[moore] The Cardinal and the Corpse … Go watch this little-seen 1992 docudrama by Iain Sinclair & Chris Petit. Alan Moore appears as himself along with Derek Raymond, Michael Moorcock, Tony Lambrianou amongst others.
[comics] Fascist Spain meets British punk: the subversive genius of Judge Dredd … Remembering Carlos Ezquerra – who sadly died earlier this week. ‘Dredd looks like no other comic character before or since. His design makes no practical sense. It has no symmetry or logic to it. No one at the time thought it would work. “Fucking hell,” his co-creator John Wagner said when he first saw the designs. “He looks like a Spanish pirate.” But somehow, for reasons no one can quite articulate, it is perfect. Ezquerra’s art exploded off the page. It was dynamic and gritty, and yet always unfussy, practical and full of economic storytelling. His thick slabs of ridged inks and expressive characters are embedded in the brains of countless readers.’
[movies] Introducing the Horror Oscars: The 40 Best Scary Movies Since ‘Halloween’ … Great list of the horror movies since 1979 onwards. ‘1980 – The Shining: Slowly but surely in the 1980s, consensus started to shift—the box office grew steadily, the critical reputation was bolstered, and within a decade, The Shining was an American classic. Why? Like Alien, it is technically magnificent and eerily tense, like waiting for an ocean of blood to pour from an elevator shaft. The Krzysztof Penderecki score is deeply unnerving. Shelley Duvall, with her long face, eight-ball eyes, and pallid complexion, is the most vulnerable subject of spousal torture ever put on screen. There are moments of shock, psychological torture, and bloodcurdling terror. (RIP, Scatman Crothers.) It’s so mystifying and intoxicating, that it has become the subject of wildly imaginative conspiracy theorizing.’
[comics] Classic British Comics: Who Owns What? … A list of what publishers own which characters in British comics. ‘Over the years, a number of companies have purchased rights to various comic brands and characters, often prompting questions about whether that company will start publishing collections of characters they don’t own on social media. This list, based where possible on information supplied by the companies listed, attempts to identify the comics key companies own, and is largely focused on “classic” brands rather than ongoing titles such as 2000AD, Beano, Commando and The Phoenix.’
[tech] Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow … Why Boeing 787s need to be rebooted regularly to avoid integer overflows. ‘Basically it says that all Boeing 787 Dreamliners have to be switched off every 248 days. If they are not reset then the generator control units GCUs will go into failsafe mode and the plane will lose all electrical power. Why exactly? To quote the FAA directive: This condition is caused by a software counter internal to the GCUs that will overflow after 248 days of continuous power. We are issuing this AD to prevent loss of all AC electrical power, which could result in loss of control of the airplane.’
[books] 100 Best Thrillers of All Time … long, varied book list with something for everyone. ‘Jaws by Peter Benchley – No one on this book’s editorial team, not even Benchley himself, thought a novel about a killer shark would resonate with readers. Benchley was criticized for the lack of characterization when it came to the human characters, but readers praised the intense scenes featuring Jaws himself. The novel’s inclusion in the Book of the Month Club captured the attention of Steven Spielberg, who turned it into the seventh-highest-grossing film of all time. Years later, Benchley expressed guilt over giving sharks a bad name, insisted Jaws was fiction, and became a passionate marine life conservationist.’
[mind] Your Inner Mind Is a Work of Imagination … A fascinating look at why the unconscious mind might be a myth. ‘The reality is that the things we’re conscious of—experiences, thoughts, fragments of conversation—are completely different in type from the things we’re unconscious of—all these mysterious brain processes, which lay down and retrieve memories, piece fragments of information together, and so on. The brain is doing lots of unconscious work—but it is not thought in any way we understand it. At the everyday level, thought is what flows through my mind—images, pains, fragments of language. But the unconscious brain activity that generates such thoughts is not more of the same. If we could understand the processes by which billions of neurons cooperate to help us recognize a face or interpret a fragment of speech, we would find these as unrelated to the stream of consciousness as the operation of the liver.’
