![]() |
![]() ![]() |
![]() |
![]()
Post
#301
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,579 Joined: 30-May 06 From: SoCal Member No.: 8,626 ![]() |
It also depends on the condition of the weapon in question. That's why cyclic rate is listed as a range. The Sons of Guns episode, BTW, watercooled the M-16 with the Beta C-Mags, as it was intended for use on a Brown Water Navy Boat. They did it in an interesting way as well. I highly recommend the show. Why said Brownwater Navy didn't just get a Belt-Fed, I don't know, but there you go. I've seen a couple of episodes, always good for laughs... and firearms fun. |
|
|
![]()
Post
#302
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 14,358 Joined: 2-December 07 From: Winnipeg, Manitoba, Canada Member No.: 14,465 ![]() |
|
|
|
![]()
Post
#303
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,803 Joined: 3-February 08 From: Finland Member No.: 15,628 ![]() |
The Sons of Guns episode, BTW, watercooled the M-16 with the Beta C-Mags, as it was intended for use on a Brown Water Navy Boat. They did it in an interesting way as well. I highly recommend the show. Why said Brownwater Navy didn't just get a Belt-Fed, I don't know, but there you go. Because it wasn't really for a navy of anykind, the whole show is total BS and i would recomend for anyone with anu gun knowledge to stay far away from it. For crying out loud the first episode has a "local SWAT-team" order something to make breaching easier then having a one man carrying a shotgun. At witch point the owner introduces him the concept of masterkey, an underbarrel breaching shotgun. After this he goes to his team of "professional" gunsmiths and explains to them what their gonna build, as naturally none of them know what a masterkey is (IMG:style_emoticons/default/wobble.gif) . Then they start designing and the owner starts raving on how cool it is and how noone has ever made anything like it, because it's not like KAG masterkey has been standard armament for SWAT for the last 20 years or anything (IMG:style_emoticons/default/wink.gif) edit:Fixed the nices "fixes" my Android phone did to the post:silly: |
|
|
![]()
Post
#304
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 14,358 Joined: 2-December 07 From: Winnipeg, Manitoba, Canada Member No.: 14,465 ![]() |
Yeah, well, it's not like I can run down to my local shooting range to talk shop, can I?
There's only one in the whole city, and it's well past the perimeter. And I'm surprised it's still there, honestly. |
|
|
![]()
Post
#305
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,579 Joined: 30-May 06 From: SoCal Member No.: 8,626 ![]() |
|
|
|
![]()
Post
#306
|
|
Moving Target ![]() ![]() Group: Members Posts: 881 Joined: 31-July 06 From: Denmark Member No.: 8,995 ![]() |
Because it wasn't really for a navy of anykind, the whole show is total BS and i would recomend for anyone with anu gun knowledge to stay far away from it. That's like saying you can't look at hot girls unless they're smarter than you are. The show is about the guns, not the rednecks who run the shop. Besides, I think the narrative actually works. The uninformed can be fascinated at all the exciting new stuff and creativity the shopowner displays, while the informed can feel good about himself for spotting errors and getting confirmation in how much smarter he is (either than the gunsmiths, or the mainstream audience, depending on much he thinks the show has been dumbed down). |
|
|
![]()
Post
#307
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
just gonna leave this here: http://www.boingboing.net/2011/06/30/overb...ed-finnish.html
|
|
|
![]()
Post
#308
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
just gonna leave this here: http://www.boingboing.net/2011/06/30/overb...ed-finnish.html That is Entertaining... (IMG:style_emoticons/default/smile.gif) |
|
|
![]()
Post
#309
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
Hell, it lead me to discover that the Finnish army use a homegrown variant of the AK-47.
|
|
|
![]()
Post
#310
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 14,358 Joined: 2-December 07 From: Winnipeg, Manitoba, Canada Member No.: 14,465 ![]() |
|
|
|
![]()
Post
#311
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
I just found it a interesting mix, as i think their airforce flies FA-18. quite the patchwork of east and west. Still, it appears their AK variant is only in limited use (making its appearance on that photo even more intriguing).
|
|
|
![]()
Post
#312
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 14,358 Joined: 2-December 07 From: Winnipeg, Manitoba, Canada Member No.: 14,465 ![]() |
Then again, Israel has the Galil Assault Rifle.
