archived
stringclasses
2 values
author
stringlengths
3
20
author_fullname
stringlengths
4
12
body
stringlengths
0
22.5k
comment_type
stringclasses
1 value
controversiality
stringclasses
2 values
created_utc
stringlengths
10
10
edited
stringlengths
4
12
gilded
stringclasses
7 values
id
stringlengths
1
7
link_id
stringlengths
7
10
locked
stringclasses
2 values
name
stringlengths
4
10
parent_id
stringlengths
5
10
permalink
stringlengths
41
91
retrieved_on
stringlengths
10
10
score
stringlengths
1
4
subreddit_id
stringclasses
1 value
subreddit_name_prefixed
stringclasses
1 value
subreddit_type
stringclasses
1 value
total_awards_received
stringclasses
19 values
True
dabombnl
null
Omfg, when can this joke be over?
null
0
1316197153
False
0
c2kd7e4
t3_khtwb
null
t1_c2kd7e4
t1_c2kcvub
null
1427608707
-13
t5_2fwo
null
null
null
True
garrison
null
The plaintext password will also be stored in the user's web history since it's part of the URL. It will be given as a Http-Referrer to any pages (SSL or not) that the fedex page links to.
null
0
1316197215
False
0
c2kd7qi
t3_khtwb
null
t1_c2kd7qi
t1_c2kczdy
null
1427608712
130
t5_2fwo
null
null
null
True
WalterBright
null
Because we get tired of complaining about existing ones.
null
0
1316197215
False
0
c2kd7qk
t3_kfvm7
null
t1_c2kd7qk
t1_c2k5czm
null
1427608712
3
t5_2fwo
null
null
null
True
the_red_scimitar
null
Mmm, not really, since after the initial 15 minutes of excitement, the hundred or so people who were in my circle almost all just stopped posting or caring. But maybe Google will keep it running for your massive circle.
null
0
1316197314
False
0
c2kd87d
t3_kgsnl
null
t1_c2kd87d
t1_c2kaswd
null
1427608719
3
t5_2fwo
null
null
null
True
21echoes
null
Microsoft is leading the way in implementing proprietary APIs which work the web into their native runtime. Mozilla (and Google to some degree) are leading the way in bringing the full breadth of native app abilities to the web in a standards-friendly, cross-OS, cross-browser way with their Boot2Gecko and Open Web Apps projects. otherwise, you're exactly right-- there's little to no reason to lock yourself into a market with a big ol gatekeeper and 30% tax and no crossplatform ability.
null
0
1316197318
False
0
c2kd87z
t3_kg2sg
null
t1_c2kd87z
t1_c2jz4ax
null
1427608719
1
t5_2fwo
null
null
null
True
pseudolobster
null
I get the impression this is sarcasm, but in an HTTPS session the URI is encrypted, right? I mean, in a regular HTTP session, the choice between POST and GET really doesn't make any difference in the long run, as they're both unencrypted, and both exactly as easy to intercept. I imagine the same is true of HTTPS - It doesn't matter that your password is in the URI, other than the fact it gets stored in your local browser history.
null
0
1316197324
False
0
c2kd894
t3_khtwb
null
t1_c2kd894
t1_c2kczha
null
1427608719
149
t5_2fwo
null
null
null
True
Imorine
null
ok... do you see the alt text to the comic? That is him telling you this is absolute BS.
null
0
1316197326
False
0
c2kd89o
t3_khtwb
null
t1_c2kd89o
t1_c2kcxkq
null
1427608719
-9
t5_2fwo
null
null
null
True
aristus
null
You are right, but do you have something to say about the main drift of the article? Do you think that programming or computer science should remain as difficult as it is today, for now and forever?
null
0
1316197363
False
0
c2kd8gr
t3_khrn6
null
t1_c2kd8gr
t1_c2kctdw
null
1427608722
2
t5_2fwo
null
null
null
True
dabombnl
null
Except now that it is in the URL, it may appear in logs on the server or saved in your browser history.
