding holes. There are always too many where you don't need any, and when you desperately need them they are not there. Be wise and keep some Portable Holes in stock.
Tuesday, June 06, 2006
Monday, June 05, 2006
Jun 5 21:12:55 entropy racoon: INFO: IPsec-SA established: ESP/Transport 192.168.1.36->192.168.2.33 spi=254685122(0xf2e2fc2)< I played around with IPSEC today, it's quite some fun after you have found out all the rough edges :-). But now, hooray, ipsec between the windows-notebook and one linux-machine.
21:21:20.338991 IP 192.168.1.36 > 192.168.2.33: AH(spi=0x07252808,seq=0x6): ESP(spi=0x0f2e2fc2,seq=0x6), length 76
21:21:20.339403 IP 192.168.2.33 > 192.168.1.36: AH(spi=0x723baa29,seq=0x8): ESP(spi=0x29eed679,seq=0x8), length 76
Sunday, June 04, 2006
Thursday, June 01, 2006
Just had a look at legacy code that spans several pages in this style:
DO 13 K = 1,N
Z(6) = U(K,I)
U(K,I) = Z(5) * Z(6) - Z(4) * U(K,J)
U(K,J) = Z(4) * Z(6) + Z(5) * U(K,J)
IF(K .EQ. I .OR. K .EQ. J) GOTO 13
H(I,K) = Z(5) * H(K,I) - Z(4) * H(K,J)
H(J,K) = Z(4) * H(K,I) + Z(5) * H(K,J)
H(K,I) = H(I,K)
H(K,J) = H(J,K)
All variables have 1 or two characters and it is full of magic constants and meaningless array indices.