@mailoxy
ofc they'll blame @Shamar for collaborating with the enemy and providing them with cyberweponz
Notices by Wolf480pl (wolf480pl@niu.moe), page 12
-
Wolf480pl (wolf480pl@niu.moe)'s status on Saturday, 29-Dec-2018 05:05:01 EST
Wolf480pl
-
Wolf480pl (wolf480pl@niu.moe)'s status on Saturday, 29-Dec-2018 04:42:32 EST
Wolf480pl
@kitsune yeah, shit happens :(
-
Wolf480pl (wolf480pl@niu.moe)'s status on Saturday, 29-Dec-2018 04:38:25 EST
Wolf480pl
@kitsune still a pretty good strategy though, if your goal is getting big $$$.
-
Wolf480pl (wolf480pl@niu.moe)'s status on Saturday, 29-Dec-2018 04:38:06 EST
Wolf480pl
@kitsune but if it's so bad that you can't use it, then nobody will want to use it. Only fools will buy it and they will suffer while using it.
Which means ur a scammer. -
Wolf480pl (wolf480pl@niu.moe)'s status on Wednesday, 26-Dec-2018 17:35:01 EST
Wolf480pl
What would happen if systemd continued its expansion, and consumed all the lower userspace,
while flatpak (and docker) consumed all upper userspace?We'd end up with a base system consisting of kernel+systemd+GNOME, and a flatpak app store...
I was thinking it'd be kinda like BSD, considering the concept of base system, but app store != ports tree...
It'd be more like Android.
That'd be sad :blob_cry:
-
Wolf480pl (wolf480pl@niu.moe)'s status on Sunday, 23-Dec-2018 07:07:18 EST
Wolf480pl
@Shamar @ekaitz_zarraga @enkiv2 @jcbrand
I think you're misunderstanding the term "Software Engineering".
It doesn't mean making good quality software. It means mass-producing software of predictable quality at predictable deadlines. The manglement turns down the quality knob until the cost-time tradeoff is acceptable, and then hits the "START" button.
What I'd like kinds to is Software DIY. Or, IOW, hacking.
-
Wolf480pl (wolf480pl@niu.moe)'s status on Friday, 21-Dec-2018 17:01:57 EST
Wolf480pl
@enkiv2
>Personal software [...] should not scaleIMO there's two sides to scalability.
Most of the business talk focuses only on one side: upward scalability.More resources -> can more load.
But there's the other side, which is often overlooked: downward scalability:
Less load -> less resources.
Some people cal it lightweightness.
And IMO it is very important for personal software to scale down well, so that you can run it eg. on a raspi. -
Bob Mottram 🔧 ☕ ✅ (bob@soc.freedombone.net)'s status on Thursday, 29-Nov-2018 12:05:54 EST
Bob Mottram 🔧 ☕ ✅
"the thing is, a lot of those people [kids on Arpanet in the 1970s] felt outcast by society—they were geeks; their families and their fellow students didn’t understand them; they had nobody. And we welcomed them into the community [at MIT AI lab] and invited them to learn and start to do some useful work. It was amazing for them not to be treated as trash."
-- Richard Stallman -
Wolf480pl (wolf480pl@niu.moe)'s status on Thursday, 29-Nov-2018 08:11:23 EST
Wolf480pl
-
Wolf480pl (wolf480pl@niu.moe)'s status on Thursday, 29-Nov-2018 05:35:22 EST
Wolf480pl
@strypey @djsumdog
Hmm... ok, but now the question is:
Is it ok for you to judge others based on whether they help a fascist distribute recruitment videos? -
Wolf480pl (wolf480pl@niu.moe)'s status on Thursday, 29-Nov-2018 05:31:50 EST
Wolf480pl
-
Wolf480pl (wolf480pl@niu.moe)'s status on Thursday, 29-Nov-2018 05:28:41 EST
Wolf480pl
@strypey @djsumdog
another interesting aspect:
Are you obliged not to help them?I've seen a lot of people claim that you are, and that (pardon my exaggeration) "if you don't punch a nazi, you are a nazi".
I disagree with that. IMO there's a lot of value in the concept of a "common carrier" - a neutral intermediary that can't be hold accountable for what it distributes, as long as it doesn't discriminate based on (or doesn't even look at) what's inside the box it carries.
-
Wolf480pl (wolf480pl@niu.moe)'s status on Wednesday, 28-Nov-2018 18:01:34 EST
Wolf480pl
@tdemin
>SSHing too much work
sigh...As for checking in person - that wouldn't work here, because the teachers usually have automated tests prepared beforehand, which they don't want to disclose to the students.
We submit most our assignments by email or moodle, which is IMO pretty convenient. -
Wolf480pl (wolf480pl@niu.moe)'s status on Wednesday, 28-Nov-2018 17:23:33 EST
Wolf480pl
@tdemin
I'm not sure if you mean "he couldn't ssh" or "why didn't he ssh? he should've done this"Anyway:
At my university, most programming assignments have the following rule (explicitely mentioned in task description):The solution must work (and will be checked) on the `students.mimuw.edu.pl` machine.
So all the students, no matter what they use on their computers, are expected to ssh there to test their solutions before submitting, and this is also where the teachers check it.
-
Wolf480pl (wolf480pl@niu.moe)'s status on Wednesday, 28-Nov-2018 16:53:39 EST
Wolf480pl
@minus @thog
For some time I used to be like
"how's assuming absolute path to env better than assuming absolute path to python".
But then I saw virtualenv, and it all made sense. -
Wolf480pl (wolf480pl@niu.moe)'s status on Wednesday, 28-Nov-2018 14:10:39 EST
Wolf480pl
-
Wolf480pl (wolf480pl@niu.moe)'s status on Wednesday, 28-Nov-2018 14:07:44 EST
Wolf480pl
@sir @alcinnz
Yeah, the language I described is definitely not suitable for this usecase.For this usecase, I suspect Go is the step in the right direction, though I've only used it for like an hour, so I don't really know.
I think the theoretical language I described could be more suitable for parts of kernel code, implementation of cryptographic primitives, compression algorithms, etc.
-
Tinker ☀️ (tinker@infosec.exchange)'s status on Wednesday, 28-Nov-2018 12:12:01 EST
Tinker ☀️
Grandpa? Tell me about the cyberwars!
So there I was... Hunkered down behind the firewall trenches under a barrage of TCP scans!
All I remember seeing was an onslaught of SYN, SYN, SYN!!! We met them with RST after RST after RST!
-
Wolf480pl (wolf480pl@niu.moe)'s status on Wednesday, 28-Nov-2018 13:50:47 EST
Wolf480pl
-
Wolf480pl (wolf480pl@niu.moe)'s status on Wednesday, 28-Nov-2018 13:49:24 EST
Wolf480pl
@sir @alcinnz
As a learning exercise? Sure.To write network-facing software that operates on untrusted data, and that is supposed to be used by someone else?
Umm... I'm tempted to say they'd better keep writing in JS, at least they don't make RCEs this way.But give them an Aspire One laptop, so that they feel how inefficient their code is.