archived
stringclasses
2 values
author
stringlengths
3
20
author_fullname
stringlengths
4
12
body
stringlengths
0
22.5k
comment_type
stringclasses
1 value
controversiality
stringclasses
2 values
created_utc
stringlengths
10
10
edited
stringlengths
4
12
gilded
stringclasses
7 values
id
stringlengths
1
7
link_id
stringlengths
7
10
locked
stringclasses
2 values
name
stringlengths
4
10
parent_id
stringlengths
5
10
permalink
stringlengths
41
91
retrieved_on
stringlengths
10
10
score
stringlengths
1
4
subreddit_id
stringclasses
1 value
subreddit_name_prefixed
stringclasses
1 value
subreddit_type
stringclasses
1 value
total_awards_received
stringclasses
19 values
True
rbobby
null
It seems more like his examples point to flaws in the tool he's using. In the first example the empty false block is not being counted as part of the branch (which is nuts... because the non-empty block could easily have manipulated state). In the second example both the line coverage and branch coverage are both reporting incorrect values. The line coverage cannot count a line as covered unless each expression is executed (ie. short circuiting). The branch coverage is just plain broken... the non-empty false block is never executed yet the branch coverage reports 100% (also branch coverage without proper treatment of short circuited expressions is plain wrong). What sort of branch coverage does not take into account both "sides" of a branch? TIL: Cobertura is fatally flawed.
null
0
1316204800
False
0
c2keaju
t3_khhdj
null
t1_c2keaju
t3_khhdj
null
1427609235
1
t5_2fwo
null
null
null
True
Minimiscience
null
Only after a new joke arises to take its place, and possibly not even then.
null
0
1316204804
False
0
c2keaka
t3_khtwb
null
t1_c2keaka
t1_c2kd7e4
null
1427609235
2
t5_2fwo
null
null
null
True
tagattack
null
Don't forget GMOs. GMO Patent holders have destroyed the agriculture industry, there are entire agricultural disciplines (such as seed picking) which have been completely wiped out.
null
0
1316204824
False
0
c2keand
t3_khvyw
null
t1_c2keand
t1_c2ke7kh
null
1427609236
16
t5_2fwo
null
null
null
True
mdipierro
null
I will buy it. Please let us know when it gets out (feel free to email me personally).
null
0
1316204825
False
0
c2keanr
t3_khrn6
null
t1_c2keanr
t3_khrn6
null
1427609236
2
t5_2fwo
null
null
null
True
FlySwat
null
http://msdn.microsoft.com/en-us/windows/apps/br229516
null
0
1316204827
False
0
c2keao4
t3_khtuh
null
t1_c2keao4
t1_c2kdh42
null
1427609236
4
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316204829
False
0
c2keaon
t3_khtwb
null
t1_c2keaon
t1_c2kda57
null
1427609236
1
t5_2fwo
null
null
null
True
bittor
null
No he didn't...
null
0
1316204833
False
0
c2keap2
t3_khtwb
null
t1_c2keap2
t1_c2ke675
null
1427609236
11
t5_2fwo
null
null
null
True
axiak
null
The RFC does not mention this. And testing it shows that it will get sent.
null
0
1316204869
False
0
c2keavz
t3_khtwb
null
t1_c2keavz
t1_c2ke54r
null
1427609239
9
t5_2fwo
null
null
null
True
axiak
null
I quote: >Referrer to any pages (SSL or not) that the **fedex page links to.** (emphasis mine)
null
0
1316204941
False
0
c2keb9m
t3_khtwb
null
t1_c2keb9m
t1_c2ke4uf
null
1427609243
5
t5_2fwo
null
null
null
True
jutct
null
A rainbow table doesn't care about how the hash was generated.
null
0
1316204943
False
0
c2kebab
t3_khtwb
null
t1_c2kebab
t1_c2kdyi8
null
1427609243
-2
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316205027
False
0
c2kebpp
t3_khtwb
null
t1_c2kebpp
t1_c2kdslx
null
1427609251
1
t5_2fwo
null
null
null
True
Baron_von_Retard
null
D'oh. Thanks.
