<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=172.68.65.192</id>
		<title>explain xkcd - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=172.68.65.192"/>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php/Special:Contributions/172.68.65.192"/>
		<updated>2026-04-16T15:35:13Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=739:_Malamanteau&amp;diff=202741</id>
		<title>739: Malamanteau</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=739:_Malamanteau&amp;diff=202741"/>
				<updated>2020-12-05T10:31:14Z</updated>
		
		<summary type="html">&lt;p&gt;172.68.65.192: Replaced content with &amp;quot;Offriamo i servizi SEO più efficaci per diversi tipi vittoria risorse web. Puoi selezionare tra i nostri piani standard o richiedere un SEO personalizzato che sarà adatt...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Offriamo i servizi SEO più efficaci per diversi tipi vittoria risorse web.&lt;br /&gt;
Puoi selezionare tra i nostri piani standard o richiedere un SEO personalizzato che sarà adattato appositamente per il tuo sito web.&lt;br /&gt;
Gli effetti dei nostri sforzi SEO di solito compaiono entro 30 giorni dall’inizio del nostro lavoro.&lt;br /&gt;
&lt;br /&gt;
Puoi verificarlo scegliendo il nostro piano SEO PROVA (gratis)&lt;br /&gt;
&lt;br /&gt;
vai da link http://merky.de/dvmgcc&lt;/div&gt;</summary>
		<author><name>172.68.65.192</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1777:_Dear_Diary&amp;diff=196876</id>
		<title>1777: Dear Diary</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1777:_Dear_Diary&amp;diff=196876"/>
				<updated>2020-09-07T18:38:55Z</updated>
		
		<summary type="html">&lt;p&gt;172.68.65.192: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1777&lt;br /&gt;
| date      = December 26, 2016&lt;br /&gt;
| title     = Dear Diary&lt;br /&gt;
| image     = dear_diary.png&lt;br /&gt;
| titletext = Dear Diary: UNSUBSCRIBE&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
[[Black Hat]] is writing in a diary (probably his, but possibly not; see below).  His entry starts with the common idiom &amp;quot;Dear diary&amp;quot;. In a regular diary entry, this opening is used to give the impression of writing to a trusted friend, the diary being anthropomorphized to take that friend's role. However, where other people would write about their day or put their feelings into words, Black Hat's diary entry consists of a standard phishing scam attempting to request some private information in exchange for a large cash amount which does not exist. In this case, the scam is the infamous [http://knowyourmeme.com/memes/nigerian-scams Nigerian Royalty scam], where the 'royalty' needs bank details to give money, when it will in fact be taken.  [[Black Hat]] apparently is so used to tricking people that even his own anthropomorphized diary is not safe from his pranks. Alternatively, the entry is intended for anyone who looks at his diary without his permission. It's also possible he has obtained someone else's diary and is somehow trying to scam the diary's owner, although it's not clear how that might work.  Or, since it is a rather obvious scam, he may simply being trying to scare the diary's owner, perhaps the same child as he traumatized in [[1776|the previous comic]] with a reindeer mutated to look like a spider.&lt;br /&gt;
&lt;br /&gt;
This comic creates a stark contrast by putting together elements that seem similar, but do not belong together, for comedic effect.&lt;br /&gt;
* Combining old-school hand written media (a diary) and memes from the electronic age (a phishing attempt as usually found in spam mail).&lt;br /&gt;
* Contrasting the very personal, intimate atmosphere of &amp;quot;Dear diary&amp;quot; with something that is normally automatically replicated to millions of mail addresses.&lt;br /&gt;
* Opening up with a sentence that might come from a real personal diary (many people will fantasize about being rich or famous in their diaries), and following up with something that nobody would expect from a personal diary.&lt;br /&gt;
&lt;br /&gt;
It is possible that the diary is actually the journal from the [[:Category:Journal|Journal]] series, and that ever since being outdone by [[Danish]], he no longer uses it for recording all the things he would say if he were nice.&lt;br /&gt;
&lt;br /&gt;
The title text is similar to [[1675: Message in a Bottle]], which also uses the word &amp;quot;unsubscribe&amp;quot; in an unusual way. The title text also mimics a standard way to get off some mailing lists, so perhaps it's [[Randall]]'s diary that Black Hat is molesting, and therefore the title-text is Randall expressing a desire to be disassociated from it.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Black Hat is seated at a table, writing with a pencil in a diary.]&lt;br /&gt;
&lt;br /&gt;
:Writing: Dear Diary, &lt;br /&gt;
:Writing: Hello. I am the Crown Prince of Nigeria. I have recently come into a large fortune, but... &lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics featuring Black Hat]]&lt;/div&gt;</summary>
		<author><name>172.68.65.192</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=Talk:2291:_New_Sports_System&amp;diff=190326</id>
		<title>Talk:2291: New Sports System</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=Talk:2291:_New_Sports_System&amp;diff=190326"/>
				<updated>2020-04-10T14:52:34Z</updated>
		
		<summary type="html">&lt;p&gt;172.68.65.192: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--Please sign your posts with ~~~~ and don't delete this text. New comments should be added at the bottom.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note that the title text goes at the end of the explanation, not within the transcript section. I've removed it twice now. [[User:Ianrbibtitlht|Ianrbibtitlht]] ([[User talk:Ianrbibtitlht|talk]]) 00:41, 9 April 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
I really want to see this happen now :D [[Special:Contributions/172.68.174.128|172.68.174.128]] 01:18, 9 April 2020 (UTC)&lt;br /&gt;
