Chivo

Members
  • Content

    515
  • Joined

  • Last visited

  • Feedback

    0%

Posts posted by Chivo


  1. Quote

    Maybe not.... what about an avanlanche type rescue device.... you have a passive device in your ski jacket and then the searchers uses a tracker to find you.

    These passive devices are small, light and cheap (and easily available) and could easily be fitted to your para gear.... The all you would need is a single searcher unit at each DZ that could be loaned out to find your gear.



    I thought that you need a device that can transmit on whatever it is you need to recover (people/canopies/etc). In which case, the receiver (which you have in your hands) can get the signal and tell you in which direction to go, to find the transmitter.

    If the canopy has the receiver, it will receive the signal from the transmitter, and then what? It must emit sound or something for you to be able to find it. Otherwise, it will just receive the signal and do nothing...that is, being just a receiver.

    Depending on the complexity of the receiver, it could know from which direction the signal is coming, but it has no way of notifying the transmitter. So, if you have the transmitter on your hands... how would you find the receiver?

    ~Chivo

  2. This is a filesystem limit, if you're using FAT32, its limit is (2^32)-1 bytes, or one byte less than a full 4GB. If you're curious, check this out. Unless you change your partition to NTFS using software like Partition Magic, you have few choices left... compress the output, or instead of exporting the whole thing, you'll have to do it in chunks.

    ~Chivo

  3. On saturday I jumped with 4 other freefliers. It was great, except when I went to check the video... I realized the camera had night-shot turned on. The video in the plane looks great - a cool effect, but as soon as we go out the door, everything is white. Guess I must've moved that when putting the camera into the helmet. :S

    ~Chivo

  4. Very nice!

    I would recommend to shorten the intro. It took almost 20 seconds to watch. There are several ways of doing this. You can put both messages on one screen, or instead of making it 10 seconds per message, you could put 5. The amount of text can be easily read in less than that. Or, you could overlay the text on top of video.

    For the end, you could fade out the sound as well as fading out the video. That will make for a better end. Possibly add a "the end" message, or some credits, like naming jumpers or camera crew.

    Other than that, good job!

    ~Chivo

  5. Well, its a friday, and I've been meaning to post this for a while now... BTW, I'm not the author, and yes, a few of you have read about this in /.. You can also find it in the DeCSS Gallery (search on google).

    Also, the indentation is missing. :S

    Edit: I don't think copying this in here is illegal, but if it is, I'm sure HH or any of the greenies will delete it.

    ~Chivo


    How to decrypt a
    DVD: in haiku form.
    (Thanks, Prof. D. S. T.)
    ------------------------

    (I abandon my
    exclusive rights to make or
    perform copies of

    this work, U. S. Code
    Title Seventeen, section
    One Hundred and Six.)

    Muse! When we learned to
    count, little did we know all
    the things we could do

    some day by shuffling
    those numbers: Pythagoras
    said "All is number"

    long before he saw
    computers and their effects,
    or what they could do

    by computation,
    naive and mechanical
    fast arithmetic.

    It changed the world, it
    changed our consciousness and lives
    to have such fast math

    available to
    us and anyone who cared
    to learn programming.

    Now help me, Muse, for
    I wish to tell a piece of
    controversial math,

    for which the lawyers
    of DVD CCA
    don't forbear to sue:

    that they alone should
    know or have the right to teach
    these skills and these rules.

    (Do they understand
    the content, or is it just
    the effects they see?)

    And all mathematics
    is full of stories (just read
    Eric Temple Bell);

    and CSS is
    no exception to this rule.
    Sing, Muse, decryption

    once secret, as all
    knowledge, once unknown: how to
    decrypt DVDs.



    Arrays' elements
    start with zero and count up
    from there, don't forget!

    Integers are four
    bytes long, or thirty-two bits,
    which is the same thing.

    To decode these discs,
    you need a master key, as
    hardware vendors get.

    (This is a "player
    key" and some folks other than
    vendors know them now.

    If they didn't, there
    is also a way not to
    need one, to start off.)

    You'll read a "disk key"
    from the disc, and decrypt it
    with that player key.

    You'll read a "title
    key" for the video file
    that you want to play.

    With the disk key, you
    can decrypt the title key;
    that decrypts the show.



    Here's a description
    of how a player key will
    decrypt a disk key.

    You need two things here:
    An encrypted disk key, which
    is just six bytes long.

    (Only five of those
    are the _key itself_, because
    "zero" marks the end.

    So that's five real bytes,
    and eight times five is forty;
    in the ideal case,

    forty bits will yield
    just short of two trillion
    possible choices!

    Ian Goldberg once
    recovered a key that long
    in seven half-hours.

