Not So Hip Thread Chat

Discussion in 'Random Thoughts' started by Sleeping Caterpillar, Aug 1, 2015.

  1. secret_thinker

    secret_thinker Lifetime Supporter Lifetime Supporter

    Messages:
    1,570
    Likes Received:
    1,316
    I think the US people would say "rednecks"rather than ferals hahaha
     
  2. themnax

    themnax Senior Member

    Messages:
    27,693
    Likes Received:
    4,507
    that depends. ferals has another meaning for furs. feral is when you have a completely animal body, as opposed to anthro, which is a mix of animal and human features.
     
  3. guerillabedlam

    guerillabedlam _|=|-|=|_

    Messages:
    29,419
    Likes Received:
    6,307
    Was chat down again? I couldn't get in chat tonight.
     
  4. thedope

    thedope glad attention Lifetime Supporter

    Messages:
    22,574
    Likes Received:
    1,207
    The tomb is empty
     
  5. Piaf

    Piaf Senior Member

    Messages:
    272
    Likes Received:
    1
    The Empty Tomb

    20 Early on the first day of the week, while it was still dark, Mary Magdalene went to the tomb and saw that the stone had been removed from the entrance. 2 So she came running to Simon Peter and the other disciple, the one Jesus loved, and said, “They have taken the Lord out of the tomb, and we don’t know where they have put him!”3 So Peter and the other disciple started for the tomb. 4 Both were running, but the other disciple outran Peter and reached the tomb first. 5 He bent over and looked in at the strips of linen lying there but did not go in. 6 Then Simon Peter came along behind him and went straight into the tomb. He saw the strips of linen lying there, 7 as well as the cloth that had been wrapped around Jesus’ head. The cloth was still lying in its place, separate from the linen. 8 Finally the other disciple, who had reached the tomb first,also went inside. He saw and believed. 9 (They still did not understand from Scripture that Jesus had to rise from the dead.) 10 Then the disciples went back to where they were staying.
     
  6. thedope

    thedope glad attention Lifetime Supporter

    Messages:
    22,574
    Likes Received:
    1,207
    Very well it is a story what does this mean? The story is of current events If I say the tomb is empty.

    It is not flesh and blood we deal with but principles and powers

    A tomb is a crypt. If the tomb is empty there is nothing in the crypt

    A crypt is a hidden vault

    To vault is to provide a building or room with an arched roof.

    The stone the builders rejected becomes the capstone

    Cryptography or cryptology; from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively[1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).[2] More generally, it is about constructing and analyzing protocols that block adversaries;[3]various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation[4]are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics,computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
    Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing the same. Since World War I and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.
    Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances, e.g., improvements in integer factorization algorithms, and faster computing technology require these solutions to be continually adapted. There exist information-theoretically secureschemes that provably cannot be broken even with unlimited computing power—an example is the one-time pad—but these schemes are more difficult to implement than the best theoretically breakable but computationally secure mechanisms.
    The growth of cryptographic technology has raised a number of legal issues in the information age. Cryptography's potential for use as a tool for espionageand sedition has led many governments to classify it as a weapon and to limit or even prohibit its use and export.[5] In some jurisdictions where the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption keys for documents relevant to an investigation.[6] Cryptography also plays a major role in digital rights management and piracy of digital media.[7]
     
  7. soulcompromise

    soulcompromise Member Lifetime Supporter

    Messages:
    22,669
    Likes Received:
    11,815
    A bit of the ole mumbo jumbo!
     
    1 person likes this.
Tags:
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice