archived stringclasses 2
values | author stringlengths 3 20 | author_fullname stringlengths 4 12 ⌀ | body stringlengths 0 22.5k | comment_type stringclasses 1
value | controversiality stringclasses 2
values | created_utc stringlengths 10 10 | edited stringlengths 4 12 | gilded stringclasses 7
values | id stringlengths 1 7 | link_id stringlengths 7 10 | locked stringclasses 2
values | name stringlengths 4 10 ⌀ | parent_id stringlengths 5 10 | permalink stringlengths 41 91 ⌀ | retrieved_on stringlengths 10 10 ⌀ | score stringlengths 1 4 | subreddit_id stringclasses 1
value | subreddit_name_prefixed stringclasses 1
value | subreddit_type stringclasses 1
value | total_awards_received stringclasses 19
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
True | dabombnl | null | Omfg, when can this joke be over? | null | 0 | 1316197153 | False | 0 | c2kd7e4 | t3_khtwb | null | t1_c2kd7e4 | t1_c2kcvub | null | 1427608707 | -13 | t5_2fwo | null | null | null |
True | garrison | null | The plaintext password will also be stored in the user's web history since it's part of the URL. It will be given as a Http-Referrer to any pages (SSL or not) that the fedex page links to. | null | 0 | 1316197215 | False | 0 | c2kd7qi | t3_khtwb | null | t1_c2kd7qi | t1_c2kczdy | null | 1427608712 | 130 | t5_2fwo | null | null | null |
True | WalterBright | null | Because we get tired of complaining about existing ones. | null | 0 | 1316197215 | False | 0 | c2kd7qk | t3_kfvm7 | null | t1_c2kd7qk | t1_c2k5czm | null | 1427608712 | 3 | t5_2fwo | null | null | null |
True | the_red_scimitar | null | Mmm, not really, since after the initial 15 minutes of excitement, the hundred or so people who were in my circle almost all just stopped posting or caring.
But maybe Google will keep it running for your massive circle. | null | 0 | 1316197314 | False | 0 | c2kd87d | t3_kgsnl | null | t1_c2kd87d | t1_c2kaswd | null | 1427608719 | 3 | t5_2fwo | null | null | null |
True | 21echoes | null | Microsoft is leading the way in implementing proprietary APIs which work the web into their native runtime. Mozilla (and Google to some degree) are leading the way in bringing the full breadth of native app abilities to the web in a standards-friendly, cross-OS, cross-browser way with their Boot2Gecko and Open Web Apps projects.
otherwise, you're exactly right-- there's little to no reason to lock yourself into a market with a big ol gatekeeper and 30% tax and no crossplatform ability. | null | 0 | 1316197318 | False | 0 | c2kd87z | t3_kg2sg | null | t1_c2kd87z | t1_c2jz4ax | null | 1427608719 | 1 | t5_2fwo | null | null | null |
True | pseudolobster | null | I get the impression this is sarcasm, but in an HTTPS session the URI is encrypted, right?
I mean, in a regular HTTP session, the choice between POST and GET really doesn't make any difference in the long run, as they're both unencrypted, and both exactly as easy to intercept. I imagine the same is true of HTTPS - It doesn't matter that your password is in the URI, other than the fact it gets stored in your local browser history. | null | 0 | 1316197324 | False | 0 | c2kd894 | t3_khtwb | null | t1_c2kd894 | t1_c2kczha | null | 1427608719 | 149 | t5_2fwo | null | null | null |
True | Imorine | null | ok... do you see the alt text to the comic? That is him telling you this is absolute BS. | null | 0 | 1316197326 | False | 0 | c2kd89o | t3_khtwb | null | t1_c2kd89o | t1_c2kcxkq | null | 1427608719 | -9 | t5_2fwo | null | null | null |
True | aristus | null | You are right, but do you have something to say about the main drift of the article? Do you think that programming or computer science should remain as difficult as it is today, for now and forever? | null | 0 | 1316197363 | False | 0 | c2kd8gr | t3_khrn6 | null | t1_c2kd8gr | t1_c2kctdw | null | 1427608722 | 2 | t5_2fwo | null | null | null |
True | dabombnl | null | Except now that it is in the URL, it may appear in logs on the server or saved in your browser history. | null | 0 | 1316197367 | False | 0 | c2kd8hl | t3_khtwb | null | t1_c2kd8hl | t1_c2kczdy | null | 1427608722 | 18 | t5_2fwo | null | null | null |
True | wadcann | null | >Believe it or not, computing has changed in the last 40 years, and they need new APIs to support that.
Right, and as new hardware has shown up, there have been new functions showing up for it (though that's an X11 thing).
>They took all the old stuff and basically said "this is legacy" and started with a clean slate
And wiped all the value of their accumulated programmers' knowledge store.
>asynchronous access to network/disk that is directly accessible from high level modern languages
O_NONBLOCK? On Win32, WaitNextObject() had a bound of 64 objects last I looked, which made it pretty much useless in terms of async demuxing. You mean IOCP and forcing use of thread pools?
>It would be fantastic if the same thing that MS is doing happened with unix/linux.
