Hacker Newsnew | past | comments | ask | show | jobs | submit | heatish's commentslogin

I think ePub's can handle everything you mentioned, ePub's are just XHTML, and a subset of css [1]. Not sure about callout boxes, I don't know exactly what subset of elements are available as I've never written one, but everything else you've mentioned looks to be available [2].

Fun epub file trick: rename the file .zip, unzip -a yourbook.zip (double click unzip doesn't work on osx for me for some reason) and check out the html, css, images and xml of your book.

[1] https://en.wikipedia.org/wiki/EPUB [2] https://www.w3.org/TR/2005/WD-xhtml2-20050527/elements.html


While ePubs can handle more complicated layouts, it's much easier to take an existing print book layout and export to PDF and have it retain the formatting than it is to do the same with ePub. So to export the same layout to ePub, you basically need a web designer to go over it and mark up the parts correctly and write the right CSS. Exporting to PDF is pretty much one step and you're done.


There's actually quite a lot of evidence that it was a politically motivated spear phishing campaign from FancyBears, which is most likely from Russia. So technically yes there's no definitive, smoking gun proof but "no proof for this claim" seems to be a bit dismissive of some glaring hints. It certainly wasn't just a "generic phishing page" or guessing of a weak password.

They went after quite a few politicians on both sides of the aisle and journalist's, the Podesta camp just happened to be the ones who fell for it.

https://www.secureworks.com/research/threat-group-4127-targe...

https://arstechnica.com/information-technology/2016/10/russi...


Just to add to this, https://en.wikipedia.org/wiki/Fancy_Bear has links to multiple security companies which have publicly drawn the link to the Russian government.

The list of targets is also convincing: various NATO organizations but also things like the World Anti Doping Agency at the time the Russian Olympic team was being disqualified from everything. You could argue that, say, China might be interested in hacking the US or France but Eastern Europe and WADA really aren’t of interest to most other major powers.


Keep in mind that the companies which pointed to Russia also have contracts with the executive office of the president - i.e., making up stories to support the administration's narrative is good for business. Let's be honest, this is Washington D.C. we're talking about, and that level of collusion is nothing new. I'm sure the administration offered perks to anyone who could present convincing "evidence" of a Russian connection.

Let's also not forget that the initial Fancy Bear claim was discredited: https://www.voanews.com/a/cyber-firm-rewrites-part-disputed-...


Am I missing something or is there not a single link to the study in this article? Didn't see it anywhere on mobile.

After the title there isn't really any info about dietary fats but instead will read about how basically all this study may have found is that those doing "low fat diets" might end up eating really crappy carbs. I can't find the link to the study though so maybe they found something else..

I don't think people eating crappy carbs and drinking soda could really be considered "dieters" they seem more like "unhealthy eaters who happen to be eating low fat".

From the article: "Those doing so tended to eat far too much stodgy food like bread, pasta and rice, the experts said, while missing out on vital nutrients.

Participants eating the highest levels of carbohydrates – particularly refined sugars found in fizzy drinks and processed meals – faced a 28 per cent higher risk of early death."

Also their suggestion goes on to say a good balance is 35% of calories from fat which I would say is still fairly 'low-fat' of a diet IMO but I guess that's pretty subjective and I'm not a dietician.


Very regrettably, most newspapers still do not link to the original journal article when discussing academic work. Even places like the NY Times started doing this routinely only a few years ago, more than a decade after it become trivially easy to do technically.


It's not just academic studies, journalists very frequently don't cite their sources for many factual claims. Their editors and them knowing what or whom it is is way too often enough for them.

It rubs me the wrong way. It feels a lot like: "We know better and can tell you what to think. We don't need to show our work."

That said, it has been getting better, especially for the tech savy younger generation with Twitter links (:P), but their editors are probably trying to keep the number of hyperlinks relatively low.


That's why I like the BBC; they link to the study the article is discussing, and have always done so.


When build tools run an uglifier on your code this is what the variables comes out as. Takes all your logically named variables and shortens them like a-z. They can make it "beautified" by un-minifying (not all on 1 line) but you can't get their original variables name without the original source.


I think they may have been referring to the names right down at the bottom - a minifier wouldn't use "NWvQtGjjfQX" without having used all the two, three four or five letter variable names.


It's probably not so much a minifier than an obfuscator.