    But his office-mate
    David Wagner points out that
    it's _impossible_

    to achieve what the
    DVD CCA seems
    to want to achieve,

    even by making
    the key some reasonable,
    "adequate" key-length:

    There's no way to write
    a "secure" software player
    which contains the key

    and runs on PCs,
    yet somehow prevents users
    from extracting it.

    If the player can
    decrypt, Wagner has noted,
    users can learn how.)

    This is a pointer,
    "KEY", to those bytes, and when we're
    done, they'll be clear-text.

    Oh, the other thing!
    Called "im", a pointer to six
    bytes: a player key.

    (Now those six bytes, the
    DVD CCA says
    under penalty

    of perjury, are
    its trade secret, and you are
    breaking the law if

    you tell someone that,
    for instance, the Xing player
    used the following:

    Eighty-one; and then
    one hundred three -- two times; then
    two hundred (less three);

    two hundred twenty
    four; and last (of course not least)
    the humble zero.)

    We will use these few
    internal variables:
    t1 through t6,

    unsigned integers.
    k, pointer to five unsigned
    bytes. i, integer.

    So here's how you do
    it: first, take the first byte of
    im -- that's byte zero;

    OR that byte with the
    number 0x100
    (hexadecimal --

    that's two hundred and
    fifty-six to you if you
    prefer decimal).

    Store the result in
    t1. Take byte one of im.
    Store it in t2.

    Take bytes two through five
    of im; store them in t3.
    Take its three low bits

    (you can get them by
    ANDing t3 with seven);
    store this in t4.

    Double t3, add
    eight, subtract t4; store the
    result in t3.

    Make t5 zero.
    Now we'll start a loop; set i
    equal to zero.

    i gets values from
    zero up to four; each time,
    do all of these steps:

    Use t2 for an
    index into Table Two:
    find a byte b1.

    Use t1 for an
    index into Table Three:
    find a byte b2.

    Take exclusive OR
    of b1 with b2 and
    store this in t4.

    Shift t1 right by
    a single bit (like halving);
    store this in t2.

    Take the low bit of
    t1 (so, AND it with one),
    shift it left eight bits,

    then take exclusive
    OR of that with t4; store
    this back in t1.

    Use t4 for an
    index into Table Four:
    find a byte and store

    it back in t4.
    Shift t3 right by three bits,
    take exclusive OR

    of this with t3,
    shift this right by one bit, and
    take exclusive OR

    of this with t3,
    shift this right by eight bits, and
    take exclusive OR

    of this with t3,
    shift this right by five bits, and
    (No exclusive OR!

    Orange you glad I
    didn't say banana?) take
    the low byte (by AND

    with two hundred and
    fifty-five); now store this
    into t6. Phew!

    Shift t3 left eight
    bits, take OR with t6, and
    store this in t3.

    Use t6 for an
    index into Table Four:
    find a byte and store

    it in t6. Add
    t6, t5, t4; store
    the sum in t5.

    Take t5's low byte
    (AND t5 with two hundred
    fifty five) to put it

    in the ith byte of
    the vector called k. Now shift
    t5 right eight bits;

    store the result in
    t5 again. Now that's the
    last step in the loop.

    No sooner have we
    finished that loop than we'll start
    another; no rest

    for the wicked nor
    those innocents whom lawyers
    serve with paperwork.

    Reader! Think not that
    technical information
    ought not be called speech;

    think not diagrams,
    schematics, tables, numbers,
    formulae -- like the

    terrifying and
    uniquely moving, though cliche,
    Einstein equation

    "Energy is just
    the same as matter, but for
    a little factor,

    speed of light by speed
    of light, and we are ourselves
    frozen energy."

    Einstein's formula
    to convert from joules into
    kilogram-meters

    squared per second squared,
    for all its power, uses
    just five characters.

    But Einstein wrote to
    physicists: formal, concise,
    specific, detailed.

    And sometimes we write
    to machines to teach them how
    tasks are carried out:

    and sometimes we write
    to our friends to show a way
    tasks are carried out.

    We write precisely
    since such is our habit in
    talking to machines;

    we say exactly
    how to do a thing or how
    every detail works.

    The poet has choice
    of words and order, symbols,
    imagery, and use

    of metaphor. She
    can allude, suggest, permit
    ambiguities.

    She need not say just
    what she means, for readers can
    always interpret.

    Poets too, despite
    their famous "license" sometimes
    are constrained by rules:

    How often have we
    heard that some strange twist of plot
    or phrase was simply

    "Metri causa", for
    the meter's sake, solely done
    "to fit the meter"?

    Programmers' art as
    that of natural scientists
    is to be precise,

    complete in every
    detail of description, not
    leaving things to chance.

    Reader, see how yet
    technical communicants
    deserve free speech rights;

    see how numbers, rules,
    patterns, languages you don't
    yourself speak yet,

    still should in law be
    protected from suppression,
    called valuable speech!