null
0
1316197367
False
0
c2kd8hl
t3_khtwb
null
t1_c2kd8hl
t1_c2kczdy
null
1427608722
18
t5_2fwo
null
null
null
True
wadcann
null
>Believe it or not, computing has changed in the last 40 years, and they need new APIs to support that. Right, and as new hardware has shown up, there have been new functions showing up for it (though that's an X11 thing). >They took all the old stuff and basically said "this is legacy" and started with a clean slate And wiped all the value of their accumulated programmers' knowledge store. >asynchronous access to network/disk that is directly accessible from high level modern languages O_NONBLOCK? On Win32, WaitNextObject() had a bound of 64 objects last I looked, which made it pretty much useless in terms of async demuxing. You mean IOCP and forcing use of thread pools? >It would be fantastic if the same thing that MS is doing happened with unix/linux. Strongly disagree, but hopefully if you like having your platform vanish periodically, you're programming on a platform that does that. :-)
null
0
1316197367
False
0
c2kd8hr
t3_kgl4f
null
t1_c2kd8hr
t1_c2ka6dy
null
1427608722
-1
t5_2fwo
null
null
null
True
[deleted]
null
This is cool! Mine is letmein
null
0
1316197410
False
0
c2kd8ow
t3_khtwb
null
t1_c2kd8ow
t1_c2kd3jh
null
1427608725
-3
t5_2fwo
null
null
null
True
21echoes
null
what do you mean "not fast enough"? and the amount of web devs versus native iOS devs I believe speaks to the relative difficulties of coding for each platform. look+native feel is one of the APIs which is being built into html5-- it's definitely do-able.
null
0
1316197497
False
0
c2kd95z
t3_kg2sg
null
t1_c2kd95z
t1_c2k0m9z
null
1427608732
1
t5_2fwo
null
null
null
True
14domino
null
I learned Django/JS/CSS a few months ago despite having a full-time job and made a web app that now has a couple hundred users (for fun, mostly, not trying to get rich just yet) and I'm 27. Granted I basically had no life for a few months, but I don't think I learn any slower now than I did when I was young. It might actually be faster.
null
0
1316197497
False
0
c2kd960
t3_khf6j
null
t1_c2kd960
t1_c2kardn
null
1427608732
1
t5_2fwo
null
null
null
True
name_was_taken
null
This is not an ethical matter. It's an ignorance matter. Some people just don't know why this is wrong.
null
0
1316197517
False
0
c2kd99h
t3_khtwb
null
t1_c2kd99h
t1_c2kcxdp
null
1427608733
35
t5_2fwo
null
null
null
True
fla-guy
null
puberty!!! arrgh!
null
0
1316197518
False
0
c2kd99n
t3_khf6j
null
t1_c2kd99n
t1_c2ka98y
null
1427608733
2
t5_2fwo
null
null
null
True
sashakir
null
AppCode is so much better than Xcode, a lot of refactorings and code analyses double my productivity comparing to Xcode. A lot more stable and doesn't crash like Xcode.
null
0
1316197550
False
0
c2kd9gb
t3_khqu6
null
t1_c2kd9gb
t3_khqu6
null
1427608742
-1
t5_2fwo
null
null
null
True
ngony
null
and shoulder surfers.
null
0
1316197561
False
0
c2kd9i6
t3_khtwb
null
t1_c2kd9i6
t1_c2kd894
null
1427608742
16
t5_2fwo
null
null
null
True
name_was_taken
null
And the server's logs.
null
0
1316197582
False
0
c2kd9lp
t3_khtwb
null
t1_c2kd9lp
t1_c2kd894
null
1428193890
194
t5_2fwo
null
null
null
True
jorgelo
null
The main difference is that the user/pass in the password is a url move, you know, because it's in your history, someone is standing behind you and notices the password (or if you take a screenshot).
null
0
1316197584
False
0
c2kd9m2
t3_khtwb
null
t1_c2kd9m2
t1_c2kd894
null
1428193890
8
t5_2fwo
null
null
null
True
ethraax
null
Really? I'm no expert with using C++ with Windows, but this excerpt right before the code: > In the .NET case, creating a WinRT component has been drastically simplified. The following is the full source code for a component that adds 2: seems to imply that the code sample there is for .NET, which would be C++/CLI, right?
null
0
1316197607
False
0
c2kd9pq
t3_kgl4f
null
t1_c2kd9pq
t1_c2kc86u
null
1427608739
2
t5_2fwo
null
null
null
True
14domino
null
What's a cetegory?
null
0
1316197668
False
0
c2kda10
t3_khf6j
null
t1_c2kda10
t1_c2kcrpo
null
1427608744
1
t5_2fwo
null
null
null
True
ngony
null
Referer SHOULD NOT be transmitted as part of a HTTPS -> HTTP transition. See RFC2616.
null
0
1316197688
False
0
c2kda57
t3_khtwb
null
t1_c2kda57
t1_c2kd7qi
null
1427608747
78
t5_2fwo
null
null
null
True
[deleted]
null
of course... but you can install windows in a virtual machine to test it out.
null
0
1316197708
False
0
c2kda98
t3_khtuh
null
t1_c2kda98
t1_c2kd18c
null
1427608748
10
t5_2fwo
null
null
null
True
raydeen
null
When the Sun grows cold.
