archived stringclasses 2
values | author stringlengths 3 20 | author_fullname stringlengths 4 12 ⌀ | body stringlengths 0 22.5k | comment_type stringclasses 1
value | controversiality stringclasses 2
values | created_utc stringlengths 10 10 | edited stringlengths 4 12 | gilded stringclasses 7
values | id stringlengths 1 7 | link_id stringlengths 7 10 | locked stringclasses 2
values | name stringlengths 4 10 ⌀ | parent_id stringlengths 5 10 | permalink stringlengths 41 91 ⌀ | retrieved_on stringlengths 10 10 ⌀ | score stringlengths 1 4 | subreddit_id stringclasses 1
value | subreddit_name_prefixed stringclasses 1
value | subreddit_type stringclasses 1
value | total_awards_received stringclasses 19
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
True | rbobby | null | It seems more like his examples point to flaws in the tool he's using.
In the first example the empty false block is not being counted as part of the branch (which is nuts... because the non-empty block could easily have manipulated state).
In the second example both the line coverage and branch coverage are both reporting incorrect values. The line coverage cannot count a line as covered unless each expression is executed (ie. short circuiting). The branch coverage is just plain broken... the non-empty false block is never executed yet the branch coverage reports 100% (also branch coverage without proper treatment of short circuited expressions is plain wrong). What sort of branch coverage does not take into account both "sides" of a branch?
TIL: Cobertura is fatally flawed. | null | 0 | 1316204800 | False | 0 | c2keaju | t3_khhdj | null | t1_c2keaju | t3_khhdj | null | 1427609235 | 1 | t5_2fwo | null | null | null |
True | Minimiscience | null | Only after a new joke arises to take its place, and possibly not even then. | null | 0 | 1316204804 | False | 0 | c2keaka | t3_khtwb | null | t1_c2keaka | t1_c2kd7e4 | null | 1427609235 | 2 | t5_2fwo | null | null | null |
True | tagattack | null | Don't forget GMOs. GMO Patent holders have destroyed the agriculture industry, there are entire agricultural disciplines (such as seed picking) which have been completely wiped out. | null | 0 | 1316204824 | False | 0 | c2keand | t3_khvyw | null | t1_c2keand | t1_c2ke7kh | null | 1427609236 | 16 | t5_2fwo | null | null | null |
True | mdipierro | null | I will buy it. Please let us know when it gets out (feel free to email me personally). | null | 0 | 1316204825 | False | 0 | c2keanr | t3_khrn6 | null | t1_c2keanr | t3_khrn6 | null | 1427609236 | 2 | t5_2fwo | null | null | null |
True | FlySwat | null | http://msdn.microsoft.com/en-us/windows/apps/br229516 | null | 0 | 1316204827 | False | 0 | c2keao4 | t3_khtuh | null | t1_c2keao4 | t1_c2kdh42 | null | 1427609236 | 4 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316204829 | False | 0 | c2keaon | t3_khtwb | null | t1_c2keaon | t1_c2kda57 | null | 1427609236 | 1 | t5_2fwo | null | null | null |
True | bittor | null | No he didn't... | null | 0 | 1316204833 | False | 0 | c2keap2 | t3_khtwb | null | t1_c2keap2 | t1_c2ke675 | null | 1427609236 | 11 | t5_2fwo | null | null | null |
True | axiak | null | The RFC does not mention this. And testing it shows that it will get sent. | null | 0 | 1316204869 | False | 0 | c2keavz | t3_khtwb | null | t1_c2keavz | t1_c2ke54r | null | 1427609239 | 9 | t5_2fwo | null | null | null |
True | axiak | null | I quote:
>Referrer to any pages (SSL or not) that the **fedex page links to.**
(emphasis mine)
| null | 0 | 1316204941 | False | 0 | c2keb9m | t3_khtwb | null | t1_c2keb9m | t1_c2ke4uf | null | 1427609243 | 5 | t5_2fwo | null | null | null |
True | jutct | null | A rainbow table doesn't care about how the hash was generated. | null | 0 | 1316204943 | False | 0 | c2kebab | t3_khtwb | null | t1_c2kebab | t1_c2kdyi8 | null | 1427609243 | -2 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316205027 | False | 0 | c2kebpp | t3_khtwb | null | t1_c2kebpp | t1_c2kdslx | null | 1427609251 | 1 | t5_2fwo | null | null | null |
True | Baron_von_Retard | null | D'oh. Thanks. | null | 0 | 1316205060 | False | 0 | c2kebvd | t3_khtwb | null | t1_c2kebvd | t1_c2ke7ix | null | 1427609253 | 1 | t5_2fwo | null | null | null |
True | cpitchford | null | This is exactly how such https proxies work, however, the monitoring of https traffic is often limited to content filtering, when upload of sensitive content is prohibited (i.e emailing customer details out) or when downloading prohibited / dangerous content (i.e. virus scanning)
Logging of allowed content and urls would not be logged, bluecoat proxies have a big thing on mitm ssl proxying and caching.. *shudder*
| null | 0 | 1316205066 | False | 0 | c2kebwg | t3_khtwb | null | t1_c2kebwg | t1_c2ke9bh | null | 1427609253 | 1 | t5_2fwo | null | null | null |
True | ironiridis | null | I don't agree; the source code is open to look at, modify, improve, or ruin. If you aren't able to educate yourself from it, why is that a "because fuck you" attitude?