Strongly disagree, but hopefully if you like having your platform vanish periodically, you're programming on a platform that does that. :-) | null | 0 | 1316197367 | False | 0 | c2kd8hr | t3_kgl4f | null | t1_c2kd8hr | t1_c2ka6dy | null | 1427608722 | -1 | t5_2fwo | null | null | null |
True | [deleted] | null | This is cool! Mine is letmein | null | 0 | 1316197410 | False | 0 | c2kd8ow | t3_khtwb | null | t1_c2kd8ow | t1_c2kd3jh | null | 1427608725 | -3 | t5_2fwo | null | null | null |
True | 21echoes | null | what do you mean "not fast enough"?
and the amount of web devs versus native iOS devs I believe speaks to the relative difficulties of coding for each platform.
look+native feel is one of the APIs which is being built into html5-- it's definitely do-able. | null | 0 | 1316197497 | False | 0 | c2kd95z | t3_kg2sg | null | t1_c2kd95z | t1_c2k0m9z | null | 1427608732 | 1 | t5_2fwo | null | null | null |
True | 14domino | null | I learned Django/JS/CSS a few months ago despite having a full-time job and made a web app that now has a couple hundred users (for fun, mostly, not trying to get rich just yet) and I'm 27. Granted I basically had no life for a few months, but I don't think I learn any slower now than I did when I was young. It might actually be faster. | null | 0 | 1316197497 | False | 0 | c2kd960 | t3_khf6j | null | t1_c2kd960 | t1_c2kardn | null | 1427608732 | 1 | t5_2fwo | null | null | null |
True | name_was_taken | null | This is not an ethical matter. It's an ignorance matter. Some people just don't know why this is wrong. | null | 0 | 1316197517 | False | 0 | c2kd99h | t3_khtwb | null | t1_c2kd99h | t1_c2kcxdp | null | 1427608733 | 35 | t5_2fwo | null | null | null |
True | fla-guy | null | puberty!!! arrgh! | null | 0 | 1316197518 | False | 0 | c2kd99n | t3_khf6j | null | t1_c2kd99n | t1_c2ka98y | null | 1427608733 | 2 | t5_2fwo | null | null | null |
True | sashakir | null | AppCode is so much better than Xcode, a lot of refactorings and code analyses double my productivity comparing to Xcode. A lot more stable and doesn't crash like Xcode. | null | 0 | 1316197550 | False | 0 | c2kd9gb | t3_khqu6 | null | t1_c2kd9gb | t3_khqu6 | null | 1427608742 | -1 | t5_2fwo | null | null | null |
True | ngony | null | and shoulder surfers. | null | 0 | 1316197561 | False | 0 | c2kd9i6 | t3_khtwb | null | t1_c2kd9i6 | t1_c2kd894 | null | 1427608742 | 16 | t5_2fwo | null | null | null |
True | name_was_taken | null | And the server's logs. | null | 0 | 1316197582 | False | 0 | c2kd9lp | t3_khtwb | null | t1_c2kd9lp | t1_c2kd894 | null | 1428193890 | 194 | t5_2fwo | null | null | null |
True | jorgelo | null | The main difference is that the user/pass in the password is a url move, you know, because it's in your history, someone is standing behind you and notices the password (or if you take a screenshot). | null | 0 | 1316197584 | False | 0 | c2kd9m2 | t3_khtwb | null | t1_c2kd9m2 | t1_c2kd894 | null | 1428193890 | 8 | t5_2fwo | null | null | null |
True | ethraax | null | Really? I'm no expert with using C++ with Windows, but this excerpt right before the code:
> In the .NET case, creating a WinRT component has been drastically simplified. The following is the full source code for a component that adds 2:
seems to imply that the code sample there is for .NET, which would be C++/CLI, right? | null | 0 | 1316197607 | False | 0 | c2kd9pq | t3_kgl4f | null | t1_c2kd9pq | t1_c2kc86u | null | 1427608739 | 2 | t5_2fwo | null | null | null |
True | 14domino | null | What's a cetegory? | null | 0 | 1316197668 | False | 0 | c2kda10 | t3_khf6j | null | t1_c2kda10 | t1_c2kcrpo | null | 1427608744 | 1 | t5_2fwo | null | null | null |
True | ngony | null | Referer SHOULD NOT be transmitted as part of a HTTPS -> HTTP transition. See RFC2616. | null | 0 | 1316197688 | False | 0 | c2kda57 | t3_khtwb | null | t1_c2kda57 | t1_c2kd7qi | null | 1427608747 | 78 | t5_2fwo | null | null | null |
True | [deleted] | null | of course... but you can install windows in a virtual machine to test it out. | null | 0 | 1316197708 | False | 0 | c2kda98 | t3_khtuh | null | t1_c2kda98 | t1_c2kd18c | null | 1427608748 | 10 | t5_2fwo | null | null | null |
True | raydeen | null | When the Sun grows cold. | null | 0 | 1316197712 | False | 0 | c2kdaaa | t3_khtwb | null | t1_c2kdaaa | t1_c2kd7e4 | null | 1427608748 | 19 | t5_2fwo | null | null | null |
True | robertodeltoro | null | It's Wolfram's blog. We should be thankful that it doesn't say that *Mathematica* used the *12 year old boy* to publish *its* paper on pi. Wolfram's a lot like Craig Venter; a genius you don't want to admit is a genius because he's such a total fucking knob. | null | 0 | 1316197900 | True | 0 | c2kdb94 | t3_khf6j | null | t1_c2kdb94 | t1_c2kat2s | null | 1427608758 | 22 | t5_2fwo | null | null | null |
True | noumuon | null | to be fair, it's not really his solution. though it is still quite impressive for a 13 year old to be doing this compared to an average 13 year old. | null | 0 | 1316197910 | False | 0 | c2kdbb2 | t3_khf6j | null | t1_c2kdbb2 | t1_c2kc5sf | null | 1427608760 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316197963 | False | 0 | c2kdbl8 | t3_khtwb | null | t1_c2kdbl8 | t3_khtwb | null | 1427608763 | 1 | t5_2fwo | null | null | null |
True | rm999 | null | I don't want to be that dick, but:
>Some seem to think this reddit is for "links that programmers might find interesting or funny". No. It's for programming links. Programming. Programming. Programming.