    Ending my appeal
    on that note, I will describe
    the second loop. Store

    nine in i; i gets
    values from nine down to
    naught. Each time, do this:

    Use i+1 as
    an index into Table
    Zero: find a byte.

    Call that byte p1.
    Now use i for an index
    in Table Zero:

    find a byte and
    call that byte p0. Now
    use p1 as an

    index into k
    (a vector, remember?); thus
    find a byte b1.

    Use p1 as an
    index into KEY, as well:
    find a byte, use that

    byte as an index
    into Table One. Call the
    byte you find b2.

    Use p0 as
    an index into KEY to
    find a byte b3.

    Take exclusive OR
    of b1, b2, b3,
    and store that in KEY

    (not just anywhere,
    though!). In KEY at the byte that's
    indexed by p1.

    That's it for that loop
    and also for the task of
    disk key decryption.

    Title keys are next.
    It isn't hard to decrypt
    one. The rule's the same!

    Well, there's one slight
    change: where you use t6, it's
    Table "Five", not "Four".

    And this time im is
    the decrypted disk key, and
    KEY the title key.



    How would you like to
    hear how to decrypt _both_ the
    disk and title keys?

    All we'll need are the
    encrypted versions and a
    player key. No sweat!

    We'll call the title
    key TKEY, a pointer to
    six bytes, encrypted.

    We'll call the disk key
    DKEY, a pointer to six
    bytes, encrypted too.

    We will use a few
    internal variables,
    once again: so i,

    an integer, will
    serve again as loop index.
    im1 is six bytes,

    im2 is six bytes.
    Both vectors and the latter
    holds our player key.

    Now I told you once
    about a player key I
    think they gave to Xing --

    I don't know this for
    sure; DVD CCA
    said so in court, though.

    Otherwise I'd say
    that this is just a "magic
    number" from on high,

    vouchsafed to mortals
    from the mouths of the Muses
    for our benefit.

    In reality
    I'm told it was discovered
    by M.o.R.E.,

    some Europeans
    two-thirds of whom are today
    still anonymous.

    I don't want to make
    a long excursus right now
    on why that's not bad:

    reverse engineers
    in many fields are heroes
    of technology,

    for advancing the
    knowledge of their colleagues or
    of the public mind.

    Yet in software the
    recent trend has been to brand
    tinkerers as thieves!

    I urge you to read
    the Crypto-gram newletter
    on why that's not so.

    Bruce can make the point
    better there than I can here,
    sticking to haiku.

    So this number is,
    once again, the player key:
    (trade secret haiku?)

    "Eighty-one; and then
    one hundred three -- two times; then
    two hundred (less three);

    two hundred twenty
    four; and last (of course not least)
    the humble zero."

    If you didn't know
    a valid player key, then
    you could find one out --

    ask Frank Stevenson,
    or his fellow programmer
    wise Andreas Bogk.

    All we have to do
    is this: copy our DKEY
    into im1,

    use the rule above
    that decrypts a disk key (with
    im1 and its

    friend im2 as
    inputs) -- thus we decrypt the
    disk key im1.

    Use the rule above
    that decrypts a title key.
    TKEY and our new

    disk key im1
    are inputs now -- we decrypt
    TKEY, and we're done.

    That was straightforward.
    Probably we didn't need
    to explain this part,

    but computers are
    very literal, so we
    might as well do so.



    This part is really
    exciting for movie fans:
    decrypt DVDs!

    Well, at least sectors
    of DVDs, but they are
    made up of sectors.

    Sectors (of two to
    the eleventh bytes) are the
    encryption units.

    Rejoice then, get some
    popcorn out, and butter if
    you aren't vegan.

    Margarine works well
    if you're vegan, or if you
    are watching your weight.

    I've heard you can put
    tarragon on your popcorn.
    I haven't tried it.

    Why did I tell you
    to rejoice? Because we are
    about to watch a

    movie, at least if
    we have a good MPEG-2
    player close at hand.

    We need two things now,
    though, beyond our MPEG-2
    players and popcorn:

    A vector "SEC" of
    two thousand forty-eight bytes,
    disk sector contents.

    (These start off in their
    encrypted form, but we will
    leave them decrypted.)

    And a vector KEY
    of six bytes, the decrypted
    title key we'll use.

    We will use these few
    internal variables:
    t1 through t6,

    unsigned integers.
    Remember those from before?
    END is a pointer

    to the end of the
    sector, which is SEC plus two
    thousand forty-eight.

    Take the first byte of
    KEY (that's byte zero), perform
    exclusive OR with

    byte eighty-four of
    SEC. Treating the result as
    an integer, take

    OR of that with two
    hundred fifty-six. Store the
    result in t1.

    Take the next byte (which
    is byte one) of KEY, perform
    exclusive OR with

    the next byte of SEC
    (byte eighty-five, right?); store the
    result in t2.

    Take bytes two through five
    of KEY and take exclusive
    OR of these with their

    counterparts abroad,
    bytes eighty-six through eighty-nine
    of our sector SEC.

    Store this in t3.
    (It will fit because it is
    four bytes, like t3.)

    I must quote myself
    because we're going to do
    some things once again:

    (Above, in the first
    part, we talked about t3:)
    "Take its three low bits

    (you can get them by
    ANDing t3 with seven);
    store this in t4.

    Double t3, add
    eight, subtract t4; store the
    result in t3."

    (Now increment SEC
    by one hundred twenty-eight!)
    "Make t5 zero."

    Now start a loop, and
    do these things as long as SEC
    doesn't equal END:

    Use t2 for an
    index into Table Two:
    find a byte b1.

    Use t1 for an
    index into Table Three:
    find a byte b2.

    Take exclusive OR
    of b1 with b2 and
    store this in t4.

    Shift t1 right by
    a single bit (like halving);
    store this in t2.

    Take the low bit of
    t1 (so, AND it with one),
    shift it left eight bits,

    then take exclusive
    OR of that with t4; store
    this back in t1.

    (The step that's coming
    up is _slightly_ different from
    the original.)

    Use t4 for an
    index into Table Five:
    find a byte and store

    it back in t4.
    Shift t3 right by three bits,
    take exclusive OR

    of this with t3,
    shift this right by one bit, and
    take exclusive OR

    of this with t3,
    shift this right by eight bits, and
    take exclusive OR

    of this with t3,
    shift this right by five bits, and
    (No exclusive OR!

    Orange you glad I
    didn't say banana?) take
    the low byte (by AND

    with two hundred and
    fifty-five); now store this
    into t6. Phew!

    Shift t3 left eight
    bits, take OR with t6, and
    store this in t3.

    Use t6 for an
    index into Table Four:
    find a byte and store

    it in t6. Add
    t6, t5, t4; store
    the sum in t5.

    (Again, here's a change
    from the original steps:
    please don't get confused.)

    In Table One use
    the byte SEC points to as an
    index, get a byte

    there, take exclusive
    OR of that byte with the low
    byte of t5; store

    the result where SEC
    points, and increment SEC by
    one. This is all that

    has changed in these steps.
    And we're almost done! Now shift
    t5 right eight bits;

    store the result in
    t5 again. That is the
    last step in the loop.

    Now I want a drink
    (mnemonics in crypto poems
    are great!); exercise

    from singing so long
    makes me thirst for a glass of
    soda, slice of pie.

    For this is the end
    of the decryption process;
    you can now go home.



    But wait! I hear a
    voice entreating me to stay:
    "O, the Tables tell!"

    Alas, I have not
    as yet declared to you the
    CSS Tables.

    This is a major
    issue, in that I don't know
    what these tables _mean_:

    our noble guide has
    told us in outline what they
    are for, or something

    of their structure. But
    to me, a humble poet
    of mathematics,

    they are opaque, they
    are certain combinations
    of ancient, noble

    Number. Their inner
    logic, aitia, telos,
    still unknown to me.

    Herein a clear free
    speech question: would courts see fit
    to muzzle me, then,

    from speaking numbers,
    technical data, which I
    did not make and more

    cannot memorize,
    cannot explain in detail,
    cannot understand?

    I have these numbers.
    They have meaning, this is clear:
    else why suppress them?

    I wish to speak or
    let the Muse announce through me
    Tables of Numbers.

    Professor Moglen!
    Help defend my right to share
    these numbers with you!

    You called the right to
    speak with PGP like that
    to use Navaho.

    Help me then in my
    haiku quest to share these bits,
    and not be censored.

    Preserve my right to
    speak here, in this extreme, these
    mystery Tables

    the products, pieces
    of technique, which but a very
    few will understand.

    Mary Jo White, the
    United States Attorney
    for S.D.N.Y.,

    your logic erodes
    any meaningful power
    Internet speakers

    would retain against
    state censorship. Do you care?
    Have you any shame?

    Fight, brave amici,
    with effective, functional
    argumentation.

    I'll try to help by
    singing these octets, until
    court orders forbid.

    (Sad to say, I have
    removed hyphens in numbers:
    poetic license.)

    Table Zero is:
    Five, zero, one, two, three, four,
    oh, one, two, three, four.