null
0
1316197712
False
0
c2kdaaa
t3_khtwb
null
t1_c2kdaaa
t1_c2kd7e4
null
1427608748
19
t5_2fwo
null
null
null
True
robertodeltoro
null
It's Wolfram's blog. We should be thankful that it doesn't say that *Mathematica* used the *12 year old boy* to publish *its* paper on pi. Wolfram's a lot like Craig Venter; a genius you don't want to admit is a genius because he's such a total fucking knob.
null
0
1316197900
True
0
c2kdb94
t3_khf6j
null
t1_c2kdb94
t1_c2kat2s
null
1427608758
22
t5_2fwo
null
null
null
True
noumuon
null
to be fair, it's not really his solution. though it is still quite impressive for a 13 year old to be doing this compared to an average 13 year old.
null
0
1316197910
False
0
c2kdbb2
t3_khf6j
null
t1_c2kdbb2
t1_c2kc5sf
null
1427608760
2
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316197963
False
0
c2kdbl8
t3_khtwb
null
t1_c2kdbl8
t3_khtwb
null
1427608763
1
t5_2fwo
null
null
null
True
rm999
null
I don't want to be that dick, but: >Some seem to think this reddit is for "links that programmers might find interesting or funny". No. It's for programming links. Programming. Programming. Programming. >Just because it has a computer in it doesn't make it programming >If there is no code in your link, it probably doesn't belong here. edit: no need to downvote me any more, I understand not everyone agrees with me. But, if you disagree, reply!
null
0
1316198025
True
0
c2kdbwi
t3_khtwb
null
t1_c2kdbwi
t3_khtwb
null
1427608768
-2
t5_2fwo
null
null
null
True
noumuon
null
this would be true if it weren't false. see: the long history of mathematical geniuses.
null
0
1316198045
False
0
c2kdc05
t3_khf6j
null
t1_c2kdc05
t1_c2kafx1
null
1427608771
0
t5_2fwo
null
null
null
True
Teifion
null
This is excellent (though it doesn't expand the alphabet when you use characters such as "!").
null
0
1316198088
False
0
c2kdc82
t3_khtwb
null
t1_c2kdc82
t1_c2kd0yy
null
1427608781
1
t5_2fwo
null
null
null
True
axiak
null
What if it's a link to another https domain?
null
0
1316198096
False
0
c2kdc9g
t3_khtwb
null
t1_c2kdc9g
t1_c2kda57
null
1427608781
10
t5_2fwo
null
null
null
True
lilmul123
null
you can go hunter2 my hunter2-ing hunter2 haha, does that look funny to you?
null
0
1316198139
False
0
c2kdci4
t3_khtwb
null
t1_c2kdci4
t1_c2kd3t7
null
1427608775
15
t5_2fwo
null
null
null
True
noumuon
null
i implore you to never read anything about pure mathematics if you're asking such things.
null
0
1316198143
False
0
c2kdciy
t3_khf6j
null
t1_c2kdciy
t1_c2kc12g
null
1427608777
1
t5_2fwo
null
null
null
True
Teifion
null
Really? Even assuming that the attacker knows that you are using 4 random words and thus stripping out a lot of brute force issues it's still a stronger password. I've always seen the alt text on that one meaning that weak security trumps a strong password, writing it down means it's useless etc etc.
null
0
1316198158
False
0
c2kdcm0
t3_khtwb
null
t1_c2kdcm0
t1_c2kd89o
null
1427608777
4
t5_2fwo
null
null
null
True
[deleted]
null
Computer science, like physics or mathematics, is what it is. Aren't you really asking if it somebody could come along and do a better job of teaching it? The answer to that is pretty obvious. If you ask about programming, well that's a much different question and far more difficult to answer.
null
0
1316198189
False
0
c2kdcrk
t3_khrn6
null
t1_c2kdcrk
t1_c2kd8gr
null
1427608780
2
t5_2fwo
null
null
null
True
matthieum
null
I find the statement about the "or" condition in the test rather startling. In C++, gcov will consider a short-circuiting or/and has an implicit branch, and thus it appears in the branch report (it also reports how many times *each* side of a branch have been taken, never taking one side means you didn't get 100% branch coverage either!). I am also surprised that the main issue with branch coverage is not shown: path coverage. Of course path coverage is much more difficult (exponential), but it's where things matter. Suppose I have: Char foo(String s, String t) { String g; if (not s.empty()) { g = s; } if (not t.empty()) { g = t; } return g.at(0); } Now, calling `foo` with `("s", "t")`, `("", "t")`, `("s", "")` will make sure that all sides of the branches have been covered (100% branch coverage: hurray ?). Of course, it blithely ignore the fact that one path `("", "")` has never been exercised... and is buggy.