I've always wondered about the design choice for the shape of batteries. It seems like the shape would indicate the current is flowing the opposite way than it does. Something about the positive terminal just says to me "I'm shooting electrons this way"


I got the impression from somewhere that plus and minus was defined long before they could track actual electrons, and thus discover that they had them backwards.


Yes, Benjamin Franklin was the first to assign positive and negative, and got the sign wrong. It looks like it took around another century to figure out that detail.



It's an historical accident. But electricity as the flow of positive charge is a pretty reliable model outside of materials science and nano-electronics, so why worry?


Something that bugged me as a kid trying to learn electronics: everything is connected to ground, negative is on ground, so we're dumping electrons onto every path in the circuit. It's the job of the resistor, capacitor, transistor, IC, etc, to direct those electrons, putting their energy to use, and then dumping them back to positive.


Yeah that same line made me laugh a bit as well. "Your non-identifying, SUPER personal, burned onto your phones hardware, is never going to change Mac Address is recorded as you walk by."

I think the idea is a great one, it's unfortunate there isn't a better way (that I can think of atm) to do it, or like you said just some transparency on what they do with it. As simple as: "At the end of each day the encrypted mac addresses are completely erased from our system."

Seems like they do keep the info though, it says the Cincinnati airport kept it and used it for data analysis. In the end, I think this kind of thing most people will be okay with foregoing a bit of privacy for.

Edit: Interesting article on mobile MAC addresses down the comments: https://news.ycombinator.com/item?id=10097882#up_10098108


I work in the traffic industry and over the last 8 years I have seen the rise of WIFI and Bluetooth journey time monitoring kit and after looking at every solution, I have found that the method of "encrypting" the data has always been just a MD5 hash, or SHA if you are lucky. With with result Hash just been http'ed over to a server on the internet. This usually leads to to question, "OK, so I can just hash the victims MAC address and the look for that in the data stream to find out where the person is instead of just using the MAC directly?" The same is done for ANPR based systems. The word "encrypted" seems to be added to some how make it secure without the solution being secure.


I work in the traffic industry and over the last 8 years I have seen the rise of WIFI and Bluetooth journey time monitoring kit and after looking at every solution, I have found that the method of "encrypting" the data has always been just a MD5 hash, or SHA if you are lucky. With with result Hash just been http'ed over to a server on the internet. This usually leads to to question, "OK, so I can just hash the victims MAC address and the look for that in the data stream to find out where the person is insteadvof just using the MAC directly?"


For the less dev tools savvy, you could leave those top instructions on solving 2x - 3 = 4 in a console.log in your code. So once they get dev tools open they see some more instructions for the next step.

  console.log("Type the following in this order pressing enter each time you see a semi-colon: \n var expr = new Expression('x'); \n expr = expr.subtract(3); \n expr = expr.add('x'); \n console.log(expr.toString()); \n var eq = new Equation(expr, 4); \n console.log(eq.toString()); var x = eq.solveFor('x'); \n console.log('x = '' + x.toString());");
Very cool project by the way.


That's a very clever idea. Thanks.


How effective would per-IP rate limiting be for these new types of JS attacks though? As I understand it, it's just the sheer number of requests that they can get sent to the server with these types of attacks rather than say a botnet spamming requests over and over from the couple hundred PC's they have under their control or a HTTP POST attack where they trickle in the body of the request to hang up the server.


Eloquent Javascript was the first programming book that I ever worked through online and subsequently went and bought because I was so happy with it. I was young and playing Diablo 2: LoD and stumbled upon some bot that would let me do Mephisto runs for loot all night, I was amazed with it and went back to the forums where I'd found it and did some reading, this was the book that they recommended for anyone who was interested in learning some programming.

I'd have to say that this book was one of the more gentle and concise introductory books I've ever read and so far I couldn't be happier that it was my personal introduction to JS and programming. It certainly set me leaps ahead in the JS section when I attended a web dev bootcamp. It is my personal go to for any of my friends who approach me about their interest in getting started with programming. Big Nerd Ranch books are a close second but I've only recently found them and begun reading them.


I profoundly appreciate the nostalgia you brought back by talking about Mephisto runs.


This looks great, thank you. I'll be signing up for it tonight. I certainly want to put some contributions out there for FOSS so maybe I will see what I can do on NPM, find something small to work on a bit on the side.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: