archived
stringclasses
2 values
author
stringlengths
3
20
author_fullname
stringlengths
4
12
body
stringlengths
0
22.5k
comment_type
stringclasses
1 value
controversiality
stringclasses
2 values
created_utc
stringlengths
10
10
edited
stringlengths
4
12
gilded
stringclasses
7 values
id
stringlengths
1
7
link_id
stringlengths
7
10
locked
stringclasses
2 values
name
stringlengths
4
10
parent_id
stringlengths
5
10
permalink
stringlengths
41
91
retrieved_on
stringlengths
10
10
score
stringlengths
1
4
subreddit_id
stringclasses
1 value
subreddit_name_prefixed
stringclasses
1 value
subreddit_type
stringclasses
1 value
total_awards_received
stringclasses
19 values
null
darchangel
null
> prototypal inheritance, which was tried in JavaScript and found to be a bad idea There are many who would disagree with this, myself included. I think this is one of the best things about Javascript and it's also why I love Lua. I mainly work in OOP and I wish I could compose like this so easily in C#.
null
0
1491400588
False
0
dfv1imt
t3_63lb23
null
null
t1_dfuzr9z
null
1493815917
2
t5_2fwo
null
null
null
null
cowardlydragon
null
I thought the 11,000 global vars was the result of code generation? To be fair, there is a lot of FUD around this from Toyota and various parties pointing fingers, and this article still doesn't show a definitive cause of the all the acceleration lawsuits. Given the proclivity of ambulance chasers when they sniff liability...
null
0
1491400646
False
0
dfv1kae
t3_63ldwg
null
null
t3_63ldwg
null
1493815938
15
t5_2fwo
null
null
null
null
pohatu
null
Banning alleged "cyber criminals" from the internet and computers is cruel and unusual. Maybe in 1996 the internet was a luxury, but today? WTF. They need to change that law.
null
0
1491400656
False
0
dfv1kkj
t3_63jq8w
null
null
t3_63jq8w
null
1493815942
5
t5_2fwo
null
null
null
null
orksnork
null
> The first is that he sold licensing software to Shames for the Limitless keylogger. I make software and I have absolutely zero idea who the people purchasing it are. They've got accounts and, if they're not broken, there's no reason for me to be in communication with them, let alone prying what they're doing with it.
null
0
1491400681
False
0
dfv1l9l
t3_63jq8w
null
null
t1_dfuy2bw
null
1493815952
12
t5_2fwo
null
null
null
null
steamruler
null
It's a shift register in that it's output -> input chaining. You want your start button (RESET signal) to be wired to all overrides to set the initial state, I'll let you figure out which ones should be set-low and which should be set-high.
null
0
1491400695
False
0
dfv1lnk
t3_63jpev
null
null
t1_dfv0kj3
null
1493815957
1
t5_2fwo
null
null
null
null
Scout1Treia
null
Well besides the problem with assuming it keeps a local cache... If your system is compromised as is, it doesn't matter if there's a cache or not or any anti-virus. You're already fucked. Or it'd just open your browser's saved passwords, or send a copy of your cookies home (which would allow access to many less-secure sites). None of which really matters whether or not this "keylogger" exists. I presume you don't have any problem with browsers that store cookie or password information?
null
0
1491400709
False
0
dfv1m3k
t3_63jq8w
null
null
t1_dfv1dj1
null
1493815962
1
t5_2fwo
null
null
null
null
dsffff22
null
It's also a huge plus for simple apis. A decent api has rate limiting, may support different types for the model and has special cases to be handled properly like Authentication token got invalidated. If you don't create one proper client you may end up splitting api core functionality over many different functions which results in alot work in maintaining and testing it.
null
0
1491400777
False
0
dfv1o2g
t3_63kqtu
null
null
t1_dfuvulp
null
1493815989
1
t5_2fwo
null
null
null
null
pohatu
null
We can't just assume they have evidence. Why not also assume the FBI is a front for lizard people from Mars who are going to eat us all as soon as the only man who knows their weakness is locked away on trumped up hacking charges.
null
0
1491400807
False
0
dfv1oxg
t3_63jq8w
null
null
t1_dfuulq3
null
1493816000
0
t5_2fwo
null
null
null
null
underhunter
null
Well, the cure for this was set up hundreds of years ago; in the form of lobbies and Congressional committees. Remember, the system itself works fine, it's just the politicians and corps that have corrupted it.
null
0
1491400812
False
0
dfv1p2r
t3_63jq8w
null
null
t1_dfv1fg4
null
1493816002
1
t5_2fwo
null
null
null
null
nhumrich
null
Sure, maintainability can start to suffer, but if your project never gets to that point because time to market was too slow, then it doesn't matter. That's a good problem to deal with, cause it means you have success. Python now has typing though which can be used with MyPy to check the types like a compiler would. Maintainability can be fixed by moving to smaller pieces such as modules/Microservices as well. On the program correctness aspect. Let's just assume the dynamic nature does cause a bunch of extra problems. Since it's faster to write, those bugs should also be dramaticly easier to fix. If your using CD and shipping often, then as long as you can fix bugs fast, it's still better off. (You WILL have bugs no matter what, static languages just protect you from a certain class of bugs)
null
0
1491400850
False
0
dfv1q5f
t3_63c9e1
null
null
t1_dft1ybv
null
1493816017
1
t5_2fwo
null
null
null
null
rawb0t
null
if your volvo car was built with machine guns and rocket launchers on it with a trigger labeled "kill innocent civilians around you", yes.