:Alright, who programs the VR software and who organises the tournament? :D [[User:Fabian42|Fabian42]] ([[User talk:Fabian42|talk]]) 03:17, 9 April 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
I find myself wondering how easy it would be to merge the video feeds from the different players, so viewers can see everyone as if it were a traditional match. If each arena has a camera in the same place, it shouldn't be that hard to isolate parts of the image which are different from a static image; but I'm not sure what would be the best method for determining which player is in front when they overlap. I guess you need some method of tracking the players' positions in any case, to work out who's touching the ball. Would the technology used for home VR be easily adaptable to a full size stadium? - [[User:Angel|Angel]] ([[User talk:Angel|talk]]) 10:50, 9 April 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
Another way to do it: Each player has their own ball. But only one of the balls is &amp;quot;live&amp;quot; at any given time. Maybe it lights up or something. If another ball contacts the live one, it changes places, allowing you to effectively &amp;quot;tackle&amp;quot; the player who's in possession. Would mean that ball physics are more realistic, while still maintaining the confusion. Maybe also give the players little shock collars to let them know if they collided with another player. (Is running through another player a foul in basketball?) - [[User:Angel|Angel]] ([[User talk:Angel|talk]]) 10:55, 9 April 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
:And that's just got me thinking that [[wikipedia:BASEketball|BASEketball]] would be entirely playable in this form - [[User:Angel|Angel]] ([[User talk:Angel|talk]]) 11:13, 9 April 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
This reminds me very much of the chess variant [https://en.wikipedia.org/wiki/Kriegspiel_(chess) Kriegspiel]. [[Special:Contributions/162.158.154.73|162.158.154.73]] 10:55, 10 April 2020 (UTC)&lt;br /&gt;
: You beat me that &amp;gt;&amp;lt; much...I hate you so much that I corrected your typo :-) [[Special:Contributions/172.68.65.192|172.68.65.192]] 14:52, 10 April 2020 (UTC)&lt;/div&gt;</summary>
		<author><name>172.68.65.192</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=2088:_Schwarzschild%27s_Cat&amp;diff=167247</id>
		<title>2088: Schwarzschild's Cat</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=2088:_Schwarzschild%27s_Cat&amp;diff=167247"/>
				<updated>2018-12-21T18:18:22Z</updated>
		
		<summary type="html">&lt;p&gt;172.68.65.192: /* Explanation */ replaced ‘reach’ with ‘approach’. cats cannot reach infinity, but a sufficiently small cat will approach it.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 2088&lt;br /&gt;
| date      = December 21, 2018&lt;br /&gt;
| title     = Schwarzschild's Cat&lt;br /&gt;
| image     = schwarzschilds_cat.png&lt;br /&gt;
| titletext = Cats can be smaller than the critical limit, but they're unobservable. If one shrinks enough that it crosses the limit, it just appears to get cuter and cuter as it slowly fades from view.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|Created by a SMALL CAT WITH NO CONCEPT OF FIELD EQUATIONS. Please mention here why this explanation isn't complete. Do NOT delete this tag too soon.}}&lt;br /&gt;
This comic is primarily a wordplay joke about the {{w|Schwarzschild radius}}, or the radius surrounding a black hole corresponding to the {{w|event horizon}}. The event horizon, in turn, is the limit from which nothing can leave a black hole. The joke is that, apparently, smaller cats are cuter, and there is a limit below which a sufficiently small cat (but larger than zero) will approach infinite cuteness.&lt;br /&gt;
&lt;br /&gt;
It's also a reference to the {{w|Schrodinger's cat}} thought-experiment, since the name &amp;quot;Schrodinger&amp;quot; is easily confused with &amp;quot;Schwarzschild&amp;quot; and both men were interested in quantum physics.&lt;br /&gt;
&lt;br /&gt;
The title text makes multiple allusions. First, it alludes to what happens when an object falls into a black hole. From an outside observer's point of view, such objects appear to slow down and take an infinite amount of time to cross the Schwarzschild radius due to the time dilation of {{w|General relativity}}. The object's photons will become increasingly red-shifted, fading as they lose energy to the black hole's gravity well. Second, it's a play on the {{w|Cheshire Cat}} from Alice in Wonderland, which slowly fades from view until only its grin remains.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
{{incomplete transcript|Do NOT delete this tag too soon.}}&lt;br /&gt;
:[A graph is shown. The x-axis is labeled &amp;quot;Cat size&amp;quot; and the y-axis, &amp;quot;Cat cuteness&amp;quot;. Graphed is a function coming down from infinity then beginning to level off and not reaching zero on-screen. At the top end of the function is the text &amp;quot;Schwarzschild's Cat&amp;quot; and an arrow to indicate it. In line with the top end of the function is a vertical dashed line. Under the function is the text &amp;quot;Critical limit&amp;quot; and arrows indicating the space between the y-axis and dashed line.]&lt;br /&gt;
{{comic discussion}}&lt;/div&gt;</summary>
		<author><name>172.68.65.192</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=2083:_Laptop_Issues&amp;diff=166844</id>
		<title>2083: Laptop Issues</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=2083:_Laptop_Issues&amp;diff=166844"/>
				<updated>2018-12-10T17:18:23Z</updated>
		
		<summary type="html">&lt;p&gt;172.68.65.192: Added some part of the alt-text explaination.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 2083&lt;br /&gt;
| date      = December 10, 2018&lt;br /&gt;
| title     = Laptop Issues&lt;br /&gt;
| image     = laptop_issues.png&lt;br /&gt;