null
0
1316205060
False
0
c2kebvd
t3_khtwb
null
t1_c2kebvd
t1_c2ke7ix
null
1427609253
1
t5_2fwo
null
null
null
True
cpitchford
null
This is exactly how such https proxies work, however, the monitoring of https traffic is often limited to content filtering, when upload of sensitive content is prohibited (i.e emailing customer details out) or when downloading prohibited / dangerous content (i.e. virus scanning) Logging of allowed content and urls would not be logged, bluecoat proxies have a big thing on mitm ssl proxying and caching.. *shudder*
null
0
1316205066
False
0
c2kebwg
t3_khtwb
null
t1_c2kebwg
t1_c2ke9bh
null
1427609253
1
t5_2fwo
null
null
null
True
ironiridis
null
I don't agree; the source code is open to look at, modify, improve, or ruin. If you aren't able to educate yourself from it, why is that a "because fuck you" attitude? If you were implementing a video codec, you should be learning about the core topics of encoding and decoding video in a more formal way, with theory. Not diving into opaque code that you couldn't possibly understand. Ultimately, if you understood the fundamentals of a video codec, you'd understand what this code was doing. Just because they're related like that doesn't mean you can hope to learn from scratch what it does. Similarly, just because you can pick up a book written in Catalan, doesn't make it plausible for you to learn to read & write in Catalan simply from this one book. It's not directed at you; it's directed at people who are already familiar with the language and the culture. Comments in source code are for explaining the unexpected, and for better maintenance and housekeeping. Code should otherwise be self-explanatory. Would you really have every codec that ffmpeg offers have complete descriptions of how encoding and decoding works, step by step, inline with the source code? That would be a nightmare...
null
0
1316205069
False
0
c2kebx2
t3_kgqdd
null
t1_c2kebx2
t1_c2ke3se
null
1427609253
3
t5_2fwo
null
null
null
True
tigerthecat5
null
My friend created the photo I just wanted it to get some others to see it.
null
0
1316205079
False
0
c2kebys
t3_ki0rj
null
t1_c2kebys
t3_ki0rj
null
1427609254
1
t5_2fwo
null
null
null
True
MMOSimca
null
Nope, he didn't, but somebody else just did a minute or two ago. There is extreme irony in complaining about plaintext HTTPS urls and then not changing your password on a site where people can redirect your package.
null
0
1316205115
False
0
c2kec5u
t3_khtwb
null
t1_c2kec5u
t1_c2ke675
null
1427609255
59
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316205191
False
0
c2kecje
t3_khz8t
null
t1_c2kecje
t1_c2ke21q
null
1427609262
2
t5_2fwo
null
null
null
True
pukeorama
null
I hate you reddit
null
0
1316205224
False
0
c2kecps
t3_kgsnl
null
t1_c2kecps
t1_c2k7c3b
null
1427609263
1
t5_2fwo
null
null
null
True
[deleted]
null
Well that wasnt so fucking hard. The normal wikipedia page made it sound like quantum physics
null
0
1316205224
False
0
c2kecpv
t3_kgfhb
null
t1_c2kecpv
t3_kgfhb
null
1427609263
1
t5_2fwo
null
null
null
True
[deleted]
null
yep edit: not really though, its like it only takes 41 years for the cracker to exhaust the possibility that you used a password like this. similar to checking 123456 and 'Password123' because they are typical, a cracker might take a shot at the words**4 approach because it is typical.
null
0
1316205269
False
0
c2kecym
t3_khtwb
null
t1_c2kecym
t1_c2ke77v
null
1427609265
1
t5_2fwo
null
null
null
True
dmwit
null
> Proxies for HTTPS do see the communications; they create the external connection on behalf of the client on the internal network. Citation?
null
0
1316205301
False
0
c2ked4u
t3_khtwb
null
t1_c2ked4u
t1_c2ke8rz
null
1427609267
2
t5_2fwo
null
null
null
True
crooks5001
null
then you distribute both to the internet to make it easier for everybody else to have some fun at your expense
null
0
1316205313
False
0
c2ked6w
t3_khtwb
null
t1_c2ked6w
t3_khtwb
null
1427609268
2
t5_2fwo
null
null
null
True
[deleted]
null
Is that browser dependant?
null
0
1316205354
False
0
c2kedeb
t3_khtwb
null
t1_c2kedeb
t1_c2keavz
null
1427609269
2
t5_2fwo
null
null
null
True
ChangingHats
null
...and then there's the fact that people use common words...not just 'words in the dictionary'.
null
0
1316205356
False
0
c2kedes
t3_khtwb
null
t1_c2kedes
t1_c2kdon2
null
1427609270
2
t5_2fwo
null
null
null
True
Fidodo
null
I know. Rainbow tables take a long time to build and are only realistically feasible if the hash is quick to compute. If the hash algorithm is hard to compute it will take an unrealistic amount of time to generate the rainbow table and cannot be used in practice.
null
0
1316205373
False
0
c2kedi2
t3_khtwb
null
t1_c2kedi2
t1_c2kebab
null
1427609282
0
t5_2fwo
null
null
null
True
smek2
null
You don't seem to like Google very much. Does that mean you're half an idiot?
null
0
1316205416
False
0
c2kedqu
t3_kgb4h
null
t1_c2kedqu
t1_c2k3n90
null
1427609285
1
t5_2fwo
null
null
null
True
LongUsername
null
I can attest that mine did not.