null
0
1491400874
False
0
dfv1qu5
t3_63jq8w
null
null
t1_dfuyqcn
null
1493816026
5
t5_2fwo
null
null
null
null
Leumashy
null
This is woefully ignorant of computer security. You don't need to fully compromise a system in order to gain information. This is like saying, "Websites shouldn't encrypt passwords because if a hacker compromises the website then they're going to get your passwords anyway." This is because hackers can compromise the database itself without access to the full system. At that point, you better hope your passwords are encrypted. Similarly, hackers can compromise the keylogger system, by itself, without having full access to your operating system. But this potential exploit wouldn't exist if the keylogger system just didn't exist. Yes, if someone could take control of your operating system, then they wouldn't need to compromise your keylogger. But it's **not** the case that someone **must** first take control of your operating system to then compromise your keylogger.
null
0
1491400957
False
0
dfv1t7j
t3_63jq8w
null
null
t1_dfv0ver
null
1493816058
0
t5_2fwo
null
null
null
null
rawb0t
null
You don't actually know anything about the software, huh? Don't let this one very biased article tell you what's happening.
null
0
1491400971
False
0
dfv1tn0
t3_63jq8w
null
null
t1_dfv17fo
null
1493816064
4
t5_2fwo
null
null
null
null
psychyness
null
No, I agree. He'll probably end up with 2-6 years and get out in 1.5-4 years on good behavior. But I think they'll try to put 10-20 years on him.
null
0
1491400997
False
0
dfv1udw
t3_63jq8w
null
null
t1_dfv0qvm
null
1493816074
2
t5_2fwo
null
null
null
null
paracelsus23
null
I feel like this comes down to the difference between a "water pipe" and a "bong". One is a normal everyday device and legal. The other is drug paraphernalia and illegal. They're also the exact same device just sold by different names.
null
0
1491401054
False
0
dfv1w24
t3_63jq8w
null
null
t1_dfupixj
null
1493816097
1
t5_2fwo
null
null
null
null
pohatu
null
I purchased a lock picking kit at harbor freight last weekend. If I use it to burgle should harbor freight be indicted?
null
0
1491401059
False
0
dfv1w78
t3_63jq8w
null
null
t1_dfuvi4s
null
1493816098
-1
t5_2fwo
null
null
null
null
nhumrich
null
Wow, you should actually read it then. Because I address the "but what if it really does" in the last section.
null
0
1491401091
False
0
dfv1x4t
t3_63c9e1
null
null
t1_dft1o91
null
1493816113
1
t5_2fwo
null
null
null
null
Delision
null
Now watch as I change this website background from dark green to slightly darker green! *maniacal laughter*
null
0
1491401120
False
0
dfv1xz2
t3_63jq8w
null
null
t1_dfuuf1x
null
1493816123
24
t5_2fwo
null
null
null
null
Jezixo
null
With flexbox, sure
null
0
1491401125
False
0
dfv1y3x
t3_63jq8w
null
null
t1_dfv0erd
null
1493816125
8
t5_2fwo
null
null
null
null
damienjoh
null
You are clearly a smart and capable guy but for the love of god *please* listen to some of the feedback in this thread. >I'm just telling you it's very clear to everyone why you can't get a job, and it has nothing to do with your ability to code. Yep
null
0
1491401157
False
0
dfv1z09
t3_637seo
null
null
t1_dftijqk
null
1493816138
9
t5_2fwo
null
null
null
null
Psyladine
null
literally, tapped wires.
null
0
1491401253
False
0
dfv21vx
t3_63auwj
null
null
t1_dftpkrs
null
1493816176
2
t5_2fwo
null
null
null
null
darchangel
null
Brace yourself, the following theory will sound 100% absurd: there may have been no software bug but it was a lot of people accidentally pushing throttle when they thought it was the brake. I don't want to sound click-baity but there's an episode of Malcolm Gladwell's Revisionist History podcast which claims just this and it kinda blew my mind. (What you hear next will amaze you!!!) Seriously though, I highly recommend listening to this episode and seeing if you think he has a reasonable explanation. Extraordinary claims require extraordinary evidence and I think Gladwell does a good job of presenting such. http://revisionisthistory.com/episodes/08-blame-game
null
0
1491401259
False
0
dfv222h
t3_63ldwg
null
null
t3_63ldwg
null
1493816178
9
t5_2fwo
null
null
null
null
GravitasIsOverrated
null
Like the feature that allows you to take pictures and videos without turning on the webcam light? Or the DDOS attack tab? It was pretty clearly a RAT for malicious purposes. And if you actually read the indictment, it's less about the RAT tool he built and more about his collaborating with a fellow named Shames who built malicious keyloggers.