>Just because it has a computer in it doesn't make it programming
>If there is no code in your link, it probably doesn't belong here.
edit: no need to downvote me any more, I understand not everyone agrees with me. But, if you disagree, reply! | null | 0 | 1316198025 | True | 0 | c2kdbwi | t3_khtwb | null | t1_c2kdbwi | t3_khtwb | null | 1427608768 | -2 | t5_2fwo | null | null | null |
True | noumuon | null | this would be true if it weren't false. see: the long history of mathematical geniuses. | null | 0 | 1316198045 | False | 0 | c2kdc05 | t3_khf6j | null | t1_c2kdc05 | t1_c2kafx1 | null | 1427608771 | 0 | t5_2fwo | null | null | null |
True | Teifion | null | This is excellent (though it doesn't expand the alphabet when you use characters such as "!"). | null | 0 | 1316198088 | False | 0 | c2kdc82 | t3_khtwb | null | t1_c2kdc82 | t1_c2kd0yy | null | 1427608781 | 1 | t5_2fwo | null | null | null |
True | axiak | null | What if it's a link to another https domain? | null | 0 | 1316198096 | False | 0 | c2kdc9g | t3_khtwb | null | t1_c2kdc9g | t1_c2kda57 | null | 1427608781 | 10 | t5_2fwo | null | null | null |
True | lilmul123 | null | you can go hunter2 my hunter2-ing hunter2
haha, does that look funny to you? | null | 0 | 1316198139 | False | 0 | c2kdci4 | t3_khtwb | null | t1_c2kdci4 | t1_c2kd3t7 | null | 1427608775 | 15 | t5_2fwo | null | null | null |
True | noumuon | null | i implore you to never read anything about pure mathematics if you're asking such things. | null | 0 | 1316198143 | False | 0 | c2kdciy | t3_khf6j | null | t1_c2kdciy | t1_c2kc12g | null | 1427608777 | 1 | t5_2fwo | null | null | null |
True | Teifion | null | Really? Even assuming that the attacker knows that you are using 4 random words and thus stripping out a lot of brute force issues it's still a stronger password. I've always seen the alt text on that one meaning that weak security trumps a strong password, writing it down means it's useless etc etc. | null | 0 | 1316198158 | False | 0 | c2kdcm0 | t3_khtwb | null | t1_c2kdcm0 | t1_c2kd89o | null | 1427608777 | 4 | t5_2fwo | null | null | null |
True | [deleted] | null | Computer science, like physics or mathematics, is what it is. Aren't you really asking if it somebody could come along and do a better job of teaching it? The answer to that is pretty obvious.
If you ask about programming, well that's a much different question and far more difficult to answer.
| null | 0 | 1316198189 | False | 0 | c2kdcrk | t3_khrn6 | null | t1_c2kdcrk | t1_c2kd8gr | null | 1427608780 | 2 | t5_2fwo | null | null | null |
True | matthieum | null | I find the statement about the "or" condition in the test rather startling. In C++, gcov will consider a short-circuiting or/and has an implicit branch, and thus it appears in the branch report (it also reports how many times *each* side of a branch have been taken, never taking one side means you didn't get 100% branch coverage either!).
I am also surprised that the main issue with branch coverage is not shown: path coverage. Of course path coverage is much more difficult (exponential), but it's where things matter.