    Table One is long:
    two to the eighth power bytes.
    Ready? Here they are:

    Fifty one; then one
    hundred fifteen; fifty nine;
    thirty eight; ninety

    nine; thirty five; one
    hundred seven; one hundred
    eighteen; sixty two;

    one hundred twenty
    six; fifty four; forty three;
    one hundred ten; then

    forty six; then one
    hundred two; one hundred and
    twenty three; then two

    hundred eleven;
    one hundred forty seven;
    two hundred nineteen;

    six; sixty seven;
    three; seventy five; then one
    hundred fifty; two

    hundred twenty two;
    one hundred fifty eight; two
    hundred fourteen; then

    eleven; and then
    seventy eight; fourteen; then
    seventy; then one

    hundred fifty five;
    eighty seven; twenty three;
    ninety five; then one

    hundred thirty; one
    hundred ninety nine; then one
    hundred thirty five;

    two hundred seven;
    eighteen; ninety; twenty six;
    eighty two; then one

    hundred forty three;
    two hundred two; one hundred
    thirty eight; then one

    hundred ninety four;
    thirty one; two hundred and
    seventeen; then one

    hundred fifty three;
    two hundred nine; zero; then
    seventy three; nine;

    sixty five; then one
    hundred forty four; then two
    hundred sixteen; one

    hundred fifty two;
    two hundred eight; one; and then
    seventy two; eight;

    sixty four; then one
    hundred forty five; sixty
    one; one hundred and

    twenty five; fifty
    three; thirty six; one hundred
    nine; forty five; one

    hundred one; then one
    hundred sixteen; sixty; one
    hundred twenty four;

    fifty two; thirty
    seven; one hundred eight; then
    forty four; then one

    hundred; one hundred
    seventeen; two hundred and
    twenty one; then one

    hundred and fifty
    seven; two hundred thirteen;
    four; seventy plus

    seven; thirteen; then
    sixty nine; one hundred and
    forty eight; then two

    hundred twenty; one
    hundred fifty six; then two
    hundred twelve; five; then

    seventy six; twelve;
    sixty eight; one hundred and
    forty nine; eighty

    nine; twenty five; then
    eighty one; one hundred and
    twenty eight; then two

    hundred one; then one
    hundred thirty seven; one
    hundred ninety three;

    sixteen; eighty eight;
    twenty four; eighty; then one
    hundred twenty nine;

    two hundred; then one
    hundred thirty six; then one
    hundred ninety two;

    seventeen; then two
    hundred fifteen; one hundred
    fifty one; then two

    hundred twenty three;
    two; seventy one; seven;
    seventy nine; one

    hundred forty six;
    two hundred eighteen; then one
    hundred fifty four;

    two hundred ten; then
    fifteen; seventy four; ten;
    sixty six; then one

    hundred fifty nine;
    eighty three; nineteen; ninety
    one; one hundred and

    thirty four; then one
    hundred ninety five; then one
    hundred thirty one;

    two hundred three; then
    twenty two; ninety four; then
    thirty; eighty six;

    one hundred thirty
    nine; two hundred six; then one
    hundred forty two;

    one hundred ninety
    eight; twenty seven; then one
    hundred seventy

    nine; two hundred and
    forty three; one hundred and
    eighty seven; one

    hundred sixty six;
    two hundred twenty seven;
    one hundred sixty

    three; two hundred and
    thirty five; two hundred and
    forty six; then one

    hundred ninety; two
    hundred fifty four; then one
    hundred eighty two;

    then one hundred and
    seventy one; two hundred
    thirty eight; then one

    hundred seventy
    four; two hundred thirty; two
    hundred fifty one;

    fifty five; then one
    hundred nineteen; sixty three;
    thirty four; then one

    hundred three; thirty
    nine; one hundred eleven;
    one hundred fourteen;

    fifty eight; then one
    hundred twenty two; fifty;
    forty seven; one

    hundred six; forty
    two; ninety eight; one hundred
    twenty seven; one

    hundred eighty five;
    two hundred forty nine; one
    hundred seventy

    seven; one hundred
    sixty; two hundred thirty
    three; one hundred and

    sixty nine; then two
    hundred twenty five; then two
    hundred forty; one

    hundred eighty four;
    two hundred forty eight; one
    hundred seventy

    six; one hundred and
    sixty one; two hundred and
    thirty two; then one

    hundred sixty eight;
    two hundred twenty four; two
    hundred forty one;

    ninety three; twenty
    nine; eighty five; one hundred
    thirty two; then two

    hundred five; then one
    hundred forty one; then one
    hundred and ninety

    seven; twenty; then
    ninety two; twenty eight; then
    eighty four; then one

    hundred thirty three;
    two hundred four; one hundred
    forty; one hundred

    ninety six; twenty
    one; one hundred eighty nine;
    two hundred fifty

    three; one hundred and
    eighty one; one hundred and
    sixty four; then two

    hundred and thirty
    seven; then one hundred and
    seventy three; two

    hundred twenty nine;
    two hundred forty four; one
    hundred eighty eight;

    two hundred fifty
    two; one hundred eighty; one
    hundred sixty five;

    two hundred thirty
    six; one hundred seventy
    two; two hundred and

    twenty eight; then two
    hundred forty five; fifty
    seven; one hundred

    twenty one; forty
    nine; thirty two; one hundred
    five; forty one; then

    ninety seven; one
    hundred twelve; fifty six; one
    hundred twenty; then

    forty eight; thirty
    three; one hundred four; forty;
    ninety six; then one

    hundred thirteen; one
    hundred eighty three; then two
    hundred and forty

    seven; one hundred
    ninety one; one hundred and
    sixty two; then two

    hundred thirty one;
    one hundred sixty seven;
    two hundred thirty

    nine; two hundred and
    forty two; one hundred and
    eighty six; then two

    hundred fifty; one
    hundred seventy eight; one
    hundred seventy

    five; two hundred and
    thirty four; one hundred and
    seventy; then two

    hundred twenty six;
    two hundred fifty five.
    That's the whole Table.