[trump] The Original Donald Trump … Profile of Roy Cohn and his influence on Donald Trump. ‘Trump practiced bigotry on a grand scale, was a world-class liar, and ripped off customers, investors, and the city itself. Yet for many among New York’s upper register, there was no horror he could commit that would merit his excommunication. As with Cohn before him, the more outrageously and reprehensibly Trump behaved, the more the top rungs of society were titillated by him. They could cop out of any moral judgments or actions by rationalizing him as an entertaining con man: a cheesy, cynical, dumbed-down Gatsby who fit the city’s tacky 1980s Gilded Age much as F. Scott Fitzgerald’s more romantic prototype had the soigné Jazz Age of the 1920s. And so most of those who might have stopped Trump gawked like the rest of us as he scrambled up the city’s ladder, grabbing anything that wasn’t nailed down.’
[email] There is no non-wanky way to sign off an email, study finds … ‘Professor Henry Brubaker said: “Does anyone actually know what ‘kind regards’ means? Also it sounds a bit drippy and outdated, as if you’ve somehow received an email from a Victorian aunt. “An abrupt ‘thanks’ sounds sarcastic, or as we academics would describe it, ‘a bit pissy’.’
[tech] It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out … a deep technical dive into the difficulties around proving if a computer has tampered been with. ‘There is a sneaky class of attack, called “evil maid” attacks, that disk encryption alone cannot protect against. Evil maid attacks work like this: An attacker (such as a malicious hotel housekeeper, for example) gains temporary access to your encrypted laptop. Although they can’t decrypt your data, they can spend a few minutes tampering with your laptop and then leave it exactly where they found it. When you come back and type in your credentials, now you have been hacked. Exactly how an evil maid attack would work against your laptop depends on many factors: the type of computer you use, what operating system you use, which disk encryption software you use, and the configuration of firmware used to boot your computer, firmware which I’ll call “BIOS,” although it can also go by acronyms like EFI and UEFI. Some computers have considerably better technology to prevent evil maid attacks than others – for example, attackers have to do more advanced tampering to hack a Windows laptop encrypted with BitLocker than they do to hack a Mac laptop encrypted with FileVault (as of now, anyway) or a Linux laptop encrypted with LUKS.’
[docu] Adam Curtis: “Social media is a scam” … Brief Interview with Adam Curtis. ‘I’ve always thought John Le Carré did spies a great service because he made it seem as if there were endless depths of mystery and darkness when in fact, if you’ve ever researched the spies, they are a) boring and b) useless. I mean really, really useless. I researched MI5 once and they hardly ever manage to capture any traitors … it’s usually someone else who points them in the right direction.’
[iphone] iPhones are hard to use … some nicely-done criticism of Apple’s iPhone interface. ‘You have to shake your iPhone (or giant iPad Pro) to undo an action. You discover this by accident as you get up from a restaurant table with your phone in your hand, only to be greeted with an Undo Typing dialogue box. Unless you are an expert, you have no idea what just happened.’
[arcade] Atari Asteroids: Creating a Vector Arcade Classic … the inside story behind Atari Asteroids. ‘Production started in late 1979. In an interview back in 1981, Mary Takatsuno, a marketing analyst at Atari, gave an interesting insight to the reaction to the game within the company: “Asteroids is the only game that ever stopped production lines in our plant. At break time, the entire assembly line would run over to play the machines that were ready to be shipped out. With other games, the guys would just assemble them and box them up, and that was that. But with Asteroids, nobody wanted to work.”‘
After their arrests, over the course of nearly nine combined hours of interviews, they claim that they were compelled to kill her by a monster they had encountered online. When discovered, the girls were making their way to him, heading to Wisconsin’s Nicolet National Forest on foot, nearly 200 miles north. They were convinced that, once there, if they pushed farther and farther into the nearly 700,000-acre forest, they would find the mansion in which their monster dwells and he would welcome them.
Morgan and Anissa packed for the trip—granola bars, water bottles, photos by which to remember their families. (As Anissa tells a detective, “We were probably going to be spending the rest of our lives there.”) Though they were both a very young, Midwestern twelve, they had been chosen for a dark and unique destiny which none of their junior-high classmates could possibly understand, drawn into the forest in the service of a force much greater and more mysterious than anything in their suburban-American lives. What drew them out there has a name: Slender Man, faceless and pale and impossibly tall. His symbol is the letter X.