Suppose I have:
Char foo(String s, String t) {
String g;
if (not s.empty()) { g = s; }
if (not t.empty()) { g = t; }
return g.at(0);
}
Now, calling `foo` with `("s", "t")`, `("", "t")`, `("s", "")` will make sure that all sides of the branches have been covered (100% branch coverage: hurray ?). Of course, it blithely ignore the fact that one path `("", "")` has never been exercised... and is buggy. | null | 0 | 1316198218 | False | 0 | c2kdcwy | t3_khhdj | null | t1_c2kdcwy | t3_khhdj | null | 1427608790 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316198227 | False | 0 | c2kdcyi | t3_khtwb | null | t1_c2kdcyi | t1_c2kd894 | null | 1427608790 | -7 | t5_2fwo | null | null | null |
True | [deleted] | null | One might even say he embiggens the hearts of men with his lengthy sentences. | null | 0 | 1316198263 | False | 0 | c2kdd3z | t3_khf6j | null | t1_c2kdd3z | t1_c2kd1wj | null | 1427608786 | 0 | t5_2fwo | null | null | null |
True | metaperl | null | [5](http://lang5.sourceforge.net) FTW | null | 0 | 1316198331 | False | 0 | c2kddg7 | t3_kh9sr | null | t1_c2kddg7 | t3_kh9sr | null | 1427608793 | 1 | t5_2fwo | null | null | null |
True | pseudolobster | null | Really? I didn't know that was possible. | null | 0 | 1316198348 | False | 0 | c2kddj2 | t3_khtwb | null | t1_c2kddj2 | t1_c2kdcyi | null | 1427608793 | 1 | t5_2fwo | null | null | null |
True | prozonelayer | null | Also, if you were to print out the page, wouldn't the URL be printed out as well? | null | 0 | 1316198361 | False | 0 | c2kddlk | t3_khtwb | null | t1_c2kddlk | t1_c2kd894 | null | 1427608793 | 48 | t5_2fwo | null | null | null |
True | [deleted] | null | Most computer science is done with pencil and paper or marker and white board.
I think programming and computer science are related in the same way that technology and science or maybe mechanical engineering and physics are related. Not a great analogy, but it's the best I can come up with right now.
| null | 0 | 1316198427 | False | 0 | c2kddw4 | t3_khrn6 | null | t1_c2kddw4 | t1_c2kczbd | null | 1427608805 | 2 | t5_2fwo | null | null | null |
True | javascriptinjection | null | I know they can check if you have visited a url but how can they extract the URL without brute force checking? | null | 0 | 1316198442 | False | 0 | c2kddyt | t3_khtwb | null | t1_c2kddyt | t1_c2kdcyi | null | 1427608797 | 5 | t5_2fwo | null | null | null |
True | AttackingHobo | null | Really? What did you expect? | null | 0 | 1316198477 | False | 0 | c2kde5f | t3_khtuh | null | t1_c2kde5f | t1_c2kd18c | null | 1428193886 | 16 | t5_2fwo | null | null | null |
True | pseudolobster | null | Oh, duh. Yeah, I didn't think about that. The page is intended to be printed, and all browsers add the URL at the top of the printed page by default. | null | 0 | 1316198513 | False | 0 | c2kdeci | t3_khtwb | null | t1_c2kdeci | t1_c2kddlk | null | 1427608818 | 24 | t5_2fwo | null | null | null |
True | sidcool1234 | null | Dammit, I was going to say that!! | null | 0 | 1316198522 | False | 0 | c2kdee9 | t3_khtwb | null | t1_c2kdee9 | t1_c2kczha | null | 1427608818 | -7 | t5_2fwo | null | null | null |
True | CaptainTrips | null | It goes into your web browser history and gets logged on the webserver in plain text. Then if someone steals the server log, they have a bunch of unencrypted usernames and passwords. | null | 0 | 1316198527 | False | 0 | c2kdef6 | t3_khtwb | null | t1_c2kdef6 | t1_c2kcygb | null | 1427608818 | 9 | t5_2fwo | null | null | null |
True | horizon | null | No, it is not. He's saying that he apologizes to people who know this is how password strength works, who are also stuck arguing with users who do not know this, but think they do. :) | null | 0 | 1316198564 | False | 0 | c2kdeme | t3_khtwb | null | t1_c2kdeme | t1_c2kd89o | null | 1427608821 | 5 | t5_2fwo | null | null | null |
True | MarcuBot | null | "C++/CLI IntelliSense. C++/CLI now has full IntelliSense support. "
THANK YOU !!!! | null | 0 | 1316198578 | False | 0 | c2kdep4 | t3_khtuh | null | t1_c2kdep4 | t3_khtuh | null | 1427608830 | 24 | t5_2fwo | null | null | null |
True | octaviusromulus | null | Fair enough. But where would you have recommended I put it? | null | 0 | 1316198638 | False | 0 | c2kdf0t | t3_khtwb | null | t1_c2kdf0t | t1_c2kdbwi | null | 1427608824 | 5 | t5_2fwo | null | null | null |
True | propool | null | And exactly what api is that? Don't say that link color thing. Won't work here. | null | 0 | 1316198638 | False | 0 | c2kdf0u | t3_khtwb | null | t1_c2kdf0u | t1_c2kdcyi | null | 1427608824 | 7 | t5_2fwo | null | null | null |
True | personman | null | No. It's not. It's him apologizing to those of us who have to have this conversation with people like you >_> | null | 0 | 1316198653 | False | 0 | c2kdf3r | t3_khtwb | null | t1_c2kdf3r | t1_c2kd89o | null | 1427608826 | 6 | t5_2fwo | null | null | null |
True | jutct | null | The server he logged into by using that username and password. The same one with the database containing that username and password. | null | 0 | 1316198659 | False | 0 | c2kdf4w | t3_khtwb | null | t1_c2kdf4w | t1_c2kd9lp | null | 1427608826 | -2 | t5_2fwo | null | null | null |
True | [deleted] | null | I agree that I'm glad the OP used a good password, but I've got to comment on Gibson's scheme.