| titletext = Hang on, we got a call from the feds. They say we can do whatever with him, but the EPA doesn't want that laptop in the ocean. They're sending a team.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|Edited by a beleaguered tech support user. Horribly incomplete. Do NOT delete this tag too soon.}}&lt;br /&gt;
&lt;br /&gt;
[[Cueball]] goes to tech support with his laptop. [[Hairy]] and [[Ponytail]] are waiting behind the counter; one has dealt with [[Category:Cueball Computer Problems|Cueball's bizarre tech issues]] before, and warns the other. Sure enough, Cueball sets the computer down and offers a detailed list of the arcane problems his computer is giving him.&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| ''My laptop's battery won't hold a charge.''&lt;br /&gt;
| A common problem; as batteries are frequently charged and recharged, their capacity for storing charge deteriorates. However...&lt;br /&gt;
|-&lt;br /&gt;
| ''Tried [replacing the battery]. Now the new ones won't either.''&lt;br /&gt;
| ...the problem persisting despite the battery's replacement fails to make any significant sense. It my be a problem with his laptop's charging port, but his comment that the &amp;quot;new ones&amp;quot; now fail to hold a charge seems to imply it is persisting despite the replacement batteries being used elsewhere after attempting to use them for his laptop and failing..&lt;br /&gt;
|-&lt;br /&gt;
| ''Also, random files get corrupted on the first of every month. Factory reset didn't help either.''&lt;br /&gt;
| Some devices may be scheduled to do a &amp;quot;disk cleanup&amp;quot; on the first of every month. Somehow, this task is corrupting files that should be kept.&lt;br /&gt;
|-&lt;br /&gt;
| ''When it's plugged in, I get static from my plumbing.''&lt;br /&gt;
| Static charge from a portable device while it's charging is common. Static charge from ''elsewhere in the building'' while the portable device is charging... not so much.&lt;br /&gt;
|-&lt;br /&gt;
| ''And it reboots if someone uses an arc welder nearby''&lt;br /&gt;
| Setting aside the question of why Cueball is using his laptop around an arc welder (although he doesn't specify what qualifies as &amp;quot;nearby&amp;quot;), the high power draw of an arc welder will occasionally cause less devoted power supplies to flicker. For some reason, this is causing his laptop to reboot instead.&lt;br /&gt;
|-&lt;br /&gt;
| ''Transition(R) lenses go dark when exposed to the screen''&lt;br /&gt;
| Transition lenses in prescription glasses darken when exposed directly to UV rays; this is to avoid the wearer any hassle of needing prescription sunglasses. This seems to indicate that the screen of Cueball's laptop is emitting UV radiation.&lt;br /&gt;
|-&lt;br /&gt;
| ''and when I open too many tabs, it fogs any nearby photographic film.''&lt;br /&gt;
| The screen would have to emitting X-rays that can pass through the film's container and expose the film. This may be a reference to the scifi book series The Three Body Problem, where one character finds that all of his pictures become blurred, no matter how they were taken.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The sheer incongruity of everything Cueball has reported, in combination with past issues, leads Hairy to report that his manager has authorized Cueball and his laptop be thrown into the ocean so that their plague upon the earth may no longer spread. Cueball, having surrendered to his inability to use technology, accepts this without objection.&lt;br /&gt;
&lt;br /&gt;
The alt-text contains mention of the Environmental Protection Agency, (EPA) a part of the United States government responsible for preventing pollution. In this case, another part of the joke is that the laptop is considered toxic waste, and therefore the EPA, as part of their mission, is sending a hazmat team to collect the laptop and safely dispose of it.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
{{incomplete transcript|Do NOT delete this tag too soon.}}&lt;br /&gt;
&lt;br /&gt;
:[Cueball is walking past a sign reading &amp;quot;Tech Support,&amp;quot; with a right-pointing arrow and carrying a laptop.]&lt;br /&gt;
:Off panel voice #1: Oh, No.&lt;br /&gt;
:Off panel voice #2: What?&lt;br /&gt;
:Off panel voice #1: This guy.  He has the worst tech problems.&lt;br /&gt;
&lt;br /&gt;
:[Cueball at tech support desk with closed laptop on desk.  Short-hair guy and Ponytail are there.]&lt;br /&gt;
:Cueball: My laptop's battery won't hold a charge.&lt;br /&gt;
:Short-hair guy: We can replace it.&lt;br /&gt;
:Cueball: Tried that.  Now the new ones won't either.&lt;br /&gt;
&lt;br /&gt;
:[Close-up of Cueball]&lt;br /&gt;
:Cueball: Also, random files get corrupted on the first day of every month.  Factory reset didn't help.&lt;br /&gt;
:Off panel voice #2: You weren't kidding.&lt;br /&gt;
&lt;br /&gt;
:[Close-up of Cueball]&lt;br /&gt;
:Cueball: When it's plugged in, I get static shocks from my plumbing.&lt;br /&gt;
:Off panel voice: What the...&lt;br /&gt;
:Cueball: And it reboots if someone uses an arc welder nearby.&lt;br /&gt;
&lt;br /&gt;
:[Same tableau as second panel except that the laptop is slightly open now.]&lt;br /&gt;
:Cueball: Transitions® lenses go dark when exposed to the screen, and when I open too many tabs, it fogs nearby photographic film.&lt;br /&gt;
:Short-hair guy: We don't usually do this, but I've gotten permission from my manager to have you and the laptop hurled into the ocean.&lt;br /&gt;
:Cueball: That's probably for the best.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;/div&gt;</summary>
		<author><name>172.68.65.192</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1138:_Heatmap&amp;diff=166636</id>
		<title>1138: Heatmap</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1138:_Heatmap&amp;diff=166636"/>
				<updated>2018-12-04T01:19:12Z</updated>
		
		<summary type="html">&lt;p&gt;172.68.65.192: /* Explanation */ /this times on/this time on/&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1138&lt;br /&gt;
| date      = November 23, 2012&lt;br /&gt;