null
0
1491401267
False
0
dfv22ao
t3_63jq8w
null
null
t1_dfuumfy
null
1493816181
3
t5_2fwo
null
null
null
null
Futakitty
null
They can check for themselves and be fixed in less than 3 minutes.
null
0
1491401288
False
0
dfv22xn
t3_63jq8w
null
null
t1_dfuy7jh
null
1493816190
3
t5_2fwo
null
null
null
null
Scout1Treia
null
> But this potential exploit wouldn't exist if the keylogger system just didn't exist. By this logic, literally any system process is a potential exploit and all extraneous features should be removed.
null
0
1491401331
False
0
dfv245b
t3_63jq8w
null
null
t1_dfv1t7j
null
1493816206
5
t5_2fwo
null
null
null
null
VietOne
null
Regardless if that forum had legitimate legal users, it was intended more for malicious use than not. Again back to my gun sales analogy. You create a cheap and effective gun, you knowingly decide to sell without proper paperwork to a community known for having a high rate of gangsters because you know that cheap guns will be easier to sell and you can sell more of them. Just because the community has a small portion of legal potential buyers, that wouldn't be enough to dispute that you intended to sell to people who you knew had criminal intent with your guns.
null
0
1491401385
False
0
dfv25q0
t3_63jq8w
null
null
t1_dfuyxsa
null
1493816229
2
t5_2fwo
null
null
null
null
brusselssprouts
null
A lot has been written about the Toyota case and the so-called defective firmware, but I'd at least like to make mention that there are dissenting views among the experts. Keep in mind all of the horrible things that were claimed about the firmware were from the prosecution's expert witnesses. http://www.embedded.com/electronics-blogs/say-what-/4458067/-Toyota-s-Killer-Firmware--and-the--Single-Bit-Flip-That-Killed--Not- My understanding is they were fined for hiding the fact that they had sticking peddles and interference with the floor mats. But, as far as I know, all of the firmware analysis pointed to a bunch of maybe-theoretically-could've-happeneds. Other aspects that sound terrible, like 10K global variables, high cylcomatic complexity, etc. can have simple explanations as well; often control systems code like that of an ECU is actually generated by programs such as Simulink, not written by hand.
null
0
1491401395
False
0
dfv25zr
t3_63ldwg
null
null
t3_63ldwg
null
1493816232
13
t5_2fwo
null
null
null
null
dghughes
null
I'd say the article writer wanted to paint a picture in everyone's minds.
null
0
1491401417
False
0
dfv26o1
t3_63jq8w
null
null
t1_dfuw6m1
null
1493816241
1
t5_2fwo
null
null
null
null
lalu_
null
So basically we could say it's a "scalable API Gateway" ?
null
0
1491401480
False
0
dfv28hn
t3_5x5ylf
null
null
t3_5x5ylf
null
1493816266
1
t5_2fwo
null
null
null
null
mirhagk
null
> readonly does the actual obvious thing. And what would that be?
null
0
1491401508
False
0
dfv29bm
t3_63k8ep
null
null
t1_dfv0jh1
null
1493816277
8
t5_2fwo
null
null
null
null
[deleted]
null
[deleted]
null
0
1491401513
False
0
dfv29go
t3_63lqls
null
null
t3_63lqls
null
1493816280
-2
t5_2fwo
null
null
null
null
loup-vaillant
null
> there may have been no software bug but it was a lot of people pushing throttle when they thought it was the brake. I recall material evidence to the contrary: tire marks on the road that indicates the car was accelerating *and* breaking. Also, if a particular brand is affected, *something* that is unique to that brand is either causing or allowing the problem to happen —even if that problem starts with a "human error".
null
0
1491401547
False
0
dfv2ahw
t3_63ldwg
null
null
t1_dfv222h
null
1493816295
11
t5_2fwo
null
null
null
null
rawb0t
null
Right but I believe I read somewhere that they have very damning Skype chat logs proving he knew what the plans were
null
0
1491401565
False
0
dfv2azv
t3_63jq8w
null
null
t1_dfv1l9l
null
1493816301
11
t5_2fwo
null
null
null
null
TheIncorrigible1
null
Full circle
null
0
1491401571
False
0
dfv2b63
t3_63jq8w
null
null
t1_dfuzjg4
null
1493816303
4
t5_2fwo
null
null
null
null
nhumrich
null
You got me. That's a great point. I guess I will just write everything in assembly now. You just had to pull the environment card...
null
0
1491401583
False
0
dfv2bjj
t3_63c9e1
null
null
t1_dft2tn9
null
1493816309
1
t5_2fwo
null
null
null
null
HillDogsPhlegmBalls
null
> “I will tell you this, Russia: If you’re listening, I hope you’re able to find the 30,000 emails that are missing,” the Republican nominee said at a news conference in Florida. “I think you will probably be rewarded mightily by our press.” Yes, its clear that he was talking to his secret Russian handlers.