null
0
1316198218
False
0
c2kdcwy
t3_khhdj
null
t1_c2kdcwy
t3_khhdj
null
1427608790
2
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316198227
False
0
c2kdcyi
t3_khtwb
null
t1_c2kdcyi
t1_c2kd894
null
1427608790
-7
t5_2fwo
null
null
null
True
[deleted]
null
One might even say he embiggens the hearts of men with his lengthy sentences.
null
0
1316198263
False
0
c2kdd3z
t3_khf6j
null
t1_c2kdd3z
t1_c2kd1wj
null
1427608786
0
t5_2fwo
null
null
null
True
metaperl
null
[5](http://lang5.sourceforge.net) FTW
null
0
1316198331
False
0
c2kddg7
t3_kh9sr
null
t1_c2kddg7
t3_kh9sr
null
1427608793
1
t5_2fwo
null
null
null
True
pseudolobster
null
Really? I didn't know that was possible.
null
0
1316198348
False
0
c2kddj2
t3_khtwb
null
t1_c2kddj2
t1_c2kdcyi
null
1427608793
1
t5_2fwo
null
null
null
True
prozonelayer
null
Also, if you were to print out the page, wouldn't the URL be printed out as well?
null
0
1316198361
False
0
c2kddlk
t3_khtwb
null
t1_c2kddlk
t1_c2kd894
null
1427608793
48
t5_2fwo
null
null
null
True
[deleted]
null
Most computer science is done with pencil and paper or marker and white board. I think programming and computer science are related in the same way that technology and science or maybe mechanical engineering and physics are related. Not a great analogy, but it's the best I can come up with right now.
null
0
1316198427
False
0
c2kddw4
t3_khrn6
null
t1_c2kddw4
t1_c2kczbd
null
1427608805
2
t5_2fwo
null
null
null
True
javascriptinjection
null
I know they can check if you have visited a url but how can they extract the URL without brute force checking?
null
0
1316198442
False
0
c2kddyt
t3_khtwb
null
t1_c2kddyt
t1_c2kdcyi
null
1427608797
5
t5_2fwo
null
null
null
True
AttackingHobo
null
Really? What did you expect?
null
0
1316198477
False
0
c2kde5f
t3_khtuh
null
t1_c2kde5f
t1_c2kd18c
null
1428193886
16
t5_2fwo
null
null
null
True
pseudolobster
null
Oh, duh. Yeah, I didn't think about that. The page is intended to be printed, and all browsers add the URL at the top of the printed page by default.
null
0
1316198513
False
0
c2kdeci
t3_khtwb
null
t1_c2kdeci
t1_c2kddlk
null
1427608818
24
t5_2fwo
null
null
null
True
sidcool1234
null
Dammit, I was going to say that!!
null
0
1316198522
False
0
c2kdee9
t3_khtwb
null
t1_c2kdee9
t1_c2kczha
null
1427608818
-7
t5_2fwo
null
null
null
True
CaptainTrips
null
It goes into your web browser history and gets logged on the webserver in plain text. Then if someone steals the server log, they have a bunch of unencrypted usernames and passwords.
null
0
1316198527
False
0
c2kdef6
t3_khtwb
null
t1_c2kdef6
t1_c2kcygb
null
1427608818
9
t5_2fwo
null
null
null
True
horizon
null
No, it is not. He's saying that he apologizes to people who know this is how password strength works, who are also stuck arguing with users who do not know this, but think they do. :)
null
0
1316198564
False
0
c2kdeme
t3_khtwb
null
t1_c2kdeme
t1_c2kd89o
null
1427608821
5
t5_2fwo
null
null
null
True
MarcuBot
null
"C++/CLI IntelliSense. C++/CLI now has full IntelliSense support. " THANK YOU !!!!
null
0
1316198578
False
0
c2kdep4
t3_khtuh
null
t1_c2kdep4
t3_khtuh
null
1427608830
24
t5_2fwo
null
null
null
True
octaviusromulus
null
Fair enough. But where would you have recommended I put it?
null
0
1316198638
False
0
c2kdf0t
t3_khtwb
null
t1_c2kdf0t
t1_c2kdbwi
null
1427608824
5
t5_2fwo
null
null
null
True
propool
null
And exactly what api is that? Don't say that link color thing. Won't work here.
null
0
1316198638
False
0
c2kdf0u
t3_khtwb
null
t1_c2kdf0u
t1_c2kdcyi
null
1427608824
7
t5_2fwo
null
null
null
True
personman
null
No. It's not. It's him apologizing to those of us who have to have this conversation with people like you >_>
null
0
1316198653
False
0
c2kdf3r
t3_khtwb
null
t1_c2kdf3r
t1_c2kd89o
null
1427608826
6
t5_2fwo
null
null
null
True
jutct
null
The server he logged into by using that username and password. The same one with the database containing that username and password.