null
0
1316205438
False
0
c2kedv4
t3_khtwb
null
t1_c2kedv4
t1_c2ke192
null
1428193867
3
t5_2fwo
null
null
null
True
shea241
null
There are several reasons a render engine will have its performance slashed into a tiny fraction of what you'd expect. Here's a few! 1. Sending triangles to the GPU, or rendering vertex buffers on the GPU, without paying attention to how similar the materials on those triangles are. Switching the active texture, especially with OpenGL 1.2, is very expensive. You should always group triangles and objects by their texture. This is part of avoiding GPU state changes (one part of the GPU's state is which textures are active or bound). 2. Sending redundant triangle data over the PCI bus. A graphics programmer should always try to construct large globs of triangle data, send it over once, and tell the GPU to store it in its own local memory. 3. Sending too many commands to the GPU -- this clogs up the PCI bus (to an extent) and can do various things to the GPU's command queue / state / etc. 4. Not using mip maps -- mip maps are progressively downscaled versions of a texture. They are used when you're drawing a texture that is very far away, which has two important effects: a) Visually, it causes less sparkling / noise when the texture moves in the distance, since there isn't lots of texture detail 'fighting' to be on the screen. b) Performance wise, it completely spares the texture cache from being raped. A raped (or let's say thrashed) texture cache can make your FPS go from 500 to 4. 5. Overdrawing. This is when you draw a triangle, and then draw one or more triangles over it in the same frame. Sometimes this is done for good reasons (semi-transparency like water, windows, etc). Sometimes it's completely wasting the rasterizer's and/or pixel shader's time (as with opaque triangles, which is 90% of them). 6. Running out of GPU memory. Yep, you can do this, and if you do, the GPU driver will typically start unloading things over the BUS or invalidating GPU buffers, which will force the renderer to recreate them. When this happens in the middle of rendering a frame, your performance is going to become pretty damn sad. 7. Doing really stupid things in the shader pipeline. People have been saying "triangles are triangles," but it's pretty easy to make a 1-triangle scene render at 1FPS with a horribly written shader. Since Minecraft doesn't use shaders, I doubt that's the problem. I have no idea which of these Minecraft is guilty of doing, but it is very common for a person not experienced with graphics to suffer ALL of them. So, keep that in mind! Specifically, I have a feeling the way Minecraft renders its terrain is very sub-optimal. Ideally, the terrain would comprise a mesh
null
0
1316205447
True
0
c2kedxa
t3_kgq62
null
t1_c2kedxa
t1_c2k7adc
null
1427609284
8
t5_2fwo
null
null
null
True
Xorlev
null
When you control the clients and the proxy, then you can MITM without any warnings. You can make your own self-signed CA or any number of valid ways to "forge" certs internally. With your own CA you can sign an SSL certificate for a new site in real time and it's valid.
null
0
1316205489
False
0
c2kee4w
t3_khtwb
null
t1_c2kee4w
t1_c2ke9bh
null
1427609287
3
t5_2fwo
null
null
null
True
tairygreene
null
its not a thing?
null
0
1316205524
False
0
c2keeba
t3_khtwb
null
t1_c2keeba
t1_c2kdxro
null
1427609288
5
t5_2fwo
null
null
null
True
ModernRonin
null
It's O(k) because you pre-hash them, duh.
null
0
1316205547
False
0
c2keefj
t3_ki0wp
null
t1_c2keefj
t3_ki0wp
null
1427609297
3
t5_2fwo
null
null
null
True
sanarothe
null
i was getting hungry. hungrier. oh, now it's gone.
null
0
1316205553
False
0
c2keegm
t3_khtwb
null
t1_c2keegm
t1_c2ke446
null
1427609297
0
t5_2fwo
null
null
null
True
babazka
null
O(NM), where N = number of items in the list, M = length of the string. Two loops, nested: for i = 1..N, for j = 1..M. How can it *not* be O(N*M)? This article illustrates that when considering big O it is not enough to express the complexity as a function of *some* N; the variable N must be carefully chosen. Total number of characters in the list is a bad choice.
null
0
1316205574
True
0
c2keekn
t3_ki0wp
null
t1_c2keekn
t3_ki0wp
null
1427609291
5
t5_2fwo
null
null
null
True
bewmar
null
It is only useful if the table values have been hashed by the same function of the password you are trying to decrypt. It is only useful for one hash algorithm, so in that sense it does care about how the hash was generated.
null
0
1316205607
False
0
c2keera
t3_khtwb
null
t1_c2keera
t1_c2kebab
null
1427609299
4
t5_2fwo
null
null
null
True
duniyadnd
null
TIL
null
0
1316205666
False
0
c2kef2i
t3_khtwb
null
t1_c2kef2i
t1_c2kdzyg
null
1427609302
-1
t5_2fwo
null
null
null
True
queensnake
null
You gave the title too much of a twist IMO; it'd do better if you'd left it as the original, > iOS, Android, Windows Phone, Windows 8? A coder's guide -- of wider interest.