    Just when you thought it
    was safe, here is Table Two,
    which has the same length:

    Zero; one; two; three;
    four; five; six; seven; nine; eight;
    eleven; ten; then

    thirteen; twelve; fifteen;
    fourteen; eighteen; nineteen; then
    sixteen; seventeen;

    twenty two; twenty
    three; twenty; twenty one; then
    twenty seven; then

    twenty six; twenty
    five; twenty four; thirty one;
    thirty; twenty nine;

    twenty eight; thirty
    six; thirty seven; thirty
    eight; thirty nine; then

    thirty two; thirty
    three; thirty four; thirty five;
    forty five; forty

    four; forty seven;
    forty six; forty one; then
    forty; forty three;

    forty two; fifty
    four; fifty five; fifty two;
    fifty three; fifty;

    fifty one; forty
    eight; forty nine; sixty three;
    sixty two; sixty

    one; sixty; fifty
    nine; fifty eight; fifty plus
    seven; fifty six;

    seventy three; then
    seventy two; seventy
    five; seventy four;

    seventy seven;
    seventy six; seventy
    nine; seventy eight;

    sixty four; sixty
    five; sixty six; sixty plus
    seven; sixty eight;

    sixty nine; and then
    seventy; seventy one;
    ninety one; ninety;

    eighty nine; eighty
    eight; ninety five; ninety four;
    ninety three; ninety

    two; eighty two; then
    eighty three; eighty; eighty
    one; eighty six; then

    eighty seven; then
    eighty four; eighty five; one
    hundred nine; then one

    hundred eight; then one
    hundred eleven; then one
    hundred ten; then one

    hundred five; then one
    hundred four; one hundred and
    seven; one hundred

    six; one hundred; one
    hundred one; one hundred two;
    one hundred three; then

    ninety six; ninety
    seven; ninety eight; ninety
    nine; one hundred and

    twenty seven; one
    hundred twenty six; then one
    hundred twenty five;

    one hundred twenty
    four; one hundred twenty three;
    one hundred twenty

    two; one hundred and
    twenty one; one hundred and
    twenty; one hundred

    eighteen; one hundred
    nineteen; one hundred sixteen;
    then one hundred and

    seventeen; then one
    hundred fourteen; one hundred
    fifteen; one hundred

    twelve; one hundred and
    thirteen; one hundred forty
    six; one hundred and

    forty seven; one
    hundred forty four; then one
    hundred forty five;

    one hundred fifty;
    one hundred fifty one; one
    hundred forty eight;

    one hundred forty
    nine; one hundred fifty five;
    one hundred fifty

    four; one hundred and
    fifty three; one hundred and
    fifty two; then one

    hundred fifty nine;
    one hundred fifty eight; one
    hundred and fifty

    seven; one hundred
    fifty six; one hundred and
    twenty eight; then one

    hundred twenty nine;
    one hundred thirty; then one
    hundred thirty one;

    one hundred thirty
    two; one hundred thirty three;
    one hundred thirty

    four; one hundred and
    thirty five; one hundred and
    thirty seven; one

    hundred thirty six;
    one hundred thirty nine; one
    hundred thirty eight;

    one hundred forty
    one; one hundred forty; one
    hundred forty three;

    one hundred forty
    two; one hundred eighty two;
    one hundred eighty

    three; one hundred and
    eighty; one hundred eighty
    one; one hundred and

    seventy eight; one
    hundred seventy nine; one
    hundred seventy

    six; one hundred and
    seventy seven; then one
    hundred ninety one;

    one hundred ninety;
    one hundred eighty nine; one
    hundred eighty eight;

    one hundred eighty
    seven; one hundred eighty
    six; one hundred and

    eighty five; then one
    hundred eighty four; then one
    hundred sixty four;

    one hundred sixty
    five; one hundred sixty six;
    one hundred sixty

    seven; one hundred
    sixty; one hundred sixty
    one; one hundred and

    sixty two; then one
    hundred sixty three; then one
    hundred seventy

    three; one hundred and
    seventy two; one hundred
    seventy five; one

    hundred seventy
    four; one hundred sixty nine;
    one hundred sixty

    eight; one hundred and
    seventy one; one hundred
    seventy; then two

    hundred nineteen; two
    hundred eighteen; two hundred
    seventeen; then two

    hundred sixteen; two
    hundred twenty three; then two
    hundred twenty two;