null
0
1316198659
False
0
c2kdf4w
t3_khtwb
null
t1_c2kdf4w
t1_c2kd9lp
null
1427608826
-2
t5_2fwo
null
null
null
True
[deleted]
null
I agree that I'm glad the OP used a good password, but I've got to comment on Gibson's scheme. Haystack is bad. If you're looking for good password options, check r/Netsec. Short answer is use something like KeePass, 1Password, or LastPass (depending on your threat scenario, and whether it's for you or for your mom/grandma) that just remembers them for you. Completely random, customizable, reasonably (often quite reasonably) secure, and actually easier to use than Haystack.
null
0
1316198671
False
0
c2kdf7e
t3_khtwb
null
t1_c2kdf7e
t1_c2kd0yy
null
1427608826
4
t5_2fwo
null
null
null
True
emarkd
null
Only missed it by 47 minutes. Look at all that sweet, sweet karma you could've had...
null
0
1316198682
False
0
c2kdf94
t3_khtwb
null
t1_c2kdf94
t1_c2kdee9
null
1427608827
5
t5_2fwo
null
null
null
True
rosettacoin
null
FYI: If someone types in that URL, the information that is blurred in the image can be seen.
null
0
1316198690
False
0
c2kdfay
t3_khtwb
null
t1_c2kdfay
t3_khtwb
null
1427608829
95
t5_2fwo
null
null
null
True
jsled
null
(Congress overhauled the patent system, actually. Congress writes and passes laws; and in this instance, Obama hasn't been actively driving or advocating much specifically. If you want to assign an actor to this, look to the long-serving senator from my state, Patrick Leahy, and Rep Smith of Texas, the main sponsors.) Looks like it's not substantially different in terms of software patents. - http://www.techdirt.com/articles/20110906/19492915835/congress-moves-forward-with-useless-patent-reform-that-wont-fix-any-real-problems.shtml - https://www.eff.org/deeplinks/2011/09/patent-reform-legislation-set-become-law-will-make So, since we still have software and business method patents, with no meaningful reform, things are still bad.
null
0
1316198706
False
0
c2kdfdd
t3_khvyw
null
t1_c2kdfdd
t3_khvyw
null
1427608829
124
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316198737
False
0
c2kdfka
t3_khvyw
null
t1_c2kdfka
t3_khvyw
null
1427608830
1
t5_2fwo
null
null
null
True
slashdotter
null
Even though the uri is encrypted with SSL/TLS, the uri shows up in the web/application server logs, WILL be in your browser's history, and javascripts you've embedded in the page (even from from third-party sites) WILL be able to see it. It can also show up as an http-referrer. Someone can also see it over your shoulder on your screen.
null
0
1316198752
False
0
c2kdfng
t3_khtwb
null
t1_c2kdfng
t1_c2kczha
null
1427608830
23
t5_2fwo
null
null
null
True
BusStation16
null
You changed it, I am assuming?
null
0
1316198755
False
0
c2kdfny
t3_khtwb
null
t1_c2kdfny
t3_khtwb
null
1427608830
7
t5_2fwo
null
null
null
True
[deleted]
null
This was a problem with the a:visited CSS style, I believe. It would require them knowing the URL ahead of time **just** to see if you visited that page; you wouldn't be able to magically get someone browsing history. That being said, I believed this has been fixed and was never used outside of a proof-of-concept "this is possible" kind of thing as there isn't a whole lot of use behind this type of "attack."
null
0
1316198775
False
0
c2kdfrq
t3_khtwb
null
t1_c2kdfrq
t1_c2kdcyi
null
1427608832
2
t5_2fwo
null
null
null
True
rm999
null
Maybe in r/WTF?
null
0
1316198812
False
0
c2kdfyl
t3_khtwb
null
t1_c2kdfyl
t1_c2kdf0t
null
1427608833
4
t5_2fwo
null
null
null
True
emarkd
null
Not the OP, but his submission didn't seem so out of place here. Sometimes learning what _not_ to do is as important as learning what to do. What would be the appropriate subreddit for a programming fail?
null
0
1316198829
False
0
c2kdg20
t3_khtwb
null
t1_c2kdg20
t1_c2kdbwi
null
1427608834
11
t5_2fwo
null
null
null
True
bewmar
null
Hopefully hashed...
null
0
1316198856
False
0
c2kdg7i
t3_khtwb
null
t1_c2kdg7i
t1_c2kdf4w
null
1427608835
10
t5_2fwo
null
null
null
True
DownGoat
null
The database might be stored on a different location. It is generally a good idea to have the different services running in different virtual machines to limit the reach of a attack.