Haystack is bad. If you're looking for good password options, check r/Netsec.
Short answer is use something like KeePass, 1Password, or LastPass (depending on your threat scenario, and whether it's for you or for your mom/grandma) that just remembers them for you. Completely random, customizable, reasonably (often quite reasonably) secure, and actually easier to use than Haystack. | null | 0 | 1316198671 | False | 0 | c2kdf7e | t3_khtwb | null | t1_c2kdf7e | t1_c2kd0yy | null | 1427608826 | 4 | t5_2fwo | null | null | null |
True | emarkd | null | Only missed it by 47 minutes. Look at all that sweet, sweet karma you could've had... | null | 0 | 1316198682 | False | 0 | c2kdf94 | t3_khtwb | null | t1_c2kdf94 | t1_c2kdee9 | null | 1427608827 | 5 | t5_2fwo | null | null | null |
True | rosettacoin | null | FYI: If someone types in that URL, the information that is blurred in the image can be seen. | null | 0 | 1316198690 | False | 0 | c2kdfay | t3_khtwb | null | t1_c2kdfay | t3_khtwb | null | 1427608829 | 95 | t5_2fwo | null | null | null |
True | jsled | null | (Congress overhauled the patent system, actually. Congress writes and passes laws; and in this instance, Obama hasn't been actively driving or advocating much specifically. If you want to assign an actor to this, look to the long-serving senator from my state, Patrick Leahy, and Rep Smith of Texas, the main sponsors.)
Looks like it's not substantially different in terms of software patents.
- http://www.techdirt.com/articles/20110906/19492915835/congress-moves-forward-with-useless-patent-reform-that-wont-fix-any-real-problems.shtml
- https://www.eff.org/deeplinks/2011/09/patent-reform-legislation-set-become-law-will-make
So, since we still have software and business method patents, with no meaningful reform, things are still bad.
| null | 0 | 1316198706 | False | 0 | c2kdfdd | t3_khvyw | null | t1_c2kdfdd | t3_khvyw | null | 1427608829 | 124 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316198737 | False | 0 | c2kdfka | t3_khvyw | null | t1_c2kdfka | t3_khvyw | null | 1427608830 | 1 | t5_2fwo | null | null | null |
True | slashdotter | null | Even though the uri is encrypted with SSL/TLS, the uri shows up in the web/application server logs, WILL be in your browser's history, and javascripts you've embedded in the page (even from from third-party sites) WILL be able to see it. It can also show up as an http-referrer. Someone can also see it over your shoulder on your screen. | null | 0 | 1316198752 | False | 0 | c2kdfng | t3_khtwb | null | t1_c2kdfng | t1_c2kczha | null | 1427608830 | 23 | t5_2fwo | null | null | null |
True | BusStation16 | null | You changed it, I am assuming? | null | 0 | 1316198755 | False | 0 | c2kdfny | t3_khtwb | null | t1_c2kdfny | t3_khtwb | null | 1427608830 | 7 | t5_2fwo | null | null | null |
True | [deleted] | null | This was a problem with the a:visited CSS style, I believe. It would require them knowing the URL ahead of time **just** to see if you visited that page; you wouldn't be able to magically get someone browsing history.
That being said, I believed this has been fixed and was never used outside of a proof-of-concept "this is possible" kind of thing as there isn't a whole lot of use behind this type of "attack." | null | 0 | 1316198775 | False | 0 | c2kdfrq | t3_khtwb | null | t1_c2kdfrq | t1_c2kdcyi | null | 1427608832 | 2 | t5_2fwo | null | null | null |
True | rm999 | null | Maybe in r/WTF? | null | 0 | 1316198812 | False | 0 | c2kdfyl | t3_khtwb | null | t1_c2kdfyl | t1_c2kdf0t | null | 1427608833 | 4 | t5_2fwo | null | null | null |
True | emarkd | null | Not the OP, but his submission didn't seem so out of place here. Sometimes learning what _not_ to do is as important as learning what to do.