|
|
|
![]()
Post
#313
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,803 Joined: 3-February 08 From: Finland Member No.: 15,628 ![]() |
|
|
|
![]()
Post
#314
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
Then again, Israel has the Galil Assault Rifle. Never bothered looking into the history for what the Israeli use, thanks for pointing that out. It was mostly a case of looking at the photo, going "hey, that looks like a AK" and firing up wikipedia for a quick check. |
|
|
![]()
Post
#315
|
|
Moving Target ![]() ![]() Group: Members Posts: 245 Joined: 17-August 10 Member No.: 18,943 ![]() |
|
|
|
![]()
Post
#316
|
|
Moving Target ![]() ![]() Group: Members Posts: 195 Joined: 7-July 08 From: Germany Member No.: 16,124 ![]() |
|
|
|
![]()
Post
#317
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 14,358 Joined: 2-December 07 From: Winnipeg, Manitoba, Canada Member No.: 14,465 ![]() |
Let's just say that Israelis make some damn fine weapons. (IMG:style_emoticons/default/nyahnyah.gif)
|
|
|
![]()
Post
#318
|
|
Moving Target ![]() ![]() Group: Members Posts: 944 Joined: 24-January 04 From: MO Member No.: 6,014 ![]() |
You can hard encrypt files, and file systems. Which is a bitch, and I don't understand why everyone wouldn't be doing it (IMG:style_emoticons/default/smile.gif) When two systems communicate in a secure network, they send encrypted data. The sender never UNENCRYPTS the data for the target, authorized or not. A predefined decryption key is passed to the target when the encrypted network is setup, and never passed across the network in future communications.Really, all secured commlinks and nexii should have hard-encrypted file systems. But that stuff.. shouldn't work that way. Hard Encryption should only slow you down if you're trying to access the files 'offline' If you're IN the Commlink, and have a seemingly legit account, then the system should auto-decrypt it for you. Because noone is going to require you to enter a passphrase everytime your OS tries to edit a system log. That's just not viable. I would argue that Strong Encryption is really for specific files, that have been individually encrypted to be even more obnoxious. (like Password protected files) This means IRL, if you get a valid account and pull encrypted data, you are still going to have to decrypt that data once you download it, unless you have ALSO hacked one of the Encrypting systems valid partners, who has a decryption key to use. Kudos to Catalyst for getting this right! |
|
|
![]()
Post
#319
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 ![]() |
When two systems communicate in a secure network, they send encrypted data. The sender never UNENCRYPTS the data for the target, authorized or not. A predefined decryption key is passed to the target when the encrypted network is setup, and never passed across the network in future communications. Ugh, ever heard of public-key cryptography?This means IRL, if you get a valid account and pull encrypted data, you are still going to have to decrypt that data once you download it, unless you have ALSO hacked one of the Encrypting systems valid partners, who has a decryption key to use. Kudos to Catalyst for getting this right! |
|
|
![]()
Post
#320
|
|
Moving Target ![]() ![]() Group: Members Posts: 944 Joined: 24-January 04 From: MO Member No.: 6,014 ![]() |
Ugh, ever heard of public-key cryptography? Both are fairly lame examples, as they are methods of encrypting communication, while a second look at sabs post I realize he is speaking of File level encryption within a system.No one uses Public-key or private key encryption for storing files on their local system. |
|
|
![]()
Post
#321
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 ![]() |
Public-key encryption is often used to work securely with remote clients (actually, almost uniformly so).
However, if a client is working with an encrypted file system, he's bound to have a way to decrypt what he receives on the fly, do you think providing each client with the secret key (which is the same for everyone) is a better idea than decrypting the stream for every legitimate client on the server side then transmitting it over an encrypted channel? |
|
|
![]()
Post
#322
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,759 Joined: 11-December 02 From: France Member No.: 3,723 ![]() |
Public/private keys encryption only serve to protect against communication eavesdropping and superficial intrusion. Currently decent encryption requires key that are hundreds or even thousands bits/characters long. Unless picking your favorite Shakespeare monologue as a pass-phrase, such length is way beyond what the average people can memorize. So these keys are themselves stored on a filesystem, which can be hacked. Common sense teach you that if an intruder can get into one of your secured system, it can get into a second one. At least, not labeling the key file as "key.pgp" may slow down your cracker a bit (while he searches the logs for any files that are systematically accessed before an encrypted file is).
While still not perfect, using biometric data as a key may provide a solution (better with some unusual biometric data you mustn't provide at every border control). |
|
|
![]()
Post
#323
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 14,358 Joined: 2-December 07 From: Winnipeg, Manitoba, Canada Member No.: 14,465 ![]() |
Hey, Shakespeare is used far too often. I suggest Terry Pratchett. "Buggerit, Millennium Hand and Shrimp I told 'em!" is probably used too often, however. (IMG:style_emoticons/default/wink.gif)
And, um, what does that have to do with firearms? |
|
|
![]()
Post
#324
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 ![]() |
I'd also like to note that using too much RL logic in SR Matrix only brings pain. Treat it like a puzzle, or like you treat astral - it is its own world that works by the laws written in the books because it does so. Otherwise, an incredible number of uneasy questions arises.
|
|
|
![]()
Post
#325
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,899 Joined: 29-October 09 From: Leiden, the Netherlands Member No.: 17,814 ![]() |
You can't really apply RL logic to SR encryption anyways, because they flat-out told us in Unwired that all previous encryption schemes can now be broken easily. Just because.
|
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 25th May 2025 - 05:50 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.