null
0
1491401589
False
0
dfv2br1
t3_63jq8w
null
null
t1_dfuzyvg
null
1493816311
1
t5_2fwo
null
null
null
null
pohatu
null
I think lock pick analogies would be better.
null
0
1491401596
False
0
dfv2bym
t3_63jq8w
null
null
t1_dfut7kt
null
1493816314
1
t5_2fwo
null
null
null
null
LOHare
null
>Depending on whose view prevails, Huddleston could face prison time and lose his home, in a case that raises a novel question: when is a programmer criminally responsible for the actions of his users? NRA should speak up on this.. as I recall, they have expended considerable effort and time arguing the exact opposite. I don't know if gun nuts will fully appreciate the parallel here though, or the precedent this will set if the court finds against Huddleston.
null
0
1491401615
False
0
dfv2ci9
t3_63jq8w
null
null
t3_63jq8w
null
1493816322
2
t5_2fwo
null
null
null
null
isaacly
null
nice try, computer. original is https://www.reddit.com/r/chess/comments/63kn5t/new_blog_post_storing_and_displaying_precise/
null
0
1491401625
False
0
dfv2cu4
t3_63lqls
null
null
t1_dfv29go
null
1493816326
1
t5_2fwo
null
null
null
null
TheIncorrigible1
null
Well, *he* won't be free much longer
null
0
1491401654
False
0
dfv2dq4
t3_63jq8w
null
null
t1_dfuu3kp
null
1493816338
1
t5_2fwo
null
null
null
null
pohatu
null
What if you go to the ghetto and sell it as a tomato knife, because you live in the ghetto?
null
0
1491401682
False
0
dfv2ei2
t3_63jq8w
null
null
t1_dfuwqz2
null
1493816349
-1
t5_2fwo
null
null
null
null
[deleted]
null
[deleted]
null
0
1491401693
False
0
dfv2et7
t3_63jq8w
null
null
t1_dfuwqz2
null
1493816353
1
t5_2fwo
null
null
null
null
rawb0t
null
Sure, if Harbor Freight told you "this lock picking kit is great for burglaries! we'll even throw in this gun in case you need to kill anyone that catches you!"
null
0
1491401710
False
0
dfv2fb6
t3_63jq8w
null
null
t1_dfv1w78
null
1493816359
4
t5_2fwo
null
null
null
null
aaeme
null
> Well besides the problem with assuming it keeps a local cache... I don't see how else it could work on computers that aren't always online. So, yes it does do that. > If your system is compromised as is, it doesn't matter if there's a cache or not or any anti-virus. You're already fucked. There are vastly different degrees of fucked. I have far less of a problem with browsers that store cookie or password information than a keylogger that stores passwords for non-browser things like keypass, remote computers or a host of the other things.   Furthermore (if that weren't enough), browsers that store cookie or password information is very much a choice you and I can make on a case-by-case basis fully aware that it is happening and what choices I am making and I can revoke those choices and purge all the data whenever I wish. MS's keylogger is **everything** and it happens without us having any knowledge of what it is collecting and hides behind euphemistic terms like "getting to know you". If there was a browser out there that automatically stored every password you ever put into a website, would not let you purge those passwords or cookies or even have any incognito mode where you could tell it not to collect the information of a particular session and it didn't tell you it was doing that would you be happy to use that browser? I wouldn't because if my system ever did get compromised (and it might) then I would be potentially far more fucked (as you put it) as a result.   And I forgot another point: browsers storing passwords and cookies for me is convenient to me in an obvious way. It's a compromise for functionality that makes my life easier. How on earth is that even vaguely true of MS's keylogger?
null
0
1491401780
1491402022
0
dfv2heh
t3_63jq8w
null
null
t1_dfv1m3k
null
1493816387
4
t5_2fwo
null
null
null
null
aaron552
null
The same reason your smartphone's keyboard app is a keylogger: if it can predict what you're about to type next, you can type faster/with less errors, especially with handwriting recognition. Also Microsoft's servers probably do some processing to improve predictions for everyone.
null
0
1491401792
1491402040
0
dfv2hrg
t3_63jq8w
null
null
t1_dfuxgst
null
1493816392
12
t5_2fwo
null
null
null
null
webauteur
null
I was actually going to write an article like this myself, but first I checked to see if one already exists. I'm currently reading a book, *The Secret Life of Puppets* by Victoria Nelson which is a lengthy book on how the supernatural reappears in our culture even though we have adopted a materialistic and scientific mindset. She discusses how virtual reality as a concept is based on Plato's world of ideal Forms. This reminded me that even at the level of the programming code we have abstraction layers. There seems to be an implicit metaphysical significance to computer technology which crops up in the language, concepts, and methodologies we use to interact with computers. The recent movie *Ghost In The Shell* also grapples with these philosophical implications, although more in the original source material than in this dumbed down movie.