What would be the appropriate subreddit for a programming fail? | null | 0 | 1316198829 | False | 0 | c2kdg20 | t3_khtwb | null | t1_c2kdg20 | t1_c2kdbwi | null | 1427608834 | 11 | t5_2fwo | null | null | null |
True | bewmar | null | Hopefully hashed... | null | 0 | 1316198856 | False | 0 | c2kdg7i | t3_khtwb | null | t1_c2kdg7i | t1_c2kdf4w | null | 1427608835 | 10 | t5_2fwo | null | null | null |
True | DownGoat | null | The database might be stored on a different location. It is generally a good idea to have the different services running in different virtual machines to limit the reach of a attack. | null | 0 | 1316198865 | False | 0 | c2kdg8w | t3_khtwb | null | t1_c2kdg8w | t1_c2kdf4w | null | 1427608835 | 3 | t5_2fwo | null | null | null |
True | prelic | null | Computational Theory was my favorite class in school (the class that goes over all this stuff). In my not so expert opinion, I believe that P != NP, for most of the reasons listed here:
http://www.scottaaronson.com/blog/?p=122
However, as a software engineer, I hope we find that P = NP! | null | 0 | 1316198873 | False | 0 | c2kdga8 | t3_kgfhb | null | t1_c2kdga8 | t3_kgfhb | null | 1427608835 | 1 | t5_2fwo | null | null | null |
True | cuwabren | null | Not if they are doing it right. You aren't supposed to store plaintext passwords ANYWHERE. You store hashes. | null | 0 | 1316198907 | False | 0 | c2kdghf | t3_khtwb | null | t1_c2kdghf | t1_c2kdf4w | null | 1427608837 | 86 | t5_2fwo | null | null | null |
True | appointment_at_1_am | null | for free | null | 0 | 1316198911 | False | 0 | c2kdgi8 | t3_khtwb | null | t1_c2kdgi8 | t1_c2kcs4z | null | 1427608837 | 94 | t5_2fwo | null | null | null |
True | serudla | null | or maybe the way that molecular chemistry and fast food are related? | null | 0 | 1316199015 | False | 0 | c2kdh0m | t3_khrn6 | null | t1_c2kdh0m | t1_c2kddw4 | null | 1427608847 | 1 | t5_2fwo | null | null | null |
True | mediapl0y | null | aka a hash stash. | null | 0 | 1316199028 | False | 0 | c2kdh2p | t3_khtwb | null | t1_c2kdh2p | t1_c2kdghf | null | 1427608847 | 8 | t5_2fwo | null | null | null |
True | [deleted] | null | netsec maybe? ¯\(°_o)/¯ | null | 0 | 1316199031 | False | 0 | c2kdh3b | t3_khtwb | null | t1_c2kdh3b | t1_c2kdf0t | null | 1427608846 | 2 | t5_2fwo | null | null | null |
True | neuter | null | Sweet, so where can I get a free and legal copy of Windows to test it out? | null | 0 | 1316199035 | False | 0 | c2kdh42 | t3_khtuh | null | t1_c2kdh42 | t1_c2kda98 | null | 1427608846 | -26 | t5_2fwo | null | null | null |
True | appointment_at_1_am | null | You could see it as an example on how not to implement loging in into multiple websites. They probably wanted to let you log into the site from another. Maybe if you could write a report/blog/post about it, it would be better, how you should do it. | null | 0 | 1316199049 | False | 0 | c2kdh6h | t3_khtwb | null | t1_c2kdh6h | t1_c2kdbwi | null | 1427608847 | 3 | t5_2fwo | null | null | null |
True | donkey_lz | null | I'll be 23 in two weeks :-). Granted, it might be too early to tell, but it feels a lot like there's a learning muscle. I thought I had hit this wall about two years ago, when I began having noticeable problems learning new stuff, but that was mostly because I had (unintentionally) dropped many of my on-the-side pursuits to focus on electrical engineering. Once I started dabbling in various other things again, everything started being far more elastic. | null | 0 | 1316199050 | False | 0 | c2kdh6w | t3_khf6j | null | t1_c2kdh6w | t1_c2kcztq | null | 1427608847 | 2 | t5_2fwo | null | null | null |
True | the_opinion | null | Who cares? Virtually nobody reading that site actually needs to scale anything any great degree | null | 0 | 1316199051 | False | 0 | c2kdh70 | t3_khlcd | null | t1_c2kdh70 | t3_khlcd | null | 1427608847 | 2 | t5_2fwo | null | null | null |
True | jutct | null | A programmer wrote code that sucks. Other programmers noticed it and agree that it's bad practice. In summation, do not do this in your own programming.
It's a relevant link. | null | 0 | 1316199072 | False | 0 | c2kdhb7 | t3_khtwb | null | t1_c2kdhb7 | t1_c2kdbwi | null | 1427608849 | 5 | t5_2fwo | null | null | null |
True | [deleted] | null | However, the same RFC says that GET requests should not be used for sensitive data. | null | 0 | 1316199126 | False | 0 | c2kdhl8 | t3_khtwb | null | t1_c2kdhl8 | t1_c2kda57 | null | 1427608849 | 99 | t5_2fwo | null | null | null |
True | zetec | null | r/netsec maybe?
Honestly though, i think it's perfectly fine here, don't listen to that whiner. A shitty programmer wrote shitty code that has a huge security issue - fits right in here. Plus, r/programming has a very large subscriber-base. With a company as big as Fedex, they need to be publicly shamed into correcting this. You're doing good things here, ignore that whiner. | null | 0 | 1316199132 | False | 0 | c2kdhmr | t3_khtwb | null | t1_c2kdhmr | t1_c2kdf0t | null | 1427608851 | 5 | t5_2fwo | null | null | null |
True | monoglot | null | And if the link gets upvoted, are the upvoters wrong or are you wrong? | null | 0 | 1316199157 | False | 0 | c2kdhql | t3_khtwb | null | t1_c2kdhql | t1_c2kdbwi | null | 1427608852 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316199226 | False | 0 | c2kdi15 | t3_khtwb | null | t1_c2kdi15 | t1_c2kd894 | null | 1427608855 | 1 | t5_2fwo | null | null | null |
True | adolfojp | null | Why would you ask a question you already know the answer to?