| title     = Heatmap&lt;br /&gt;
| image     = heatmap.png&lt;br /&gt;
| titletext = There are also a lot of global versions of this map showing traffic to English-language websites which are indistinguishable from maps of the location of internet users who are native English speakers.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
Another of [[Randall|Randall's]] many [[:Category:Pet Peeves|Pet Peeves]], this time on [[:Category:Maps|maps]]. This one has also been numbered #208, like the first comic on the subject [[238: Pet Peeve 114|238: Pet Peeve #114]].&lt;br /&gt;
&lt;br /&gt;
In the comic, [[Cueball]] compares three heatmaps, showing the location of &amp;quot;our site's users,&amp;quot; &amp;quot;subscribers to ''{{w|Martha Stewart Living}}''&amp;quot; and &amp;quot;consumers of furry pornography.&amp;quot; The three maps are nearly identical, leading [[Cueball]] to come to the conclusion that his site's userbase largely consists of fans of Martha Stewart and {{w|furry fandom|furry}} porn, and that the audience (presumably the owners/operators of the website) should adjust their content or advertising to cater to these demographics. However, Cueball's analysis is faulty; the actual reason the maps are the same is they all match the population concentration in the U.S., not because there is any statistically-significant relation between geographic location and any of the mentioned sub-populations.&lt;br /&gt;
&lt;br /&gt;
A heatmap (the term having been coined and [http://www.trademarkia.com/heatmaps-75263259.html trademarked] by {{w|Cormac Kinney}}) is a graph showing three-dimensional data on a two-dimensional image, with each pixel's colour representing the value of the data at that position.  It does not necessarily have anything to do with heat, but a heatmap may resemble a thermal image.  In this comic, red represents the highest numerical values, then yellow and green, with white the lowest values, in all three maps.&lt;br /&gt;
&lt;br /&gt;
The title text reflects a similar situation in world maps where the website written in English is read by English-speaking users no matter the location, because their ISP and search providers direct them primarily to English websites, so the visitors' geographic graph matches the graph of the global English-speaking population.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Three near-identical charts of the 48 contiguous United States are shown with heatmaps depicting population density. The first chart is labelled &amp;quot;Our site's users,&amp;quot; the second chart is labelled &amp;quot;Subscribers to ''Martha Stewart Living'',&amp;quot; and the third chart is labelled &amp;quot;Consumers of furry pornography.&amp;quot; Cueball is standing with a stick pointing at the charts.]&lt;br /&gt;
:Cueball: The business implications are clear.&lt;br /&gt;
:Pet peeve #208:&lt;br /&gt;
:Geographic profile maps which are basically just population maps&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Comics featuring Cueball]]&lt;br /&gt;
[[Category:Pet Peeves]]&lt;br /&gt;
[[Category:Maps]]&lt;br /&gt;
[[Category:Charts]]&lt;br /&gt;
[[Category:Statistics]]&lt;br /&gt;
[[Category:Furries]]&lt;/div&gt;</summary>
		<author><name>172.68.65.192</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=Talk:702:_Snow_Tracking&amp;diff=166635</id>
		<title>Talk:702: Snow Tracking</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=Talk:702:_Snow_Tracking&amp;diff=166635"/>
				<updated>2018-12-03T23:27:44Z</updated>
		
		<summary type="html">&lt;p&gt;172.68.65.192: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The title-text could also be a reference to Bugs Bunny, many episodes had such play-on-words as title.&lt;br /&gt;
(&amp;quot;A witch's tangled hare&amp;quot;, &amp;quot;A Feather in his Hare&amp;quot;, &amp;quot;Compressed Hare&amp;quot;, many more...) {{unsigned|‎Gegueure}}&lt;br /&gt;
&lt;br /&gt;
It could be mentioned that the Higgs signature shown is probably a Higgs-&amp;gt;top anti-top/bottom anti-bottom-&amp;gt;jet-jet signature, and most certainly not the clearest observed channel right now of Higgs-&amp;gt;gamma gamma (as there is no neutral signature, which would be a track appearing some  from the center, and there are clearly two jets to be seen). This is a difficult channel to observe, and is much more important in higher Higgs mass regions than the now observed, where b-bbar is present, but gamma gamma is much easyer to observe.[[Special:Contributions/85.164.251.29|85.164.251.29]] 13:11, 24 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
Velociraptors are suspiciously missing from this comic... [[User:SuperSupermario24|&amp;lt;span style=&amp;quot;color: #c21aff;&amp;quot;&amp;gt;Just some random derp&amp;lt;/span&amp;gt;]] 19:18, 27 June 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
I first thought of the Beverly Cleary mouse books too, but Ralph S. Mouse rode a motorcycle, not a bicycle. {{unsigned ip|162.158.74.106}}&lt;br /&gt;
: Could it be a reference to Biker Mice From Mars? --[[Special:Contributions/141.101.105.31|141.101.105.31]] 08:05, 9 December 2016 (UTC)&lt;br /&gt;
&lt;br /&gt;
I don't understand the knight tracks.  They appear to move the same distance forward as they do to the side.  Knights can't move like that.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Higgs Boson frame is significantly different from all the others because it represents an image from a cloud chamber not tracks in snow. [[User:Brenda|Brenda]] ([[User talk:Brenda|talk]]) 09:15, 16 June 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which was is the bicycle going? There is a way to figure it out. Someone help 23:27, 3 December 2018 (UTC)&lt;/div&gt;</summary>
		<author><name>172.68.65.192</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=2076:_Horror_Movies_2&amp;diff=166313</id>
		<title>2076: Horror Movies 2</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=2076:_Horror_Movies_2&amp;diff=166313"/>
				<updated>2018-11-23T18:23:49Z</updated>
		