null
0
1491401898
False
0
dfv2kwd
t3_63lb23
null
null
t1_dfv13p4
null
1493816434
2
t5_2fwo
null
null
null
null
[deleted]
null
[deleted]
null
0
1491401924
False
0
dfv2lpe
t3_63jq8w
null
null
t1_dfuu8kt
null
1493816444
-3
t5_2fwo
null
null
null
null
jigglebilly
null
> I'm so curious because I don't think manufacturing jobs will ever come back to the USA. My hypothesis is that US manufacturing output will increase, but only due to automation. That's because of NAFTA and TPP. Manufacturing can come back, but DC has been pushing the narrative that 'manufacturing is gone and its not coming back'. That's a lie. http://www.cnbc.com/2017/04/05/private-payrolls-grew-263k-in-march-vs--185k-est-:-adp.html 263,000 new jobs *this month* >Manufacturing payrolls grew by 30,000
null
0
1491401958
False
0
dfv2mq5
t3_637m7q
null
null
t1_dftel3o
null
1493816458
1
t5_2fwo
null
null
null
null
aaron552
null
FWIW, it's disabled on my PC and I can't even enable it - it's greyed out, with a notice at the top of the window saying "Some settings are managed by your organization".
null
0
1491401960
False
0
dfv2mro
t3_63jq8w
null
null
t1_dfuxbt2
null
1493816458
2
t5_2fwo
null
null
null
null
Shadow14l
null
If you make a lockpick set, you aren't breaking any laws. You start advertising and selling it to your buddies who you know are going to use it to break the law, that's wrong. I'm not even going to comment on whether it's legal or not, but morally and ethically it's wrong.
null
0
1491401975
False
0
dfv2n91
t3_63jq8w
null
null
t1_dfuvufo
null
1493816465
6
t5_2fwo
null
null
null
null
knome
null
You mean like commonly illegal features like being a [switchblade](https://en.wikipedia.org/wiki/Switchblade) or [butterfly knife](https://en.wikipedia.org/wiki/Butterfly_knife)?
null
0
1491401979
False
0
dfv2ncx
t3_63jq8w
null
null
t1_dfuyk6s
null
1493816466
2
t5_2fwo
null
null
null
null
holyknight00
null
All the responsibility depends on the regulations and laws. Laws not always make sense, just because something is common sense doesn't mean its legal or illegal to do it. In software development there aren't much specific regulations and laws and that's why most of legal battles depends on EULAs and copyright.
null
0
1491402083
False
0
dfv2qja
t3_63jq8w
null
null
t1_dfv1qu5
null
1493816510
1
t5_2fwo
null
null
null
null
TheGoodCitizen
null
Only real hackers can get vertical-align to work with the flex box model.
null
0
1491402084
False
0
dfv2qkh
t3_63jq8w
null
null
t1_dfuuf1x
null
1493816510
14
t5_2fwo
null
null
null
null
[deleted]
null
[deleted]
null
0
1491402130
False
0
dfv2rvc
t3_63gbjx
null
null
t1_dfup0re
null
1493816528
3
t5_2fwo
null
null
null
null
TheGoodCitizen
null
Don't forget display:table for that browser safe layout hacking.
null
0
1491402166
False
0
dfv2syt
t3_63jq8w
null
null
t1_dfv1y3x
null
1493816542
6
t5_2fwo
null
null
null
null
boris_the_boris
null
I read the words but I fail to see the substance; most probably I am just a simpleton.
null
0
1491402167
False
0
dfv2t00
t3_63lb23
null
null
t1_dfv2kwd
null
1493816543
2
t5_2fwo
null
null
null
null
[deleted]
null
No because the gun manufacturers don't sell guns marketed as child killer 4000 and then sell them on the black market.
null
0
1491402170
False
0
dfv2t3b
t3_63jq8w
null
null
t1_dfuzxg2
null
1493816544
2
t5_2fwo
null
null
null
null
SoraFirestorm
null
Could you list off some reasons why, please? (/s)
null
0
1491402176
False
0
dfv2t9b
t3_63l0xz
null
null
t1_dfuwsw4
null
1493816546
2
t5_2fwo
null
null
null
null
ftomassetti
null
I used to think like you and somehow it feels still wrong to use HTTP (not even tcp) for everything. But in the end it is just easy to mix and match languages
null
0
1491402181
False
0
dfv2tes
t3_63kj5h
null
null
t1_dfv0iv8
null
1493816548
8
t5_2fwo
null
null
null
null
Leumashy
null
Took me long enough to realize that you're a troll. Have a nice day.
null
0
1491402191
False
0
dfv2tq9
t3_63jq8w
null
null
t1_dfv245b
null
1493816552
1
t5_2fwo
null
null
null
null
snake_case-kebab-cas
null
Relevant article in terms of metaphysics in Clojure / FP: http://www.flyingmachinestudios.com/programming/the-unofficial-guide-to-rich-hickeys-brain/
null
0
1491402237
False
0
dfv2v53
t3_63lb23
null
null
t3_63lb23
null
1493816571
1
t5_2fwo
null
null
null
null
[deleted]
null
[deleted]
null
0
1491402239
1491473888
0
dfv2v6p
t3_63jq8w
null
null
t1_dfuvik0
null
1493816572
0
t5_2fwo
null
null
null
null
RobAtticus
null
It does support single row DELETEs (and UPDATEs), although we expect these to be rare in practice.