Are you trying to make a statement about free software vs. non free software? You will get better results by being explicit and on topic than by making snide remarks. | null | 0 | 1316199245 | False | 0 | c2kdi3s | t3_khtuh | null | t1_c2kdi3s | t1_c2kdh42 | null | 1427608856 | 13 | t5_2fwo | null | null | null |
True | neoform | null | >It's okay, they're using https.
It was ok, until he posted a screenshot.
Seriously though, even though it's encrypted, passing username/password via GET is stupid, it should be done via post and a session hash passed instead. This was pure laziness/incompetence on the part of the programmer. | null | 0 | 1316199286 | False | 0 | c2kdia6 | t3_khtwb | null | t1_c2kdia6 | t1_c2kczha | null | 1427608857 | 6 | t5_2fwo | null | null | null |
True | tip_ty | null | it looked funny the first hundred times | null | 0 | 1316199332 | False | 0 | c2kdiio | t3_khtwb | null | t1_c2kdiio | t1_c2kdci4 | null | 1427608859 | 143 | t5_2fwo | null | null | null |
True | jutct | null | Yes hopefully. What are the chances the same mook that put the PW in the get request wrote the login manager code? If if it's hashed, rainbow tables have made hashed passwords less secure. Just ask HB Gary. | null | 0 | 1316199340 | True | 0 | c2kdijh | t3_khtwb | null | t1_c2kdijh | t1_c2kdg7i | null | 1427608859 | 1 | t5_2fwo | null | null | null |
True | skew | null | > You know, they don't call these 'holy wars' for nothing.
I have some more questions along these lines, but it's getting a bit off topic.
> It's evidence that non-experts (many of us) may not be helped much by type systems.
I agree that it's good evidence that just slapping on a weak type system doesn't help novices in completely unfamiliar domain, and it seems safe enough to generalize a bit, and cast some doubt about.
> Don Stewart (figure out the types of all your functions with stubs for typechecking, and then fill in the implementations) may not work very well for non-experts who don't understand the language and domain intimately.
I'm surprised you mention dons in your conclusions at all. Taking your conjunction literally,
it sounds like you believed before seeing these results that there was some chance that a typeful programming methodology would produce significant performance improvements in novices *not instructed in* the methodology, not asked to use the methodology, and using a different sort of language and a different sort of type system from the ones where the methodology was advocated.
> It's not strong evidence, but the study is better than most of the older ones which are cited when people try to rigorously discuss the topic of static vs dynamic or OOP versus FP.
It's certainly "better" in the sense of experimental design. It's also better evidence about static vs. dynamic typing than some other studies. It couldn't possibly be better evidence about OOP versus FP than studies that, you know, actually included both OO and FP languages! (It also doesn't seem include any dynamic languages, in the sense of allowing stuff like adding methods to an object at runtime). | null | 0 | 1316199346 | False | 0 | c2kdikk | t3_k7o9e | null | t1_c2kdikk | t1_c2jjr93 | null | 1427608859 | 1 | t5_2fwo | null | null | null |
True | Imorine | null | If they know its 4 random words you change the game a bit. They would no longer be searching character by character but rather word by word making the possible combinations (length of dictionary)^4 which is much weaker than the first one.
What makes it stronger is the sheer length of it (giggity). More than double the "strong" password. Most places enforce a 16 character password max (which is stupid) and most people cant be bothered to even enter that many characters for their password. | null | 0 | 1316199413 | False | 0 | c2kdiwj | t3_khtwb | null | t1_c2kdiwj | t1_c2kdcm0 | null | 1427608862 | 0 | t5_2fwo | null | null | null |
True | Oppis | null | should be using post instead of get.
gotta know your http verbs people. | null | 0 | 1316199441 | False | 0 | c2kdj1v | t3_khtwb | null | t1_c2kdj1v | t3_khtwb | null | 1427608863 | 3 | t5_2fwo | null | null | null |
True | adolfojp | null | Lets switch things around to give you some perspective on how your comment looks.
OP: A new developer preview of the Advanced Packaging Tool now available for download
adolfojp: It doesn't work on Windows :(( | null | 0 | 1316199469 | False | 0 | c2kdj6x | t3_khtuh | null | t1_c2kdj6x | t1_c2kd18c | null | 1427608864 | 11 | t5_2fwo | null | null | null |
True | I_Make_This_Shit_Up | null | >Most computer science is done with pencil and paper or marker and white board.
Sure, computer science research, and exercises in computer science classes, gotcha.