null
0
1316198865
False
0
c2kdg8w
t3_khtwb
null
t1_c2kdg8w
t1_c2kdf4w
null
1427608835
3
t5_2fwo
null
null
null
True
prelic
null
Computational Theory was my favorite class in school (the class that goes over all this stuff). In my not so expert opinion, I believe that P != NP, for most of the reasons listed here: http://www.scottaaronson.com/blog/?p=122 However, as a software engineer, I hope we find that P = NP!
null
0
1316198873
False
0
c2kdga8
t3_kgfhb
null
t1_c2kdga8
t3_kgfhb
null
1427608835
1
t5_2fwo
null
null
null
True
cuwabren
null
Not if they are doing it right. You aren't supposed to store plaintext passwords ANYWHERE. You store hashes.
null
0
1316198907
False
0
c2kdghf
t3_khtwb
null
t1_c2kdghf
t1_c2kdf4w
null
1427608837
86
t5_2fwo
null
null
null
True
appointment_at_1_am
null
for free
null
0
1316198911
False
0
c2kdgi8
t3_khtwb
null
t1_c2kdgi8
t1_c2kcs4z
null
1427608837
94
t5_2fwo
null
null
null
True
serudla
null
or maybe the way that molecular chemistry and fast food are related?
null
0
1316199015
False
0
c2kdh0m
t3_khrn6
null
t1_c2kdh0m
t1_c2kddw4
null
1427608847
1
t5_2fwo
null
null
null
True
mediapl0y
null
aka a hash stash.
null
0
1316199028
False
0
c2kdh2p
t3_khtwb
null
t1_c2kdh2p
t1_c2kdghf
null
1427608847
8
t5_2fwo
null
null
null
True
[deleted]
null
netsec maybe? ¯\(°_o)/¯
null
0
1316199031
False
0
c2kdh3b
t3_khtwb
null
t1_c2kdh3b
t1_c2kdf0t
null
1427608846
2
t5_2fwo
null
null
null
True
neuter
null
Sweet, so where can I get a free and legal copy of Windows to test it out?
null
0
1316199035
False
0
c2kdh42
t3_khtuh
null
t1_c2kdh42
t1_c2kda98
null
1427608846
-26
t5_2fwo
null
null
null
True
appointment_at_1_am
null
You could see it as an example on how not to implement loging in into multiple websites. They probably wanted to let you log into the site from another. Maybe if you could write a report/blog/post about it, it would be better, how you should do it.
null
0
1316199049
False
0
c2kdh6h
t3_khtwb
null
t1_c2kdh6h
t1_c2kdbwi
null
1427608847
3
t5_2fwo
null
null
null
True
donkey_lz
null
I'll be 23 in two weeks :-). Granted, it might be too early to tell, but it feels a lot like there's a learning muscle. I thought I had hit this wall about two years ago, when I began having noticeable problems learning new stuff, but that was mostly because I had (unintentionally) dropped many of my on-the-side pursuits to focus on electrical engineering. Once I started dabbling in various other things again, everything started being far more elastic.
null
0
1316199050
False
0
c2kdh6w
t3_khf6j
null
t1_c2kdh6w
t1_c2kcztq
null
1427608847
2
t5_2fwo
null
null
null
True
the_opinion
null
Who cares? Virtually nobody reading that site actually needs to scale anything any great degree
null
0
1316199051
False
0
c2kdh70
t3_khlcd
null
t1_c2kdh70
t3_khlcd
null
1427608847
2
t5_2fwo
null
null
null
True
jutct
null
A programmer wrote code that sucks. Other programmers noticed it and agree that it's bad practice. In summation, do not do this in your own programming. It's a relevant link.
null
0
1316199072
False
0
c2kdhb7
t3_khtwb
null
t1_c2kdhb7
t1_c2kdbwi
null
1427608849
5
t5_2fwo
null
null
null
True
[deleted]
null
However, the same RFC says that GET requests should not be used for sensitive data.
null
0
1316199126
False
0
c2kdhl8
t3_khtwb
null
t1_c2kdhl8
t1_c2kda57
null
1427608849
99
t5_2fwo
null
null
null
True
zetec
null
r/netsec maybe? Honestly though, i think it's perfectly fine here, don't listen to that whiner. A shitty programmer wrote shitty code that has a huge security issue - fits right in here. Plus, r/programming has a very large subscriber-base. With a company as big as Fedex, they need to be publicly shamed into correcting this. You're doing good things here, ignore that whiner.
null
0
1316199132
False
0
c2kdhmr
t3_khtwb
null
t1_c2kdhmr
t1_c2kdf0t
null
1427608851
5
t5_2fwo
null
null
null
True
monoglot
null
And if the link gets upvoted, are the upvoters wrong or are you wrong?
null
0
1316199157
False
0
c2kdhql
t3_khtwb
null
t1_c2kdhql
t1_c2kdbwi
null
1427608852
2
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316199226
False
0
c2kdi15
t3_khtwb
null
t1_c2kdi15
t1_c2kd894
null
1427608855
1
t5_2fwo
null
null
null
True
adolfojp
null
Why would you ask a question you already know the answer to? Are you trying to make a statement about free software vs. non free software? You will get better results by being explicit and on topic than by making snide remarks.
null
0
1316199245
False
0
c2kdi3s
t3_khtuh
null
t1_c2kdi3s
t1_c2kdh42
null
1427608856
13
t5_2fwo
null
null
null
True
neoform
null
>It's okay, they're using https. It was ok, until he posted a screenshot. Seriously though, even though it's encrypted, passing username/password via GET is stupid, it should be done via post and a session hash passed instead. This was pure laziness/incompetence on the part of the programmer.
null
0
1316199286
False
0
c2kdia6
t3_khtwb
null
t1_c2kdia6
t1_c2kczha
null
1427608857
6
t5_2fwo
null
null
null
True
tip_ty
null
it looked funny the first hundred times
null
0
1316199332
False
0
c2kdiio
t3_khtwb
null
t1_c2kdiio
t1_c2kdci4
null
1427608859
143
t5_2fwo
null
null
null
True
jutct
null
Yes hopefully. What are the chances the same mook that put the PW in the get request wrote the login manager code? If if it's hashed, rainbow tables have made hashed passwords less secure. Just ask HB Gary.
null
0
1316199340
True
0
c2kdijh
t3_khtwb
null
t1_c2kdijh
t1_c2kdg7i
null
1427608859
1
t5_2fwo
null
null
null
True
skew
null
> You know, they don't call these 'holy wars' for nothing. I have some more questions along these lines, but it's getting a bit off topic. > It's evidence that non-experts (many of us) may not be helped much by type systems. I agree that it's good evidence that just slapping on a weak type system doesn't help novices in completely unfamiliar domain, and it seems safe enough to generalize a bit, and cast some doubt about. > Don Stewart (figure out the types of all your functions with stubs for typechecking, and then fill in the implementations) may not work very well for non-experts who don't understand the language and domain intimately. I'm surprised you mention dons in your conclusions at all. Taking your conjunction literally, it sounds like you believed before seeing these results that there was some chance that a typeful programming methodology would produce significant performance improvements in novices *not instructed in* the methodology, not asked to use the methodology, and using a different sort of language and a different sort of type system from the ones where the methodology was advocated. > It's not strong evidence, but the study is better than most of the older ones which are cited when people try to rigorously discuss the topic of static vs dynamic or OOP versus FP. It's certainly "better" in the sense of experimental design. It's also better evidence about static vs. dynamic typing than some other studies. It couldn't possibly be better evidence about OOP versus FP than studies that, you know, actually included both OO and FP languages! (It also doesn't seem include any dynamic languages, in the sense of allowing stuff like adding methods to an object at runtime).
null
0
1316199346
False
0
c2kdikk
t3_k7o9e
null
t1_c2kdikk
t1_c2jjr93
null
1427608859
1
t5_2fwo
null
null
null
True
Imorine
null
If they know its 4 random words you change the game a bit. They would no longer be searching character by character but rather word by word making the possible combinations (length of dictionary)^4 which is much weaker than the first one. What makes it stronger is the sheer length of it (giggity). More than double the "strong" password. Most places enforce a 16 character password max (which is stupid) and most people cant be bothered to even enter that many characters for their password.
null
0
1316199413
False
0
c2kdiwj
t3_khtwb
null
t1_c2kdiwj
t1_c2kdcm0
null
1427608862
0
t5_2fwo
null
null
null
True
Oppis
null
should be using post instead of get. gotta know your http verbs people.
null
0
1316199441
False
0
c2kdj1v
t3_khtwb
null
t1_c2kdj1v
t3_khtwb
null
1427608863
3
t5_2fwo
null
null
null
True
adolfojp
null
Lets switch things around to give you some perspective on how your comment looks. OP: A new developer preview of the Advanced Packaging Tool now available for download adolfojp: It doesn't work on Windows :((
null
0
1316199469
False
0
c2kdj6x
t3_khtuh
null
t1_c2kdj6x
t1_c2kd18c
null
1427608864
11
t5_2fwo
null
null
null
True
I_Make_This_Shit_Up
null
>Most computer science is done with pencil and paper or marker and white board. Sure, computer science research, and exercises in computer science classes, gotcha. Teaching programming without teaching computer-science would be like teaching how to speak and write in English without teaching the meaning of any of the words. If you are teaching programming properly, you are also teaching computer science. Even if it is basic stuff that no one would want in their Ivory Tower. (Iteration, arrays, linked lists, syntax etc..).