		<summary type="html">&lt;p&gt;172.68.65.192: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 2076&lt;br /&gt;
| date      = November 23, 2018&lt;br /&gt;
| title     = Horror Movies 2&lt;br /&gt;
| image     = horror_movies_2.png&lt;br /&gt;
| titletext = When I was a kid, someone told me the end of The Giver was ambiguous, which surprised me. I had just assumed Jonah died--because the book had a medal on the cover, and I knew grown-ups liked stories where sad stuff happens at the end for no reason.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|Created by a BOT. Please mention here why this explanation isn't complete. Do NOT delete this tag too soon.}}&lt;br /&gt;
&lt;br /&gt;
This comic is a follow-up to [[2056: Horror Movies]] released a month earlier.&lt;br /&gt;
&lt;br /&gt;
White Hat and Cueball discuss the appeal of horror movies and tragic plots. Cueball expresses his dissatisfaction with stories that don't focus on evoking positive feelings. As an example he mentions how he disliked the ending of ''{{w|Titanic (1997 film)|Titanic}}'' where Jack sacrifices his life in order to save Rose. White Hat does not seem to share Cueball's point of view on successful storytelling and sarcastically promises to send feedback to the movie director {{w|James Cameron}} as well as the 16th century playwright {{w|William Shakespeare}}.&lt;br /&gt;
&lt;br /&gt;
In the title text Cueball (Randall?) discusses the ending of the science fiction novel {{w|The Giver}} where the fate of the main character Jonas [sic, see Trivia] had been left ambiguous.&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
In the original (current) title-text, there is a typo where the protagonist of ''The Giver'' is referred to as &amp;quot;Jonah&amp;quot; instead of &amp;quot;Jonas.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
{{incomplete transcript|Do NOT delete this tag too soon.}}&lt;br /&gt;
&lt;br /&gt;
:[White Hat and Cueball are walking.]&lt;br /&gt;
:White Hat: So you don't like '''''any''''' horror movies?&lt;br /&gt;
:Cueball: Spooky stuff is neat but I hate jump scares and watching people get murdered.&lt;br /&gt;
:Cueball: Why would you '''''want''''' to see that?&lt;br /&gt;
&lt;br /&gt;
:White Hat: It's like roller coasters. People like experiencing powerful feelings in a safe, controlled setting.&lt;br /&gt;
:Cueball: But why not '''''good''''' feelings?&lt;br /&gt;
&lt;br /&gt;
:White Hat: We've always been into tragic stories. Romeo and Juliet, Titanic...&lt;br /&gt;
:Cueball: See, that's another thing I don't get!&lt;br /&gt;
&lt;br /&gt;
:Cueball: I loved ''Titanic'' because Rose and Jack found each other and seemed so happy! I just hated the ending.&lt;br /&gt;
:White Hat: I'll be sure to give James Cameron and Shakespeare your feedback.&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics featuring White Hat]]&lt;br /&gt;
[[Category:Comics featuring Cueball]]&lt;/div&gt;</summary>
		<author><name>172.68.65.192</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=152787</id>
		<title>1957: 2018 CVE List</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=152787"/>
				<updated>2018-02-19T18:02:22Z</updated>
		
		<summary type="html">&lt;p&gt;172.68.65.192: The last CVE isn't in a public comment box, so it's not a joke about the 4th CVE, but rather self-contained.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1957&lt;br /&gt;
| date      = February 19, 2018&lt;br /&gt;
| title     = 2018 CVE List&lt;br /&gt;
| image     = 2018_cve_list.png&lt;br /&gt;
| titletext = CVE-2018-?????: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|Created by HACKING THIS WIKI VIA THE EDIT BOX - The explanation looks like a list. Explain the comic and put the security vulnerabilities in a table. Do NOT delete this tag too soon.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{w|Common Vulnerabilities and Exposures|CVE}} (Common Vulnerabilities and Exposures) is a standardized format for assigning an identity to a cybersecurity vulnerability (similar to the way that astronomical bodies are assigned unique identifiers by committees). Giving vulnerabilities a unique identifier makes them easier to talk about and helps in keeping track of the progress made toward resolving them. The typical format of a CVE identifier is '''CVE-[YEAR]-[NUMBER]'''. For example, the CVE identifier for 2017's widespread {{w|Meltdown (security vulnerability|Meltdown vulnerability}} is [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 CVE-2017-5754]. CVEs also contain a short description of the issue.&lt;br /&gt;
&lt;br /&gt;
In this comic (released in February 2018), Randall presents a number of spurious predicted CVEs for later in 2018. Each CVE identifier is given as &amp;quot;CVE-2018-?????&amp;quot;, reflecting the fact that they have not yet happened so we don't know exactly what their CVE identifier will be.&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width: 30%;&amp;quot; | Security Vulnerability&lt;br /&gt;
! style=&amp;quot;width: 70%;&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
|This refers to a real vulnerability in iOS and MacOS publicized a few days before the comic released &amp;lt;ref&amp;gt;https://techcrunch.com/2018/02/15/iphone-text-bomb-ios-mac-crash-apple/&amp;lt;/ref&amp;gt;, as well as past similar iOS vulnerabilities&amp;lt;ref&amp;gt;https://thenextweb.com/apps/2017/01/18/iphone-ipad-apple-text-ios-bug/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.telegraph.co.uk/technology/2018/01/18/apple-text-bomb-can-crash-iphones-single-message/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can use a timing attack to extploit [''sic''] a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
|Timing Attack to exploit a race condition in garbage collection refers to Meltdown and Spectre CPU flaws that can be exploited in cloud server like the ones in Wikipedia. {{w|Claude Shannon}} was an early and highly influential information scientist whose work underlies compression, encryption, security, and the theory behind how information is encoded into binary digits - hence the pertinence of extracting just some of the bits from his Wikipedia entry.&lt;br /&gt;