Teaching programming without teaching computer-science would be like teaching how to speak and write in English without teaching the meaning of any of the words. If you are teaching programming properly, you are also teaching computer science. Even if it is basic stuff that no one would want in their Ivory Tower. (Iteration, arrays, linked lists, syntax etc..). | null | 0 | 1316199494 | False | 0 | c2kdjbr | t3_khrn6 | null | t1_c2kdjbr | t1_c2kddw4 | null | 1427608866 | 1 | t5_2fwo | null | null | null |
True | borlak | null | apache logs
| null | 0 | 1316199524 | False | 0 | c2kdjhw | t3_khtwb | null | t1_c2kdjhw | t1_c2kd7qi | null | 1427608867 | 14 | t5_2fwo | null | null | null |
True | tonygoold | null | They can't, but it means they can brute force check at a very fast speed, rather than trying against a server that can limit the speed and number of attempts. | null | 0 | 1316199545 | False | 0 | c2kdjl7 | t3_khtwb | null | t1_c2kdjl7 | t1_c2kddyt | null | 1427608867 | 5 | t5_2fwo | null | null | null |
True | xibbie | null | This isn't StackOverflow. It **should** be for links that programmers might find interesting or funny. | null | 0 | 1316199563 | False | 0 | c2kdjol | t3_khtwb | null | t1_c2kdjol | t1_c2kdbwi | null | 1427608868 | 0 | t5_2fwo | null | null | null |
True | towel42 | null | Yeah, that's bad. As bad as you blurring out your personal information in that screenshot, but giving us the exact working link including your username and password that leads to said information. | null | 0 | 1316199569 | False | 0 | c2kdjpl | t3_khtwb | null | t1_c2kdjpl | t3_khtwb | null | 1427608869 | 22 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316199632 | False | 0 | c2kdk0i | t3_khtwb | null | t1_c2kdk0i | t1_c2kd7e4 | null | 1427608874 | 11 | t5_2fwo | null | null | null |
True | deathbytray | null | I'm sure a lot of people have different opinions on this, so feel free to chime in with suggestions and corrections. Here's my take on this:
It is true that password has to be transmitted at least once anyway, and if not using SSL/TLS, it can be intercepted regardless of whether it's GET or POST. Still, it's a bad idea to use GET for password or username submissions, ever, because:
1. Browser history will remember that URL. If I have access to your browser, I can pull up the history to see your credentials. Furthermore, there could be malware on your computer, looking into your browser history file directly, parsing URL params and harvesting that data.
2. Attack footprint. Iterating over two parameters in URL in ridiculously easy. This mechanism is not less secure against attack theoretically, but it's certainly more inviting. | null | 0 | 1316199657 | False | 0 | c2kdk4p | t3_khtwb | null | t1_c2kdk4p | t1_c2kd894 | null | 1427608874 | 6 | t5_2fwo | null | null | null |
True | [deleted] | null | [Yep](http://www.moleculargastronomynetwork.com) | null | 0 | 1316199709 | False | 0 | c2kdke0 | t3_khrn6 | null | t1_c2kdke0 | t1_c2kdh0m | null | 1427608878 | 1 | t5_2fwo | null | null | null |
True | bitchessuck | null | Sadly most of the presented concepts regarding performance and architecture are almost completely NVidia-specific. | null | 0 | 1316199751 | False | 0 | c2kdklv | t3_khryi | null | t1_c2kdklv | t1_c2kcr03 | null | 1427608880 | 7 | t5_2fwo | null | null | null |
True | lftl | null | You didn't know because it isn't possible to efficiently extract history via JS. Parent post is at best misleading and at worst plain wrong. | null | 0 | 1316199814 | False | 0 | c2kdkxb | t3_khtwb | null | t1_c2kdkxb | t1_c2kddj2 | null | 1427608884 | 7 | t5_2fwo | null | null | null |
True | Carnagh | null | Dick. | null | 0 | 1316199841 | False | 0 | c2kdl2b | t3_khtuh | null | t1_c2kdl2b | t1_c2kd18c | null | 1427608887 | -6 | t5_2fwo | null | null | null |
True | ahugenerd | null | This is very much an ethics matter. The accepted code of ethics for software development, and CS is general, is the ACM code of ethics linked to by evan_. Both the ACM and IEEE CS adhere to it.
- Section 1.2 clearly states that you want to prevent harm to others. I would say that exposing passwords is harmful to people.
- Section 1.7 clearly states that you should also respect people's privacy. Failing to maintain that privacy, by exposing usernames and passwords would fall in that category.
- Section 2.3 mentions the respect of laws. Exposing a user's password without their consent is against the law in most countries.
In short, putting the password in cleartext in a URI is an ethics issue. If you're ignorant of the proper way of doing something, you should simply not do it. A surgeon wouldn't proceed with an operation unless he knew 100% how to do it. If he did, it would be an ethical issue. This is no different. | null | 0 | 1316199876 | False | 0 | c2kdl89 | t3_khtwb | null | t1_c2kdl89 | t1_c2kd99h | null | 1427608888 | 14 | t5_2fwo | null | null | null |
Subsets and Splits
Filtered Reddit Uplifting News
The query retrieves specific news articles by their link IDs, providing a basic overview of those particular entries without deeper analysis or insights.
Recent Programming Comments
Returns a limited set of programming records from 2020 to 2023, providing basic filtering with minimal analytical value.