    two hundred twenty
    one; two hundred twenty; two
    hundred ten; then two

    hundred eleven;
    two hundred eight; two hundred
    nine; two hundred and

    fourteen; two hundred
    fifteen; two hundred twelve; two
    hundred thirteen; two

    hundred one; then two
    hundred; two hundred three; two
    hundred two; then two

    hundred five; then two
    hundred four; two hundred and
    seven; two hundred

    six; one hundred and
    ninety two; one hundred and
    ninety three; then one

    hundred ninety four;
    one hundred ninety five; one
    hundred ninety six;

    one hundred ninety
    seven; one hundred ninety
    eight; one hundred and

    ninety nine; then two
    hundred fifty five; then two
    hundred fifty four;

    two hundred fifty
    three; two hundred fifty two;
    two hundred fifty

    one; two hundred and
    fifty; two hundred forty
    nine; two hundred and

    forty eight; then two
    hundred forty six; then two
    hundred and forty

    seven; two hundred
    forty four; two hundred and
    forty five; then two

    hundred forty two;
    two hundred forty three; two
    hundred forty; two

    hundred forty one;
    two hundred thirty seven;
    two hundred thirty

    six; two hundred and
    thirty nine; two hundred and
    thirty eight; then two

    hundred thirty three;
    two hundred thirty two; two
    hundred thirty five;

    two hundred thirty
    four; two hundred twenty eight;
    two hundred twenty

    nine; two hundred and
    thirty; two hundred thirty
    one; two hundred and

    twenty four; then two
    hundred twenty five; then two
    hundred twenty six;

    two hundred twenty
    seven. That's the end of the
    Table Two listing.

    Table Three repeats
    itself sixty-four times with
    this eight-byte sequence:

    Zero, thirty six,
    seventy three, one hundred
    nine, one hundred and

    forty six, then one
    hundred eighty two, and then
    two hundred nineteen,

    and last of all, two
    to the eighth, less one (or two
    hundred fifty five).

    Dr. Touretzky
    has a more concise account
    of what Table Four

    is for, and where it
    comes from; but for now, I think
    I will just list it:

    Zero; one hundred
    twenty eight; sixty four; one
    hundred ninety two;

    thirty two; then one
    hundred sixty; ninety six;
    two hundred twenty

    four; sixteen; then one
    hundred forty four; eighty;
    two hundred eight; then

    forty eight; then one
    hundred seventy six; one
    hundred twelve; then two

    hundred forty; eight;
    one hundred thirty six; then
    seventy two; two

    hundred; forty; one
    hundred sixty eight; then one
    hundred four; then two

    hundred thirty two;
    twenty four; one hundred and
    fifty two; eighty

    eight; two hundred and
    sixteen; fifty six; then one
    hundred eighty four;

    one hundred twenty;
    two hundred forty eight; four;
    one hundred thirty

    two; sixty eight; one
    hundred ninety six; thirty
    six; one hundred and

    sixty four; then one
    hundred; two hundred twenty
    eight; twenty; then one

    hundred forty eight;
    eighty four; two hundred twelve;
    fifty two; then one

    hundred eighty; one
    hundred sixteen; two hundred
    forty four; twelve; one

    hundred forty; then
    seventy six; two hundred
    four; forty four; one

    hundred seventy
    two; one hundred eight; then two
    hundred thirty six;

    twenty eight; then one
    hundred fifty six; ninety
    two; two hundred and

    twenty; sixty; one
    hundred eighty eight; then one
    hundred twenty four;

    two hundred fifty
    two; two; one hundred thirty;
    sixty six; then one

    hundred ninety four;
    thirty four; one hundred and
    sixty two; ninety

    eight; two hundred and
    twenty six; eighteen; then one
    hundred forty six;

    eighty two; then two
    hundred ten; fifty; then one
    hundred seventy

    eight; one hundred and
    fourteen; two hundred forty
    two; ten; one hundred

    thirty eight; and then
    seventy four; two hundred
    two; forty two; one

    hundred seventy;
    one hundred six; two hundred
    thirty four; twenty

    six; one hundred and
    fifty four; ninety; then two
    hundred eighteen; then

    fifty eight; then one
    hundred eighty six; then one
    hundred twenty two;

    two hundred fifty;
    six; one hundred thirty four;
    seventy; then one

    hundred ninety eight;
    thirty eight; one hundred and
    sixty six; then one

    hundred two; then two
    hundred thirty; twenty two;
    one hundred fifty;