|-&lt;br /&gt;
|At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
|Writing passwords in a visible place is a major security flaw. For instance, following the [[wikipedia:2018 Hawaii false missile alert|2018 Hawaii false missile alert]] the agency received criticism for a press photo showing a password written on a sticky note attached to a monitor.&amp;lt;ref&amp;gt;http://uk.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1?r=US&amp;amp;IR=T&amp;lt;/ref&amp;gt; However, if a cafe posts their wifi password for customers, this suggests that it's ''supposed'' to be public knowledge. However, being visible from outside would allow people to use the wifi without ever entering the building or purchasing anything.&lt;br /&gt;
|-&lt;br /&gt;
|A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
|Describes a common feature on news sites or social media sites like Facebook. The possibility for users to &amp;quot;inject&amp;quot; text into the page is by design. This is a humorous reference to the relatively common security vulnerability &amp;quot;[[Wikipedia:Cross-site_scripting|persistent cross-site scripting]]&amp;quot;, where input provided by the user is displayed to other users in a dangerous fashion that allows attackers to inject arbitrary HTML or Javascript code into e.g. a comment section. It might also be a humorous reference to the events before, during and after the 2016 US Presidential elections where Internet Research Agency employees based remotely in St. Petersburg, Russia, but disguised as US citizens, &amp;quot;injected&amp;quot; arbitrary text in the form of political propaganda into comments on multiple web sites, according to an indictment returned by a federal grand jury on February 16, 2018.&lt;br /&gt;
|-&lt;br /&gt;
|MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
|Some people pronounce &amp;quot;{{w|SQL}}&amp;quot; like &amp;quot;sequel&amp;quot;, after SQL's predecessor &amp;quot;SEQUEL (Structured English Query Language)&amp;quot;. The standard for SQL suggests that it should be pronounced as separate letters; however, the author of SQL pronounces it &amp;quot;sequel&amp;quot;, so the debate is persisting (with even more justification than arguments about how to pronounce &amp;quot;GIF&amp;quot;). MySQL is an open-source relational database management system, the latest GA version (at the time of writing) is MySQL 5.7.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
|{{w|Privilege escalation}} refers to any illegitimate means of giving a system user greater privilege than they are supposed to have, and most hackers will seek to achieve this if they can. The most highly-sought privilege is that of the root user, which allows complete access to an entire system.&lt;br /&gt;
&lt;br /&gt;
This CVE, however, presents the reverse situation; that a flaw can allow a root user to ''de-escalate'', the exact opposite of what a hacker would want to achieve.{{Citation needed}} (In any case, the root user can always de-escalate manually if they so choose, as they have complete control).&lt;br /&gt;
|-&lt;br /&gt;
|Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
|Diacritics are the accents found on letters in some languages (eg. č, ģ ķ, ļ, ņ, š, ž). These would not be found on emojis. It is also a reference to a common problem of modern gadgets catching fire (usually related to flaws in Lithium-Ion batteries).&lt;br /&gt;
|-&lt;br /&gt;
|An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
|This likely refers to the movie {{w|Air Bud}}. It is a movie about a dog playing basketball. This has been a common theme in xkcd comics, see [[115: Meerkat]], [[1439: Rack Unit]], [[1819: Sweet 16]], [[1552: Rulebook]]&lt;br /&gt;
|-&lt;br /&gt;
|Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer [''sic''] in Missouri that no one's checked on in a while.&lt;br /&gt;
|{{w|Haskell}} is a functional programming language, functional programming is characterized by using functions that don't have side effects in other parts of the program. The joke here is discovering that indeed it does have side-effects, but for some unknown (and highly absurd) reason they only manifest on a specific computer in a nondescript location, but no one has noticed.&lt;br /&gt;
|-&lt;br /&gt;
|Nobody really knows how hypervisors work.&lt;br /&gt;
|[[wikipedia:Hypervisor|&amp;quot;Hypervisors&amp;quot;]] are a tool for computer virtualization. Virtualization is an extremely complex topic, as it requires a computer to completely emulate a different computer with its own unique hardware and software. Many IT professionals and businesses rely heavily on various forms of virtualization, but the individual employees would be hard-pressed to explain how it works. Meltdown and Specter are related to this.&lt;br /&gt;
|-&lt;br /&gt;
|Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
|This joke is about arcane systems that are running Linux in exceedingly unique situations, such that reproducing the error would be incredibly difficult or inconvenient, and would only affect a very tiny user base (if any at all). Other xkcd comics make references to such obscure computer-time issues relating to time zones and time conversions, and how many programmers find these issues frustrating or even traumatizing. UTC+14 is a time zone used only on some islands in the Pacific Ocean, i.e., [[Wikipedia:Line_Islands|the Line Islands]], and is also the earliest time zone on earth. The joke continues by stating that even if all of these absurd conditions were met, the resulting vulnerability would still be relatively benign: simply changing a user's preferred clock display format.&lt;br /&gt;
|-&lt;br /&gt;
|x86 has way too many instructions.&lt;br /&gt;
