Profile cover photo
Profile photo
Ove Daae Lampe
427 followers -
Visualization, GPU's, Python, C++ and my two kids :)
Visualization, GPU's, Python, C++ and my two kids :)

427 followers
About
Ove's posts

Post has attachment
I built a useless box!!
It has a tempting switch on top.
But what does it do?


This build has been several years in the making. I finished the electrical diagram four years ago and the electronics two years ago. Then the wait was to find a suitable box.
A nine volt battery makes the motor and finger trigger so fast that you won't see it coming :)
Still not quite happy with the lid, but hey, it's working.

Post has attachment
Got a call from phone number 0192 just now. A person with a strong Indian accent presented himself as coming from Microsoft Technical Department. He asked me to confirm that I was Ove Daae Lampe, and said that my windows computer was hacked.
"Sir, your computer has lots of hacker. It is flagged and is downloading many worm."
To verify that they knew what they were talking about they listed up "my secret windows code": 888DCA60-FC0A-11CF-8F0F-00C04FD7D062
Then they had me press windows key + R and write cmd (bringing up the command console). And in the command console they had me write "ASSOC". This command basically lists up what applications are associated with which file endings. They particularly had me look at the last line, (which was not the last line in my case). And said that that last line had my secret computer ID. That line should read like this:
.zfsendtotarget=CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}
And I should confirm that that code (888 thingie) was the same as they previously listed up. Of course it was. (they now probably thought they had my trust).
That code however is not secret, and is the same on pretty much all windows computers, as it is the com object class ID for "send to zipped folder" shell command.
Then as proof that my computer was hacked they had me write the command "VERIFY". and read out the result, it said "VERIFY is OFF". There you have it.. the evil hackers has turned off my ancient dos file verification.
Now the person I was talking to said my computer was in bad shape and I had to talk to his manager in order to fix it.
The new person (with an ever stronger accent) identified himself as Michael Williams (even the same name as they all use in this scam, which I found out googling this scam before he even introduced himself). He re-iterated that he came from the technical department of Microsoft and that when I bought my computer my secret computer license was registered with them. In order to make sure that I could get rid of all the hackers on my computer I needed to closely follow what he had me do and to trust him. He then had me open the command console and then type in a web address, basically it’s webpage that using “logmein” will give the person on the phone full access to your computer.
The web address he gave me was fairly simple, but since I don’t like these scammers, I decided to waste some of their time (at the same time working, as to not waste too much of my own time). I slowly “typed” in the address he read out in very many ways for approx. 35 minutes, as he got angrier and angrier, in my complete incompetence in typing in the web address. Then he gave up and hung up :)
I was very tempted to fire up my virtual machine and give them access to a windows image there, but, as that would put them on the inside of my company network that was a no go :/.
Please, do as me, waste their time, but don’t fall for this or similar scams. Microsoft won’t call you because your “computer is full of hacker”, or even anything much more believable.
Ps. At which point do you think I should tell them that I was currently working on a linux machine?
Photo

Post has shared content
Pretty awesome

Post has attachment
It's that time of year again... Why no marshmallow for me yet 😢 ?
#android #marshmallow #nexus #android6 
Animated Photo

Post has attachment
The eclipse was (is) quite spectacular this night
Photo

Post has attachment
Found a bug in my code :)

Photo

Post has shared content
Pretty amazing 😱
Would it be wrong to put one of those on my wall?
Recreating photos in the style of famous artists

In another example of how Deep Neural Networks (DNNs) can be used to create interesting works of art, a group of German researchers have released the paper, A Neural Algorithm of Artistic Style (http://goo.gl/HsFR0C), that introduces a system that renders an input photo in the artistic style of a given piece of art while preserving its overall content.

In their paper, the authors describe how the representations of content and style in their Convolutional Neural Network (CNN) are separable, making it possible to use neural representations to separate and recombine content and style of arbitrary input images. To learn more, read the full paper. For access to their algorithm, visit http://goo.gl/jB7ovU
Photo

Post has attachment
Taipei and the 101 from elephant mountain
Photo

Post has attachment
Seen from the air above Malaysia. Mesmerizing no?

Photo

Post has shared content
Inside St. Peter's cathedral

Shot with my 650d using an 8mm lens
Photo
Wait while more posts are being loaded