null
0
1316205701
True
0
c2kef9h
t3_ki0i2
null
t1_c2kef9h
t1_c2ke9hh
null
1427609307
1
t5_2fwo
null
null
null
True
[deleted]
null
True but say you're using a pre-generated rainbow-table you'll only have access to one subset (say lower-case letters). Something you'd likely do if you didn't have access to ludicrous amounts of hard drive space or generated your own rainbow-tables.
null
0
1316205763
False
0
c2kefm1
t3_khtwb
null
t1_c2kefm1
t1_c2kdn9t
null
1427609311
3
t5_2fwo
null
null
null
True
[deleted]
null
Wow, he seriously didn't change his password after making a submission where he pointed a large red arrow at his password?
null
0
1316205776
True
0
c2kefov
t3_khtwb
null
t1_c2kefov
t1_c2kec5u
null
1427609308
71
t5_2fwo
null
null
null
True
systematical
null
Very interesting project. I like the idea. As stated, the UI certainly needs some attention with setting BPM and being more user friendly. But as proof of concept its very awesome!
null
0
1316205786
False
0
c2kefqw
t3_khn6y
null
t1_c2kefqw
t3_khn6y
null
1427609308
1
t5_2fwo
null
null
null
True
Tommstein
null
Then [this](http://www.coboloncogs.org/) should be right up your alley.
null
0
1316205852
False
0
c2keg3q
t3_kdv51
null
t1_c2keg3q
t1_c2kc5o0
null
1427609312
1
t5_2fwo
null
null
null
True
mechengineer
null
How about [this](http://drdobbs.com/high-performance-computing/231002854)?
null
0
1316205914
False
0
c2kegfk
t3_khryi
null
t1_c2kegfk
t1_c2kclr1
null
1427609315
2
t5_2fwo
null
null
null
True
piratesahoy
null
Er it's not Linux based...
null
0
1316205917
False
0
c2kegg5
t3_kg1ui
null
t1_c2kegg5
t1_c2ka81b
null
1427609315
3
t5_2fwo
null
null
null
True
umop_apisdn
null
I think you misunderstand; the referrer will not be known to the proxy when you make a request using https in any case (because it is encrypted). This is just catching an edge case when you make a non-secure request after secure browsing.
null
0
1316205975
False
0
c2kegr0
t3_khtwb
null
t1_c2kegr0
t1_c2ke5uz
null
1427609317
6
t5_2fwo
null
null
null
True
kurin
null
I think the thing is that FedEx sent OP a link he could click to get at his label. Instead of giving him a URL with a bigass one time password (yadda.com/?bigasspass=JKLHp79h3pq498fhqewfweurgh3-tq34r), they just pulled his pass out of a database and used that instead.
null
0
1316206000
False
0
c2kegvr
t3_khtwb
null
t1_c2kegvr
t1_c2ke32o
null
1427609317
5
t5_2fwo
null
null
null
True
neuter
null
Don't forget about patenting gene sequences. It blows my mind how they can accept those patents.
null
0
1316206033
False
0
c2keh1h
t3_khvyw
null
t1_c2keh1h
t1_c2ke7kh
null
1427609319
21
t5_2fwo
null
null
null
True
shea241
null
Octrees are very good at partitioning the world into parts you should care about. They're not a magic solution to minimizing graphics calls. Triangles are not triangles. That get pretty complicated though.
null
0
1316206090
False
0
c2kehc8
t3_kgq62
null
t1_c2kehc8
t1_c2k7g93
null
1427609321
3
t5_2fwo
null
null
null
True
piranha
null
That's what appears to be 10 characters of a 62-character alphabet, randomly selected with uniform distribution. Which is 59.5 bits. Safe by any stretch of the imagination. It's a good password, because a random password implies that he's probably using a unique password for every site. With the advent of personal computers, cryptography, and password management software, it's now possible, safe, and practical to securely use random, unique passwords for every service you use, and you don't need to remember these randomly-generated, individual passwords.
null
0
1316206103
False
0
c2kehe4
t3_khtwb
null
t1_c2kehe4
t1_c2ke5bj
null
1427609321
6
t5_2fwo
null
null
null
True
Noink
null
And browser history.
null
0
1316206170
False
0
c2kehrf
t3_khtwb
null
t1_c2kehrf
t1_c2kdprm
null
1427609323
1
t5_2fwo
null
null
null
True
[deleted]
null
No! Use bcrypt! http://codahale.com/how-to-safely-store-a-password/
null
0
1316206188
False
0
c2kehup
t3_khtwb
null
t1_c2kehup
t1_c2kdoiq
null
1427609327
2
t5_2fwo
null
null
null
True
otakucode
null
To accomplish it. To prove to ones self that one actually can do it. No one else was willing or able to do it... so it's significant to say 'I was willing, and I was able.' It might not be Everest, but people of every age do things 'because it's there' and it's an important factor in what gets things done in society.