null
0
1491402341
False
0
dfv2ycl
t3_63fu8e
null
null
t1_dfulwtr
null
1493816614
1
t5_2fwo
null
null
null
null
WhatUnicorn
null
Welp - terrorism?! But okay, i guess i see your point.
null
0
1491402436
False
0
dfv317y
t3_63jq8w
null
null
t1_dfv2t3b
null
1493816654
1
t5_2fwo
null
null
null
null
pohatu
null
http://www.sears.com/access-tool-the-slim-jim/p-SPM8046847802
null
0
1491402480
False
0
dfv32mt
t3_63jq8w
null
null
t1_dfuwfc8
null
1493816672
2
t5_2fwo
null
null
null
null
vinnl
null
You're clearly not following the Rust programming language ;)
null
0
1491402521
False
0
dfv33wd
t3_63jq8w
null
null
t1_dfv0auw
null
1493816691
7
t5_2fwo
null
null
null
null
resident_ninja
null
"Do you use VC?" is a great opener for the just as important "HOW do you use VC?" some places have it, but barely make use of it. As an example: While some of us think "no branching, all work is done on mainline" is good, it's probably only good if you've come to that conclusion after appropriate consideration, and usually it's only "good" when used in conjunction with things like pair programming or good automated test coverage(or others: no or minimized long-lived un-merged development, etc). Not using any modern VC feature because you don't understand it, or your VC tool makes it difficult, or because you don't/can't do appropriate accompanying best practices: these should all be warning signs about the organization. ***** edit: I should have clarified this much earlier today, sorry. I phrased my initial comment poorly, everyone is looking at my "HOW", and my example, and thinking they're directly related, and that using branches versus just using mainline matters to me. by and large, it doesn't. I could have used "do you commit your dependencies to VC?" as my example. maybe I should have, to indicate how generically I meant to convey the "how" of "how do you use VC?" to me, branches vs mainline, dependencies in VC or not, aren't of primary concern after asking if VC is used. they're questions that shed further light on the landscape. What does matter to me is that some higher-level thought was given to what you're doing and how (_generically_, SDLC/process wise) you're going about it. the same applies for testing, planning, culture, and other things that Joel's test covers. even if his questions seem too basic, they can start/inform more conversation about further nuance that can point to either health or cancer in the organization. (such as using a bad mainline "strategy": being unable to perform multiple commits per day with a reasonably high measure of confidence that you haven't introduced regressions due to other similar organizational weaknesses, or bad branching strategies that might result in a lot of re-validation churn at certain chokepoints) :)
null
0
1491402626
1491462326
0
dfv375t
t3_63l7iv
null
null
t1_dfuzo6p
null
1493816737
13
t5_2fwo
null
null
null
null
sgmctabnxjs
null
Maybe 'demeaning' was the wrong word. If someone gave you a gift, you wouldn't say that to their face. I thought it was disrespectful. Looking a gift horse in the mouth, as they say. I don't think everything should be [yaka-wow](https://lindaroach.wordpress.com/2010/05/02/yaka-wow-a-new-word-is-born/). I understand the need to question keeping software closed source for so many years, but I didn't get that nuance from your initial comment, just the snark. Thanks for clarifying. A lot has changed since I first read the book when I was 16 back in ... um 1988 I think. So much software culture, large scale collaboration and openness. It's a very different world. Thanks for your balanced response. It's good to have a conversation about it. If you look at it, it's a really nice piece of software.
null
0
1491402631
False
0
dfv37ae
t3_63gixf
null
null
t1_dfuy5rk
null
1493816739
1
t5_2fwo
null
null
null
null
RobAtticus
null
We discussed the differences between Citus and some others on the HN comment section if you're interested: https://news.ycombinator.com/item?id=14035416 Let me know if something isn't answered there.
null
0
1491402647
False
0
dfv37tb
t3_63fu8e
null
null
t1_dfu35r0
null
1493816746
3
t5_2fwo
null
null
null
null
csmrh
null
And this is exactly why he's fucked. His case will likely be decided by people who don't fully understand the technology, and can't separate the differences between 'ability to commit a crime' and 'actually committing a crime.'
null
0
1491402679
False
0
dfv38rn
t3_63jq8w
null
null
t1_dfuwu39
null
1493816758
1
t5_2fwo
null
null
null
null
combinatorylogic
null
You can also find REGIS equally fascinating. Not to mention Tektronix vector graphics.
null
0
1491402687
False
0
dfv390r
t3_63lcwt
null
null
t3_63lcwt
null
1493816761
84
t5_2fwo
null
null
null
null
Ghancc
null
The House of Black and White must have some really shitty firewall protection.