|The x86 architecture is considered &amp;quot;CISC&amp;quot; (a &amp;quot;complex instruction set computer&amp;quot;), having many instructions originally provided to make programming by a human simpler; other examples include the 68000 series used in the first Apple Mac. In the 1980s, this design philosophy was countered by the &amp;quot;RISC&amp;quot; (&amp;quot;reduced instruction set computer&amp;quot;) design movement exemplified by SPARC, MIPS, PowerPC (previously used by Apple) and the ARM chips common in mobile phones - based on the observation that computer programs were increasingly generated by compilers (which only used a few instructions) rather than directly by people, and that the chip area dedicated to extra instructions could be better dedicated to, for example, cache. At the time, there was an internet war about the merits of each approach (with the Mac and PC being on different sides, at one time; owners of other competing systems such as the Archimedes and Amiga had similar arguments on usenet in the early 1990s); this &amp;quot;issue&amp;quot; may be posted by someone who still recalls these debates. Technically, the extra instructions do slightly complicate the task of validating correct chip behaviour and complicate the tool chains that manage software, which could be seen as a minor security risk; however, the 64-bit architecture introduced by AMD and since adopted by Intel does rationalise things somewhat, and all recent x86 chips break down instructions into RISC-like micro-operations, so the complication from a hardware perspective is localised. Recent security issues such as the speculative cache load issue in Meltdown and Spectre depend more on details of implementation rather than instruction set, and have been exhibited both by x86 (CISC) and ARM (RISC) processors.&lt;br /&gt;
|-&lt;br /&gt;
|NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
|NumPy is the fundamental package for scientific computing with Python.  If something can find the prime factors of a number this quickly, especially a [[wikipedia:semiprime|semiprime]] with two large factors, there are attacks to break many crypto functions used in internet security. However, prime numbers have only a single factor, and &amp;quot;factoring primes&amp;quot; quickly is a simpler problem, that of [[wikipedia:Primality test|proving that a number is in fact a prime]]. &lt;br /&gt;
|-&lt;br /&gt;
|Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
|Another joke on the first CVE and a common English writing rule of thumb, which fails almost as often as it succeeds. Possibly a jab at Apple's image, portraying their software as unable to handle improper grammar or spelling.&lt;br /&gt;
|-&lt;br /&gt;
|Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
|Skylake x86 chips are a line of microprocessors made by Intel. Yes, you can forcefully remove any processor from its socket with a screwdriver.{{Citation needed}} There are many reports from people not using common sense. &lt;br /&gt;
|-&lt;br /&gt;
|Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
|{{w|Linus Torvalds}} is the benevolent dictator of the Linux kernel codebase. Normally it is hard to pass a change because he has the last word about what merge to the code base because that code is replicated in all Linux installations, but apparently he is easy to bribe, which would be a severe critical vulnerability to all Linux servers and machines.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
|The point of an attack is to make someone else's machine perform actions against the owner's will. Anyone can make their own machine execute any code{{Citation needed}}, but this would usually not be described as an attack except in the case of a locked-down appliance, such as a video game console or pay TV decoder.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
|This could refer to a CVE vulnerability of JPG files where javascript embedded within the image file is executed by some application, only this time is in a printed photo instead of encoded into the image itself. &lt;br /&gt;
|-&lt;br /&gt;
|Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
|Flash was discontinued because of its notoriously abysmal security record. All security experts advise against install. The joke here relates to the perceived difficulty with keeping Flash up to date or even installed properly to begin with. A common user experience which is the subject of numerous jokes and memes is the constant nagging notification to install or update Flash in order for web pages to display properly. While anecdotal, many IT professionals will bemoan the trouble that Flash has given them in the workplace due to these notifications and problems related to them.&lt;br /&gt;
|-&lt;br /&gt;
|Turns out the cloud is just other people's computers.&lt;br /&gt;
|This refers to a computer meme where replace &amp;quot;cloud&amp;quot; with &amp;quot;other people's computers&amp;quot; must be used in all marketing presentation to CEOs and not computer literate persons to evaluate the security impact of using &amp;quot;Cloud services&amp;quot;. Part of the humor here is that &amp;quot;the cloud&amp;quot;, in actuality, is simply a term for hosted services, i.e., computers being run by other people (typically businesses that specialize in this type of &amp;quot;Platform As A Service&amp;quot; or &amp;quot;PAAS&amp;quot; service model). Calling &amp;quot;the cloud&amp;quot; as &amp;quot;other people's computers&amp;quot; is, at its core, entirely accurate, though it takes away the business jargon and simplifies the situation in such a way that it might cast doubt on the security, reliability, and general effectiveness of using &amp;quot;cloud&amp;quot; solutions.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in Mitre's CVE database allows arbitrary code insertion.[[285|[~~CLICK HERE FOR CHEAP VIAGRA~~]]]&lt;br /&gt;
|Mitre's CVE database is the database where all CVE are stored. Attackers, after gaining access to the database via this flaw, add in a typical spam link purporting to offer cheap viagra.&lt;br /&gt;
|-&lt;br /&gt;
