In this essay I tackle the problem of solving every Sudoku puzzle.

One of my co-workers had been having so much trouble w/ spyware when his wife would surf over to various sites (contests, etc) and the W98 box would get dragged down.

This essay is a companion to my separate essay on and my essay on.

Recently secure processors have become popular (eg. IBM Security blue), where the users
of the computer themselves cant read the contents of memory since it is encrypted using
a secret on chip key. (users cannot get to know this key).

First we have to agree on some notation.

This implies that each squaremust have a different value from any of its peers.

"Penetrate and Patch" can be applied to human beings, as well as software, in the form of user education. On the surface of things, the idea of "Educating Users" seems less than dumb: education is always good. On the other hand, like "Penetrate and Patch" if it was going to work, it would have worked by now. There have been numerous interesting studies that indicate that a significant percentage of users will trade their password for a candy bar, and the Anna Kournikova worm showed us that nearly 1/2 of humanity will click on anything purporting to contain nude pictures of semi-famous females. If "Educating Users" is the strategy you plan to embark upon, you should expect to have to "patch" your users every week. That's dumb.

Computing Services Center, Room CS00 8 a.m. - Midnight

It turns out that the fundamental operation is not assigning a value, butrather eliminating one of the possible values for a square, which weimplement with .

5 7 3 |2 9 1 |6 8 4 I1 I2 I3| I4 I5 I6| I7 I8 I9 1 .

"Enumerating Badness" is the idea behind a huge number of security products and systems, from anti-virus to intrusion detection, intrusion prevention, application security, and "deep packet inspection" firewalls. What these programs and devices do is outsource your process of knowing what's good. Instead of you taking the time to list the 30 or so legitimate things you need to do, it's easier to pay $29.95/year to someone else who will try to maintain an exhaustive list of all the evil in the world. Except, unfortunately, your badness expert will get $29.95/year for the antivirus list, another $29.95/year for the spyware list, and you'll buy a $19.95 "personal firewall" that has application control for network applications. By the time you're done paying other people to enumerate all the malware your system could come in contact with, you'll more than double the cost of your "inexpensive" desktop operating system.

®Over 35,000 Web Pages, or click below

An eye-opening piece if it were on NYT or something. I suppose, your target audiance probably know much of this well already. Have you thought about writing in a more non-techie medium?

1 6 4 |8 7 5 |2 9 3 Every square has exactly 3 units and 20 peers.

One clear symptom that you have a case of "Enumerating Badness" is that you've got a system or software that needs signature updates on a regular basis, or a system that lets past a new worm that it hasn't seen before. The cure for "Enumerating Badness" is, of course, "Enumerating Goodness." Amazingly, there is virtually no support in operating systems for such software-level controls. I've tried using Windows XP Pro's Program Execution Control but it's oriented toward "Enumerating Badness" and is, itself a dumb implementation of a dumb idea.