null
0
1316199494
False
0
c2kdjbr
t3_khrn6
null
t1_c2kdjbr
t1_c2kddw4
null
1427608866
1
t5_2fwo
null
null
null
True
borlak
null
apache logs
null
0
1316199524
False
0
c2kdjhw
t3_khtwb
null
t1_c2kdjhw
t1_c2kd7qi
null
1427608867
14
t5_2fwo
null
null
null
True
tonygoold
null
They can't, but it means they can brute force check at a very fast speed, rather than trying against a server that can limit the speed and number of attempts.
null
0
1316199545
False
0
c2kdjl7
t3_khtwb
null
t1_c2kdjl7
t1_c2kddyt
null
1427608867
5
t5_2fwo
null
null
null
True
xibbie
null
This isn't StackOverflow. It **should** be for links that programmers might find interesting or funny.
null
0
1316199563
False
0
c2kdjol
t3_khtwb
null
t1_c2kdjol
t1_c2kdbwi
null
1427608868
0
t5_2fwo
null
null
null
True
towel42
null
Yeah, that's bad. As bad as you blurring out your personal information in that screenshot, but giving us the exact working link including your username and password that leads to said information.
null
0
1316199569
False
0
c2kdjpl
t3_khtwb
null
t1_c2kdjpl
t3_khtwb
null
1427608869
22
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316199632
False
0
c2kdk0i
t3_khtwb
null
t1_c2kdk0i
t1_c2kd7e4
null
1427608874
11
t5_2fwo
null
null
null
True
deathbytray
null
I'm sure a lot of people have different opinions on this, so feel free to chime in with suggestions and corrections. Here's my take on this: It is true that password has to be transmitted at least once anyway, and if not using SSL/TLS, it can be intercepted regardless of whether it's GET or POST. Still, it's a bad idea to use GET for password or username submissions, ever, because: 1. Browser history will remember that URL. If I have access to your browser, I can pull up the history to see your credentials. Furthermore, there could be malware on your computer, looking into your browser history file directly, parsing URL params and harvesting that data. 2. Attack footprint. Iterating over two parameters in URL in ridiculously easy. This mechanism is not less secure against attack theoretically, but it's certainly more inviting.
null
0
1316199657
False
0
c2kdk4p
t3_khtwb
null
t1_c2kdk4p
t1_c2kd894
null
1427608874
6
t5_2fwo
null
null
null
True
[deleted]
null
[Yep](http://www.moleculargastronomynetwork.com)
null
0
1316199709
False
0
c2kdke0
t3_khrn6
null
t1_c2kdke0
t1_c2kdh0m
null
1427608878
1
t5_2fwo
null
null
null
True
bitchessuck
null
Sadly most of the presented concepts regarding performance and architecture are almost completely NVidia-specific.
null
0
1316199751
False
0
c2kdklv
t3_khryi
null
t1_c2kdklv
t1_c2kcr03
null
1427608880
7
t5_2fwo
null
null
null
True
lftl
null
You didn't know because it isn't possible to efficiently extract history via JS. Parent post is at best misleading and at worst plain wrong.
null
0
1316199814
False
0
c2kdkxb
t3_khtwb
null
t1_c2kdkxb
t1_c2kddj2
null
1427608884
7
t5_2fwo
null
null
null
True
Carnagh
null
Dick.
null
0
1316199841
False
0
c2kdl2b
t3_khtuh
null
t1_c2kdl2b
t1_c2kd18c
null
1427608887
-6
t5_2fwo
null
null
null
True
ahugenerd
null
This is very much an ethics matter. The accepted code of ethics for software development, and CS is general, is the ACM code of ethics linked to by evan_. Both the ACM and IEEE CS adhere to it. - Section 1.2 clearly states that you want to prevent harm to others. I would say that exposing passwords is harmful to people. - Section 1.7 clearly states that you should also respect people's privacy. Failing to maintain that privacy, by exposing usernames and passwords would fall in that category. - Section 2.3 mentions the respect of laws. Exposing a user's password without their consent is against the law in most countries. In short, putting the password in cleartext in a URI is an ethics issue. If you're ignorant of the proper way of doing something, you should simply not do it. A surgeon wouldn't proceed with an operation unless he knew 100% how to do it. If he did, it would be an ethical issue. This is no different.
null
0
1316199876
False
0
c2kdl89
t3_khtwb
null
t1_c2kdl89
t1_c2kd99h
null
1427608888
14
t5_2fwo
null
null
null