    eighty six; then two
    hundred fourteen; fifty four;
    one hundred eighty

    two; one hundred and
    eighteen; two hundred forty
    six; fourteen; then one

    hundred forty two;
    seventy eight; two hundred
    six; forty six; one

    hundred seventy
    four; one hundred ten; then two
    hundred thirty eight;

    thirty; one hundred
    fifty eight; ninety four; two
    hundred twenty two;

    sixty two; then one
    hundred ninety; one hundred
    twenty six; then two

    hundred fifty four;
    one; one hundred twenty nine;
    sixty five; then one

    hundred ninety three;
    thirty three; one hundred and
    sixty one; ninety

    seven; two hundred
    twenty five; seventeen; one
    hundred forty five;

    eighty one; then two
    hundred nine; forty nine; one
    hundred seventy

    seven; one hundred
    thirteen; two hundred forty
    one; nine; one hundred

    thirty seven; then
    seventy three; two hundred
    one; forty one; one

    hundred sixty nine;
    one hundred five; two hundred
    thirty three; twenty

    five; one hundred and
    fifty three; eighty nine; two
    hundred seventeen;

    fifty seven; one
    hundred eighty five; then one
    hundred twenty one;

    two hundred forty
    nine; five; one hundred thirty
    three; sixty nine; one

    hundred and ninety
    seven; thirty seven; one
    hundred sixty five;

    one hundred one; two
    hundred twenty nine; twenty
    one; one hundred and

    forty nine; eighty
    five; two hundred thirteen; then
    fifty three; then one

    hundred eighty one;
    one hundred seventeen; two
    hundred forty five;

    thirteen; one hundred
    forty one; seventy plus
    seven; two hundred

    five; forty five; one
    hundred seventy three; one
    hundred nine; then two

    hundred and thirty
    seven; twenty nine; then one
    hundred and fifty

    seven; ninety three;
    two hundred twenty one; then
    sixty one; then one

    hundred eighty nine;
    one hundred twenty five; two
    hundred fifty three;

    three; one hundred and
    thirty one; sixty seven;
    one hundred ninety

    five; thirty five; one
    hundred sixty three; ninety
    nine; two hundred and

    twenty seven; then
    nineteen; one hundred forty
    seven; eighty three;

    then two hundred and
    eleven; fifty one; one
    hundred seventy

    nine; one hundred and
    fifteen; two hundred forty
    three; eleven; one

    hundred thirty nine;
    seventy five; two hundred
    three; forty three; one

    hundred seventy
    one; one hundred seven; two
    hundred thirty five;

    twenty seven; one
    hundred fifty five; ninety
    one; two hundred and

    nineteen; fifty nine;
    one hundred eighty seven;
    one hundred twenty

    three; two hundred and
    fifty one; seven; then one
    hundred thirty five;

    seventy one; one
    hundred ninety nine; thirty
    nine; one hundred and

    sixty seven; one
    hundred three; two hundred and
    thirty one; twenty

    three; one hundred and
    fifty one; eighty seven;
    two hundred fifteen;

    fifty five; then one
    hundred eighty three; then one
    hundred nineteen; two

    hundred and forty
    seven; fifteen; one hundred
    forty three; and then

    seventy nine; two
    hundred seven; forty plus
    seven; one hundred

    seventy five; one
    hundred eleven; then two
    hundred thirty nine;

    thirty one; then one
    hundred fifty nine; ninety
    five; two hundred and

    twenty three; sixty
    three; one hundred ninety one;
    one hundred twenty

    seven; two hundred
    fifty five. And that's the end
    of the fourth Table.

    (You'll get Table Five
    if you flip each bit in the
    Table Four, supra.)

    Have mercy on me,
    Lord, and lesser judges, and
    on Jon Johansen.

  6. Next trip, is being planned for march 26-28.

    And maybe I'll be able to squeeze in another trip before that one... sometime in february 20-22. But this I'm not 100% sure yet.

    What do you mean poor three way in my avatar? Dude, they were falling sooo slooooowwwww, I had to do something to speed things up!!! :D:D:D

    ~Chivo

  7. I have to say... everytime I go skydiving to TX (about 6 trips/year), I MUST go to Freebirds! It is awesome!

    So what's the difference to the one in Santa Barbara? I've never been there, but if its the same as the ones in TX, I'll have to check it out!

    ~Chivo

  8. Tips for race day....

    Drink enough water before the run. Enough, don't over do it!

    Pace yourself. You're 13.1 miles away from the finish line.

    Don't wear new shoes. Use ones that you've tamed down.

    Coolmax/climacool clothing. They help keep the moisture out.

    Nipple guards. Seriously. Don't ask, just make sure you use them for the run.

    If you usually get blisters on your toes, put vaseline between your toes before the race. It'll be yucky at first, but you'll get used to it.

    Can't think of anything else for now. Besides, 1/2 a marathon isn't that bad. These tips are for marathons, but I'm sure they'll come in handy too.

    ~Chivo