null
0
1491402700
False
0
dfv39er
t3_63jq8w
null
null
t3_63jq8w
null
1493816766
1
t5_2fwo
null
null
null
null
noiserr
null
I understand the technology and I am not convinced he's innocent.
null
0
1491402719
False
0
dfv3a08
t3_63jq8w
null
null
t1_dfv38rn
null
1493816775
2
t5_2fwo
null
null
null
null
josefx
null
Did you tell them that you are going to pick a lock you don't own with it before or during the purchase? Or did they point out how it is the industry standard tool for burglaries and a basic requirement for a successful criminal activity? Maybe you even asked them if it would work on the secure lock of the shop that always keeps money over night just two blocks away? Could the seller honestly say: "I was not aware that /u/pohato was going to rob a place with them, I only sold these for hobbyists". Instead of: "So what if I make $20^1 from every burglary in the area and even give the criminals tips for good targets, it is called capitalism, so fuck of." ^1 I have no idea what good lock picks cost.
null
0
1491402725
False
0
dfv3a6e
t3_63jq8w
null
null
t1_dfv1w78
null
1493816777
0
t5_2fwo
null
null
null
null
WarWizard
null
> one person manages to pop a shell on one of the keylogged computers Wouldn't they go after the proxy/CA server instead / additionally?
null
0
1491402742
False
0
dfv3aq3
t3_63jq8w
null
null
t1_dfuzo18
null
1493816784
3
t5_2fwo
null
null
null
null
braindouche
null
Prototypal inheritance is delightful. The biggest problem it has is that it's different from classical inheritance, and therefore classical OOP programmers throw a fit. They threw so many fits that javascript added classical OOP syntax sugar just to shut them up.
null
0
1491402761
False
0
dfv3b9u
t3_63lb23
null
null
t1_dfuzr9z
null
1493816791
2
t5_2fwo
null
null
null
null
AN_IMPERFECT_SQUARE
null
no, I am not :) I just got into programming last year, still doing the "basic" languages
null
0
1491402780
False
0
dfv3bus
t3_63jq8w
null
null
t1_dfv33wd
null
1493816800
3
t5_2fwo
null
null
null
null
iceevil
null
isn't every word prediction software essentially a keylogger?
null
0
1491402787
False
0
dfv3c24
t3_63jq8w
null
null
t1_dfux2g2
null
1493816803
6
t5_2fwo
null
null
null
null
trichofobia
null
Damn! I don't know how I missed that! Thanks for correcting me!
null
0
1491402874
False
0
dfv3es2
t3_63jq8w
null
null
t1_dfuyfjj
null
1493816839
1
t5_2fwo
null
null
null
null
noiserr
null
If it's using a local dictionary then it's not being stored. If it needs to go out and hit a web service for instance then it's highly likely it's being logged. So it depends on the implementation.
null
0
1491402902
False
0
dfv3fo0
t3_63jq8w
null
null
t1_dfv3c24
null
1493816850
3
t5_2fwo
null
null
null
null
pohatu
null
http://www.sears.com/access-tool-the-slim-jim/p-SPM8046847802 People use this tool to break into cars all the time. The manufacturer does not have to vet who buys it from Sears and isn't arrested by the FBI for it's use in crimes.
null
0
1491402916
False
0
dfv3g3a
t3_63jq8w
null
null
t1_dfuwcxy
null
1493816857
0
t5_2fwo
null
null
null
null
webauteur
null
Thanks! This is an interesting discussion on how the underlying philosophical assumptions can lead to problems in the logic.
null
0
1491402924
False
0
dfv3gcq
t3_63lb23
null
null
t1_dfv2v53
null
1493816860
1
t5_2fwo
null
null
null
null
monumentshorts
null
If you're asking language syntax questions in an interview you are doing things horribly wrong
null
0
1491403044
False
0
dfv3k6w
t3_63l5eg
null
null
t3_63l5eg
null
1493816912
3
t5_2fwo
null
null
null
null
[deleted]
null
They can come back, but only if subsidized in some way or if the dollar weakens. You can't beat third world production costs, and American built robots are less expensive workers than humans. Thanks for the source, but 30k new manufacturing jobs added is not really significant considering there are currently 12.4 million manufacturing jobs, and 7 million have been lost in the past three decades. This trend is clearly decades old, and the concept that manufacturing is not coming back isn't one born from current DC politics. This is a well known trend acknowledged by the academic and research communities. https://www.bls.gov/iag/tgs/iag31-33.htm http://www.forbes.com/sites/timworstall/2016/10/19/the-us-lost-7-million-manufacturing-jobs-and-added-33-million-higher-paying-service-jobs/
null
0
1491403209
False
0
dfv3pjr
t3_637m7q
null
null
t1_dfv2mq5
null
1493816984
1
t5_2fwo
null
null
null
null
FnTom
null
Not being smart isn't illegal.
null
0
1491403217
False
0
dfv3pss
t3_63jq8w
null
null
t1_dfuv05h
null
1493816988
1
t5_2fwo
null
null
null
null
Njs41
null
*real* hackers use ASM.