null
0
1316206193
False
0
c2kehvz
t3_khf6j
null
t1_c2kehvz
t1_c2kdsds
null
1427609330
6
t5_2fwo
null
null
null
True
rootis0
null
It has been proven that sexual abstinence enhances intellectual capacity greatly: http://www.seinfeldscripts.com/TheAbstinence.htm **Jerry**: *Louise! That's what's doin' it. You're no longer pre-occupied with sex, so your mind is able to focus.* **George**: *You think?* **Jerry**: *Yeah. I mean, let's say this is your brain. (Holds lettuce head) Okay, from what I know about you, your brain consists of two parts: the intellect, represented here (Pulls off tiny piece of lettuce), and the part obsessed with sex. (Shows large piece) Now granted, you have extracted an astonishing amount from this little scrap. But with no-sex-Louise, this previously useless lump, is now functioning for the first time in its existence. (Eats tiny piece of lettuce)*
null
0
1316206203
True
0
c2kehy3
t3_khf6j
null
t1_c2kehy3
t1_c2kad56
null
1427609330
4
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316206210
False
0
c2kehz9
t3_khtwb
null
t1_c2kehz9
t1_c2ke5uz
null
1427609325
18
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316206213
False
0
c2kei06
t3_khtwb
null
t1_c2kei06
t1_c2ke2wm
null
1427609325
14
t5_2fwo
null
null
null
True
zck
null
Sure, proxies won't see it. But the Referer is sent. Say you go to https://www.google.com, and search for something. You click on a link, say to https://anothersite.com . Your browser sends the Referer to anothersite.com.
null
0
1316206241
False
0
c2kei56
t3_khtwb
null
t1_c2kei56
t1_c2kegr0
null
1427609327
12
t5_2fwo
null
null
null
True
PatrickTulskie
null
You've just given me an idea for a robot. What it will do is look for links like this on reddit, then show up at the OP's house, bust open the door, take their computer, and mail it to a child in a developing country.
null
0
1316206254
False
0
c2kei7w
t3_khz8t
null
t1_c2kei7w
t3_khz8t
null
1427609329
0
t5_2fwo
null
null
null
True
Cintax
null
Anyone with access to his browser history can see it too...
null
0
1316206324
False
0
c2keikv
t3_khtwb
null
t1_c2keikv
t1_c2kdu4z
null
1427609332
1
t5_2fwo
null
null
null
True
greyfade
null
Neither Obama nor the Senate "overhauled" anything. They made a handful of "tweaks" to a broken system and hailed it as "improvements" and "reform," when it is neither of those things. It fixes none of the problems with Patent Law, potentially might make a few problems *worse*, and changes from a First-to-Invent to a First-to-File system. All in all, this is bad legislation. The only legislation that would actually *fix* the problems would start by shortening patent terms and weakening them in the Courts. (For example, eliminating the presumption of validity, which is the single biggest financial burden on those involved in litigation, and the biggest waste of money in all Patent litigation.)
null
0
1316206326
False
0
c2keil8
t3_khvyw
null
t1_c2keil8
t3_khvyw
null
1427609332
39
t5_2fwo
null
null
null
True
Noink
null
Yes - my office has a proxy that intercepts HTTPS traffic, and firefox reminds me every time I forget and try to use gmail.
null
0
1316206342
False
0
c2keiob
t3_khtwb
null
t1_c2keiob
t1_c2ke9ez
null
1427609335
1
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316206344
False
0
c2keion
t3_khtuh
null
t1_c2keion
t1_c2kdh42
null
1427609335
5
t5_2fwo
null
null
null
True
Strmtrper6
null
If that was the situation, then the first one would be uncrackable compared to the second. Not that there is currently much of a difference between "never" and "1.24 hundred trillion trillion centuries." Unless I am misunderstanding you, in which case I'm sorry about that. Also, typing that out made me wonder what the hell is hundred trillion trillion centuries? Are they not aware of the names of units larger than trillion and century?
null
0
1316206401
False
0
c2keiz2
t3_khtwb
null
t1_c2keiz2
t1_c2kefm1
null
1427609336
1
t5_2fwo
null
null
null
True
lftl
null
Yeah... I specifically went back and added the "efficient" in there. You don't know their password OR their username when you start the attack. Other than avoiding some security FedEx may or may not have on their web logins I don't see how it's any easier than brute forcing via the web.
null
0
1316206450
False
0
c2kej8c
t3_khtwb
null
t1_c2kej8c
t1_c2kdrq1
null
1427609337
1
t5_2fwo
null
null
null
True
name_was_taken
null
It's often easy to get to logs when you can't get to sensitive things like database connection info.