|It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
|Appears in the title text. {{w|Bruce Schneier}} is security researcher and blogger. He was mentioned in the title texts of [[748: Worst-Case Scenario]] and [[1039: RuBisCO]]. The &amp;quot;two kids in a trenchcoat&amp;quot; is a reference to the Totem Pole Trench trope.&amp;lt;ref&amp;gt;[http://tvtropes.org/pmwiki/pmwiki.php/Main/TotemPoleTrench TV Tropes:Totem Pole Trench trope]&amp;lt;/ref&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
LEAKED LIST OF MAJOR 2018 SECURITY VULNERABILITIES&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? An attacker can use a timing attack to extploit a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
&lt;br /&gt;
CUE-2018-????? Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer in Missouri that no one's checked on in a while.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Nobody really knows how hypervisors work.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? x86 has way too many instructions.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Turns out the cloud is just other people's computers.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? A flaw in Mitre's CVE database allows arbitrary code insertion.&amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;[~~CLICK HERE FOR CHEAP VIAGRA~~]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;/div&gt;</summary>
		<author><name>172.68.65.192</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1806:_Borrow_Your_Laptop&amp;diff=136327</id>
		<title>1806: Borrow Your Laptop</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1806:_Borrow_Your_Laptop&amp;diff=136327"/>
				<updated>2017-03-03T08:16:27Z</updated>
		
		<summary type="html">&lt;p&gt;172.68.65.192: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1806&lt;br /&gt;
| date      = March 3, 2017&lt;br /&gt;
| title     = Borrow Your Laptop&lt;br /&gt;
| image     = borrow_your_laptop.png&lt;br /&gt;
| titletext = If used with software that could keep up, a scroll wheel mapped to send a stream of 'undo' and 'redo' events could be kind of cool.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|First attempt at a full explanantion. More details about what is possible and what is reasonable could b needed (and speel check).}}&lt;br /&gt;
In this comic [[White Hat]] asks if he can borrow [[Cueball|Cueball's]] laptop to load something. Cueball has no problem with this, but before White Hat can use his laptop there is just a &amp;quot;short&amp;quot; list of very special configurations that he has to know.&lt;br /&gt;
&lt;br /&gt;
In the caption it is revealed that Cueball represents [[Randall]] who claims that once he has used a computer for a while he has made so many of these special configurations that no one else will ever be able to (or wish to) use it again.&lt;br /&gt;
&lt;br /&gt;
As many other computer users Randall likes to customize his PC. Of the three items in Cueball's list of customizations only one seems like a real and relevant settings. That is the first where he tells that hitting both shift keys simultaneously will change the keyboard back to QWERTY. The {{w|QWERTY}} keyboard is the standard in the US (and other places using roman letters). It has been a [[:Category:Dvorak|recurrent theme]] for Randall to refer to the {{w|Dvorak Simplified Keyboard|Dvorak}} keyboard layout, and although he doesn't say so, it seems safe to assume that this is the current setting. Supporters keeps claiming that typing speed is faster on a Dvorak keyboard although this has never been proven and is a reason Randall often makes jokes about it. (See more details [[:Category:Dvorak|here]]).&lt;br /&gt;
&lt;br /&gt;
The next point on the list makes no sense as Cueball has changed his keyboard layout so caps lock acts as the control key and then he has moved capslock so that is activated when hitting spacebar, the largest and most used key on the keyboard. Thus it makes absolutely no sense, and what is worse he doesn't tell White Hat where he has hid the space bar, although it could of course be the ctrl keys, which would at least give him to spacebars to use on either side of the keyboard.&lt;br /&gt;
&lt;br /&gt;
Finally he goes out on a limb with an impossible setting that has made his scroll wheel able to move through time instead of through &amp;quot;space&amp;quot; as in up and down on the screen. However, only when using two-finger scroll, often used on track pads for laptops as a gesture for scrolling. And it is clear that this was not the last important point, as Cueball's list ends with another point which is not included in the comic.&lt;br /&gt;
&lt;br /&gt;
In the title text it is revealed that Cueball actually did not mean moving in real time, like time travel, but rather that the scroll wheel would act as an undo-redo button. In the title text Randall says that he would actually find such a feature cool, but that he doesn't think that the programs on his laptop could follow up if his scroll wheel was mapped to send a stream of undo/redo commands to them as he used it.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[White Hat walks toward Cueball's desk pointing at his laptop while looking back at Cueball standing behind him.]&lt;br /&gt;
:White Hat: Can I load it up on your laptop?&lt;br /&gt;
:Cueball: Sure!&lt;br /&gt;
:Cueball: Oh, just hit both shift keys to change over to QWERTY.&lt;br /&gt;
:Cueball: Caps lock is control. And spacebar is capslock.&lt;br /&gt;
:Cueball: And two-finger scroll moves through time instead of space.&lt;br /&gt;
:Cueball: And-&lt;br /&gt;
&lt;br /&gt;
:[Caption below the panel:]&lt;br /&gt;
:Once I've  used a computer for a while no one else will ever use it again.&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics featuring Cueball]]&lt;br /&gt;
[[Category:Comics featuring White Hat]]&lt;br /&gt;
[[Category:Computers]]&lt;br /&gt;
[[Category:Time]]&lt;/div&gt;</summary>
		<author><name>172.68.65.192</name></author>	</entry>

	</feed>