null
0
1491403251
False
0
dfv3qv0
t3_63jq8w
null
null
t1_dfuuf1x
null
1493817003
0
t5_2fwo
null
null
null
null
josefx
null
> Businesses wanting to track employees work. Good that I live in a country where that level of intrusion is illegal. The amount of trust issues and micromanagement required for that to sound reasonable have to be terrifying.
null
0
1491403380
1491404164
0
dfv3uz1
t3_63jq8w
null
null
t1_dfuy9wh
null
1493817058
-3
t5_2fwo
null
null
null
null
quad64bit
null
Right, but what was that THING?!? What was it?!
null
0
1491403382
False
0
dfv3v21
t3_63jq8w
null
null
t1_dfv26o1
null
1493817059
1
t5_2fwo
null
null
null
null
lost_file
null
I've seen the Tektronix one before, but not REGIS. Very cool!
null
0
1491403384
False
0
dfv3v4p
t3_63lcwt
null
null
t1_dfv390r
null
1493817061
23
t5_2fwo
null
null
null
null
lalu_
null
What are you links with nginx? can we expect some kind of long term support of nchan if we start using it on production ?
null
0
1491403498
False
0
dfv3ys4
t3_5x5ylf
null
null
t1_dfv28hn
null
1493817109
1
t5_2fwo
null
null
null
null
occz
null
>Since it's faster to write, those bugs should also be dramaticly easier to fix. I'm not sure that I think this is true, faster to write does not necessarily equal easier to maintain. In addition, software defects that reach production are dramatically more expensive to fix than defects that are caught in development, which might be something to consider.
null
0
1491403533
False
0
dfv3zvd
t3_63c9e1
null
null
t1_dfv1q5f
null
1493817124
1
t5_2fwo
null
null
null
null
csmrh
null
But you couldn't think of a legitimate use? (There's several listed in the comments below yours) But you didn't realize windows has a built in keylogger? Edit: also, sorry I wasn't trying to sound like a dick. I was just pointing out this is an inherent problem when dealing with technical/specialized fields in court cases. You can be sure a jury of his 'peers' is not going to be made up of programmers and people in the field.
null
0
1491403604
1491403893
0
dfv427x
t3_63jq8w
null
null
t1_dfv3a08
null
1493817156
1
t5_2fwo
null
null
null
null
orksnork
null
Welp, then he's pooched.
null
0
1491403645
False
0
dfv43it
t3_63jq8w
null
null
t1_dfv2azv
null
1493817173
4
t5_2fwo
null
null
null
null
pohatu
null
A much more apt analogy is radar detectors.
null
0
1491403663
False
0
dfv443e
t3_63jq8w
null
null
t3_63jq8w
null
1493817181
1
t5_2fwo
null
null
null
null
c0d3g33k
null
> If someone gave you a gift, you wouldn't say that to their face. I thought it was disrespectful. Looking a gift horse in the mouth, as they say. I hang my head in shame. Of course I didn't say that to Rudy Rucker's face, just posted something on Reddit, but point taken. If only the rest of the world were like this little corner of Reddit. What a wonderful world it would be. Peace be with you, my friend. I leave this conversation with a smile.
null
0
1491403677
False
0
dfv44ja
t3_63gixf
null
null
t1_dfv37ae
null
1493817187
2
t5_2fwo
null
null
null
null
Dwedit
null
This isn't your run-of-the-mill VNC server, this is a password harvester and keylogger, and webcam spying tool. Password harvesting and keylogging generally have no place in a legitimate remote administration tool.
null
0
1491403686
False
0
dfv44tz
t3_63jq8w
null
null
t3_63jq8w
null
1493817190
8
t5_2fwo
null
null
null
null
TheAwesomeTheory
null
When will VR support be included in the main branch?
null
0
1491403750
False
0
dfv46ui
t3_63llgh
null
null
t3_63llgh
null
1493817217
11
t5_2fwo
null
null
null
null
yogthos
null
Yeah, I definitely agree with you there. There's a lot more that could be done with the tooling to make the dev experience more fluid. I think it's an artifact of Clojure still being relatively new, and having a much smaller community than CL though. Personally, I'm just really happy that it's a viable modern Lisp that I can use professionally today. :)
null
0
1491403766
False
0
dfv47dy
t3_62no6j
null
null
t1_dfs9oka
null
1493817225
2
t5_2fwo
null
null
null
null
rawb0t
null
see: lockpick kits
null
0
1491403771
False
0
dfv47j9
t3_63jq8w
null
null
t1_dfv3g3a
null
1493817227
1
t5_2fwo
null
null
null
null
nhumrich
null
I would hope you would catch all type based errors in development/staging... Because the only way that error is making it to prod is if you never tested it in any way shape or form.
null
0
1491403794
False
0
dfv48aq
t3_63c9e1
null
null
t1_dfv3zvd
null
1493817236
1
t5_2fwo
null
null
null