null
0
1316206458
False
0
c2kej9o
t3_khtwb
null
t1_c2kej9o
t1_c2kdf4w
null
1427609337
1
t5_2fwo
null
null
null
True
lusion
null
Because if there are N characters in total in the whole string list you never actually do more than N comparisons. Hence O(N). The number of characters is >> than the number of strings, so it dominates the time bound.
null
0
1316206501
False
0
c2kejgh
t3_ki0wp
null
t1_c2kejgh
t1_c2keekn
null
1427609340
-1
t5_2fwo
null
null
null
True
curien
null
While I know that's technically possible, I've *never* seen it done, and I've been working at various places that all had proxies for the purpose of filtering requests for the past 10+ years.
null
0
1316206559
False
0
c2kejqd
t3_khtwb
null
t1_c2kejqd
t1_c2kei06
null
1427609342
1
t5_2fwo
null
null
null
True
nazbot
null
I don't think Google+ is really going to be like facebook or twitter. Google+ is more likely to be like Xbox Live - a central service that you can use to add 'social' to your applications. Facebook has more of an opportunity here because of it's scale but their APIs are absolutely terrible. Google has a great reputation for building and maintaining solid APIs so they have a chance to overtake facebook this way.
null
0
1316206619
False
0
c2kek09
t3_kgsnl
null
t1_c2kek09
t1_c2k9u8w
null
1427609346
1
t5_2fwo
null
null
null
True
Durpadoo
null
Or everyone on the internet that he just showed it to now. :D
null
0
1316206709
False
0
c2keki0
t3_khtwb
null
t1_c2keki0
t1_c2kczdy
null
1427609351
2
t5_2fwo
null
null
null
True
remyroy
null
Let's hope they are pushing for some kind of open standard or open discussion for this.
null
0
1316206733
False
0
c2kekmh
t3_ki1gj
null
t1_c2kekmh
t3_ki1gj
null
1427609352
1
t5_2fwo
null
null
null
True
[deleted]
null
Is anyone else just impressed by how hardcore our password is?
null
0
1316206735
False
0
c2kekmw
t3_khtwb
null
t1_c2kekmw
t3_khtwb
null
1427609352
0
t5_2fwo
null
null
null
True
lusion
null
Building the hash will be O(N) so that saves you nothing.
null
0
1316206745
False
0
c2kekoz
t3_ki0wp
null
t1_c2kekoz
t1_c2keefj
null
1427609353
0
t5_2fwo
null
null
null
True
virt_vera
null
> What big kernel lock? The big kernel NETWORKING lock which this thread is about. > Should I also point out that the Linux kernel has only gotten rid of the Big Kernel Lock extremely recently Whoah, that is referring to *removing the call* from every last driver that used it, and Linux has *thousands* of old drivers because, you know, it is widely-used. It's about removing the LAST TRACES. Linux has had fine-grained locking for something like a decade. Read this, and note the date: http://lwn.net/Articles/86859/ > Do you have examples of where NetBSD is actually slow, other than 3D benchmarks? Yes... **NETWORKING**! Haha, aren't I a stinker. *The Board of Directors is interested in improving the performance of the networking subsystem of the NetBSD kernel on multiprocessor machines.* Networking performance kinda, uhh, "matters" for servers and stuff. > Here are some ruby microbenchmarks Ruby? Are you serious? And did you NOTICE the results said things like (this is the 2nd example, the first one with a Linux number): > bm_hilbert_matrix.rb_10_5 > winner: nbsd > OS Version Mean results vs Median > Dragonfly: 2.9 0.0021753884 6.06291e-05 0.002 seconds!! With only 5 iterations! Are you even aware of the margin of error when running benchmarks?!? And NO breakdown of system/user/cpu time. And reinitializing the interpreter every time... which was compiled with DIFFERENT OPTIONS with DIFFERENT COMPILERS running on systems with DIFFERENT BACKGROUND PROCESSES (maybe one was running `locate` and building an index in the background). Anything running the same ASM will take the same amount of time on whatever OS, so to check differences you generally try to stress different I/O subsystems, like, say, networking.
null
0
1316206815
False
0
c2kel1k
t3_kejfs
null
t1_c2kel1k
t1_c2kb1yn
null
1427609358
-1
t5_2fwo
null
null
null
True
babazka
null
And if there are *log N* characters in total in the whole string list (for some N), we have a sublinear algorithm, yay! My point is, anything other than O(NM) is misleading and should not be used to describe the algorithm.
null
0
1316206838
False
0
c2kel5r
t3_ki0wp
null
t1_c2kel5r
t1_c2kejgh
null
1427609363
3
t5_2fwo
null
null
null
True
MeinKampfire
null
I agree. Shallow and pedantic.
null
0
1316206890
False
0
c2keldn
t3_khtwb
null
t1_c2keldn
t1_c2ke3al
null
1427609363
3
t5_2fwo
null
null
null
True
danharaj
null
Strawmen don't program.
