Tuesday, 20 November 2012

Cooler Master Storm Trooper

My uncle (in the picture to the left), recently purchased the Cooler Master Storm Trooper (http://www.coolermaster-usa.com/product.php?product_id=3054) enclosure while at a local gaming expo.

The Storm Trooper is by no means a small tower, it looks and feels mean (and ain't light either)! I was truly impressed with the engineering and thought that has gone into the design, from a special rubber handle to being able to change the orientation your drive bays...

With 8 fans built in and special factory made holes for water cooling, cooling in this tower should never become a problem.

The advanced dust filters in multiple locations also ensure your enclosure stays as dust free as possible.

The 9 bays for 5.25" drives provide able space for the majority or users/gamers. The 5.25" bays can also be converted into 3.5" and 2.5" drive bays.

The Storm Trooper supports Micro-ATX, ATX, and XL-ATX  motherboard sizes and also comes with 2 x USB 3.0 - overall the Storm Trooper is one of the best enclosures I've encountered to date. It reminds me of the large sturdy Intel server towers, built to last! 






Hey MIT mind giving back some IP addresses?

While playing around with RADB and whois on Linux, one of the addresses I randomly made up produced the result:

route:         18.0.0.0/8
descr:         Massachusetts Institute of Technology
               1 Amherst Street
               Cambridge
               MA 02139, USA
origin:        AS3
member-of:     RS-COMM_NSFNET
mnt-by:        MAINT-AS3
changed:       nsfnet-admin@merit.edu 19950118
source:        RADB

I've heard of many educational institutes having received huge IP allocations, with the majority of the IP addresses simply not being used... This seems to have happened quite often in the days long before IPv4 address exhaustion.

So now the question begs to be asked... if I need to provide reasons to service providers to obtain a small subnet of addresses, what reason could there be to continue allowing such huge allocations from even existing? The powers that be should challenge MIT to prove their complete usage of a /8 or lose the right to use the block, simply said the Internet needs the additional addresses...

Hackberry A10 in South Africa

Hackberry A10 in South Africa...

We ordered a HackBerry A10 from miniand.com a few days ago, I was amazed at how quickly and smoothly the delivery was done, especially when compared to the months of agony we've experienced with our yet to be delivered Raspberry Pi...

In the box you receive a power supply (5 volts, 1A), USA plug type (easily converted) a nice branded cloth bag and the board in proper protective packaging. 

The next step? Getting Debian installed and running, I'll upload a an image for all to download once I have one ready!

Tuesday, 13 November 2012

Pointers in C in a nutshell!


Pointers are used for dynamic memory allocation in C, the quick overview:

int number = 54; //Assigns variable called number the value 54

int *pointme = 52; //Creates a pointer variable named pointme and assigns it a value of 52

int *pointme = &number; //Points pointme variable to the address in memory of the variable number

printf("Pointer address %p has a value %d", pointme, *pointme); //Print out the address and value of the pointer

Coding Comment Funnies

The gems I've found in code:
  • goto fetch;//I hate goto, why the hell am I using it, sorry Sarah O'Conner...
  • From FNB banking site: //furk, this is such a crap way of setting the image path - any suggestions are welcome
  • From FNB banking site: //the money shot
  • From FNB banking site: //this method was bastardised on request from KS! I would never in good conscience code like this :D
If you find any funnies please send them to support@drakepeak.net

The gems found on the Internet in general:

Exception up = new Exception("Something is really wrong.");
throw up;  //ha ha
 
double penetration; // ouch
 
// I don't know why I need this, but it stops the people being upside-down
x = -x;  

// I am not responsible of this code.
// They made me write it, against my will.
 
/* IF DOLPHINS ARE SO SMART, HOW COME THEY LIVE IN IGLOOS? */
 
// hack for ie browser (assuming that ie is a browser)
 
.class {border:1px solid gold;} /* I pitty the fool */

/* HP-UX sucks wet farts from dead pigeons' asses */


/***************************************************************************/
/*  deep wizardry. do not touch.                                           */
/*                                                                         */
/*  no seriously.  XXXXXX I'm looking at you. If you screw with this again */
/*  I will kill you with my swingline stapler.                             */
/*                                                                         */
/* ...                                                                     */ 
 
// This is crap code but it's 3 a.m. and I need to get this working.

/*And now, getting all of that to look half decent in the retarded step brother of the browser family, Internet Fucking Explorer */

// Okay, let's do the loop, yeah come on baby let's do the loop
// and it goes like this ...
 
..} else { // we are screwed
 /* fill in later */
}
 
//Mind boggling, gibberish version of a SQL statement, but it work's, so dont touch it 
 
/* F_ck me gently with a chainsaw... */ 
// Whoever put this here is an idiot...this doesn't work at all !
// Hardcoded this for time sake ... will make andrew fix later :)