null
0
1316206945
False
0
c2kelnk
t3_kgq62
null
t1_c2kelnk
t1_c2ka38z
null
1427609366
9
t5_2fwo
null
null
null
True
omervk
null
*and* I only just joined reddit to comment on this post :)
null
0
1316207003
False
0
c2kelx7
t3_khtwb
null
t1_c2kelx7
t1_c2ke9d0
null
1427609370
2
t5_2fwo
null
null
null
True
grimatongueworm
null
And you posted it on the interwebs. BRB, going to try this combo at every major bank, PayPal, Amazon, NewEgg, etc...
null
0
1316207005
False
0
c2kelxl
t3_khtwb
null
t1_c2kelxl
t3_khtwb
null
1427609370
4
t5_2fwo
null
null
null
True
slid3r
null
BOOO Fedex!!
null
0
1316207006
False
0
c2kelxs
t3_khtwb
null
t1_c2kelxs
t3_khtwb
null
1427609370
0
t5_2fwo
null
null
null
True
usaar33
null
It's the most ingenious idea since sliced bread.
null
0
1316207030
False
0
c2kem29
t3_kh13i
null
t1_c2kem29
t1_c2ka4dt
null
1427609371
0
t5_2fwo
null
null
null
True
Ryuujinx
null
I don't really see how this would work without the client throwing up MiTM warnings. I've seen SSL proxies that just pass traffic through, but not that decrypt it on the proxy for inspection.
null
0
1316207040
False
0
c2kem3x
t3_khtwb
null
t1_c2kem3x
t1_c2ke8rz
null
1427609371
2
t5_2fwo
null
null
null
True
[deleted]
null
Nope.
null
0
1316207048
False
0
c2kem57
t3_khtwb
null
t1_c2kem57
t1_c2kdfny
null
1427609373
6
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316207050
False
0
c2kem5m
t3_khtwb
null
t1_c2kem5m
t1_c2kejqd
null
1427609373
3
t5_2fwo
null
null
null
True
rawbdor
null
there is never any guarantee for what anyone SHOULD do. Only what they must do, and even then only if you have a test suite with rigid enforcement and mandatory certification.
null
0
1316207091
False
0
c2kemcw
t3_khtwb
null
t1_c2kemcw
t1_c2ke3kw
null
1427609376
6
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316207135
False
0
c2kemkg
t3_khtwb
null
t1_c2kemkg
t1_c2kcrkv
null
1428193867
3
t5_2fwo
null
null
null
True
Ryuujinx
null
That doesn't really matter - storing it in plaintext, or encrypting it while keeping the key is a bad idea.
null
0
1316207137
False
0
c2kemkr
t3_khtwb
null
t1_c2kemkr
t1_c2kdg8w
null
1428193867
1
t5_2fwo
null
null
null
True
Bluffkin
null
This obviously depends on the language, if the language uses string interning then it is sufficient to check the references are equal, rather than to do character by character comparison.
null
0
1316207141
False
0
c2kemlb
t3_ki0wp
null
t1_c2kemlb
t3_ki0wp
null
1427609379
0
t5_2fwo
null
null
null
True
zetec
null
Now we'll never know.
null
0
1316207140
False
0
c2kemld
t3_khtwb
null
t1_c2kemld
t1_c2ke43f
null
1427609379
1
t5_2fwo
null
null
null
True
MJZMan
null
Who cares? It's a temp user name, a temp p/w, and a temp label. The worse that could happen is someone (not you) could ship something somewhere. In the event that happened, whoever arranged for the label would simply send you another (with another temp username, temp p/w, and temp label)
null
0
1316207160
False
0
c2kemnk
t3_khtwb
null
t1_c2kemnk
t3_khtwb
null
1427609379
1
t5_2fwo
null
null
null
True
[deleted]
null
I beg to differ. Too much dependency on third-party software to remember my passwords is entirely overkill as well as an inherently unsafe practice. You presume that everybody would be inclined to or should use the tools that perhaps you do. Again, I beg to differ. I could stretch myself to say that it may technically be a 'safe' password but a good one? Naaw.
null
0
1316207171
False
0
c2kemp5
t3_khtwb
null
t1_c2kemp5
t1_c2kehe4
null
1427609380
1
t5_2fwo
null
null
null
True
ModernRonin
null
Depends on how you do it. If you pre-hash the strings when they go into the table, then it comes down to just hashing the input string and seeing if there's anything in the corresponding slot.
null
0
1316207201
False
0
c2kemwg
t3_ki0wp
null
t1_c2kemwg
t1_c2kekoz
null
1427609384
1
t5_2fwo
null
null
null
True
superironbob
null
Oddly enough the first demand in the Constitution for the US is the requirement for establishment of a Copyright and Patent system. Eliminating either is nigh impossible in the current political environment. The systems as they stand today are a gross distortion of what they were intended to be. Both are intended to encourage disclosure instead of relying on secrecy to protect valuable knowledge. This can then be improved. The limited monopoly on the idea/work is offered as a reward for the production of a new idea or improvement. Neither system today accomplishes either. The copyright system is no longer “limited” and the patent system is largely ineffective at awarding patents for new ideas. And both are grossly abused as weapons of strong legal entities against individuals and small groups.
null
0
1316207234
False
0
c2ken2r
t3_khvyw
null
t1_c2ken2r
t1_c2kdqy5
null
1427609395
4
t5_2fwo
null
null
null
True
[deleted]
null
Dissonance can be painful; pain can be good.
null
0
1316207296
False
0
c2kendq
t3_khtwb
null
t1_c2kendq
t1_c2ke3fi
null
1427609399
2
t5_2fwo
null
null
null
True
zck
null
So it's encrypted. But the endpoint can read the referer. That is, the referer *is* sent.
null
0
1316207303
False
0
c2keney
t3_khtwb
null
t1_c2keney
t1_c2kehz9
null
1427609399
1
t5_2fwo
null
null
null
True
albanwr
null
We use the filtering appliance Bloxx and we intercept 100gb of traffic daily in our network. Kids are smart enough to use https proxy avoidance techniques, which in turn means we have to intercept.
null
0
1316207330
False
0
c2kenjp
t3_khtwb
null
t1_c2kenjp
t1_c2kejqd
null
1427609398
2
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316207384
False
0
c2kentt
t3_khtwb
null
t1_c2kentt
t3_khtwb
null
1427609401
16
t5_2fwo
null
null
null
True
syspig
null
Your experience is not the norm. Bluecoat proxies are used everywhere - they're likely in the vast majority of Fortune 1000 companies, and most government entities. Including the little podunk regional utility I work for. SSL intercept is not only common in such environments, it's completely invisible to the end user. Since most of these sites use AD, internal trusted certs are easily pushed out to the clients without their knowledge, and the Bluecoat uses a cert signed by this internal trusted root. We can easily see the contents of any https URI, as well as decrypting any SSL traffic coming/going from/to our internal hosts. Yes, it sucks - but it's commonplace.
null
0
1316207423
False
0
c2keo15
t3_khtwb
null
t1_c2keo15
t1_c2kejqd
null
1427609402
14
t5_2fwo
null
null
null
True
Scottamus
null
Is being an idiot unethical?
null
0
1316207564
False
0
c2keoqg
t3_khtwb
null
t1_c2keoqg
t1_c2kcxdp
null
1427609412
1
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316207623
False
0
c2kep0b
t3_ki0wp
null
t1_c2kep0b
t3_ki0wp
null
1427609414
1
t5_2fwo
null
null
null
True
henk53
null
Rather cool really! Shows how powerful dynamic proxies can be. A CDI implementation would be interesting as well.
null
0
1316207630
False
0
c2kep1g
t3_khpzu
null
t1_c2kep1g
t3_khpzu
null
1427609414
3
t5_2fwo
null
null
null
True
VaginaDentata
null
SQL Injection and security vulnerability.
null
0
1316207646
False
0
c2kep4d
t3_khtwb
null
t1_c2kep4d
t3_khtwb
null
1427609417
1
t5_2fwo
null
null
null
True
monocasa
null
What's wrong with 1.10?
null
0
1316207657
False
0
c2kep6d
t3_kggd3
null
t1_c2kep6d
t3_kggd3
null
1427609417
1
t5_2fwo
null
null
null
True
[deleted]
null
> SySV IPC (semget()) exists and is supported and you can use it, but it's not used any more. Exactly. Just like Microsoft platforms. Also, unless my memory betrays me, there was this weird issue that if you want to atomically modify several semaphores, you should use System V ones, because fuck you. > I don't use vim, so I don't know what it does; it's true that there are different file-notification APIs on different Unixes, but it's certainly not true that vim couldn't use them, if it doesn't. Well, it could, but, you know, as we are talking about UNIX, the fact that it's not standardised tells a lot about the state of UNIX. And should prevent anyone from pointing at UNIX as an example of a nicely evolving platform. > It is a key, just also a byte that means something else. That's not an API issue, nor is it the Unix API's fault what vim happened to choose. Ohoho. It was a key (except not a key) that _vi_ chose thirty-something fucking years ago, and was standardised by POSIX and everyone else. And during all those thirty years no one has noticed that there's something very wrong going on, or at least no one has managed to speak loud enough to make everybody to use say `^[^[` to signify an escape key press in a terminal. Mind boggles.
null
0
1316207658
False
0
c2kep6i
t3_kgl4f
null
t1_c2kep6i
t1_c2kd6wu
null
1427609417
4
t5_2fwo
null
null
null