If you were implementing a video codec, you should be learning about the core topics of encoding and decoding video in a more formal way, with theory. Not diving into opaque code that you couldn't possibly understand.
Ultimately, if you understood the fundamentals of a video codec, you'd understand what this code was doing. Just because they're related like that doesn't mean you can hope to learn from scratch what it does. Similarly, just because you can pick up a book written in Catalan, doesn't make it plausible for you to learn to read & write in Catalan simply from this one book. It's not directed at you; it's directed at people who are already familiar with the language and the culture.
Comments in source code are for explaining the unexpected, and for better maintenance and housekeeping. Code should otherwise be self-explanatory.
Would you really have every codec that ffmpeg offers have complete descriptions of how encoding and decoding works, step by step, inline with the source code? That would be a nightmare... | null | 0 | 1316205069 | False | 0 | c2kebx2 | t3_kgqdd | null | t1_c2kebx2 | t1_c2ke3se | null | 1427609253 | 3 | t5_2fwo | null | null | null |
True | tigerthecat5 | null | My friend created the photo I just wanted it to get some others to see it. | null | 0 | 1316205079 | False | 0 | c2kebys | t3_ki0rj | null | t1_c2kebys | t3_ki0rj | null | 1427609254 | 1 | t5_2fwo | null | null | null |
True | MMOSimca | null | Nope, he didn't, but somebody else just did a minute or two ago.
There is extreme irony in complaining about plaintext HTTPS urls and then not changing your password on a site where people can redirect your package. | null | 0 | 1316205115 | False | 0 | c2kec5u | t3_khtwb | null | t1_c2kec5u | t1_c2ke675 | null | 1427609255 | 59 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316205191 | False | 0 | c2kecje | t3_khz8t | null | t1_c2kecje | t1_c2ke21q | null | 1427609262 | 2 | t5_2fwo | null | null | null |
True | pukeorama | null | I hate you reddit | null | 0 | 1316205224 | False | 0 | c2kecps | t3_kgsnl | null | t1_c2kecps | t1_c2k7c3b | null | 1427609263 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | Well that wasnt so fucking hard. The normal wikipedia page made it sound like quantum physics | null | 0 | 1316205224 | False | 0 | c2kecpv | t3_kgfhb | null | t1_c2kecpv | t3_kgfhb | null | 1427609263 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | yep
edit: not really though, its like it only takes 41 years for the cracker to exhaust the possibility that you used a password like this. similar to checking 123456 and 'Password123' because they are typical, a cracker might take a shot at the words**4 approach because it is typical. | null | 0 | 1316205269 | False | 0 | c2kecym | t3_khtwb | null | t1_c2kecym | t1_c2ke77v | null | 1427609265 | 1 | t5_2fwo | null | null | null |
True | dmwit | null | > Proxies for HTTPS do see the communications; they create the external connection on behalf of the client on the internal network.
Citation? | null | 0 | 1316205301 | False | 0 | c2ked4u | t3_khtwb | null | t1_c2ked4u | t1_c2ke8rz | null | 1427609267 | 2 | t5_2fwo | null | null | null |
True | crooks5001 | null | then you distribute both to the internet to make it easier for everybody else to have some fun at your expense | null | 0 | 1316205313 | False | 0 | c2ked6w | t3_khtwb | null | t1_c2ked6w | t3_khtwb | null | 1427609268 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | Is that browser dependant? | null | 0 | 1316205354 | False | 0 | c2kedeb | t3_khtwb | null | t1_c2kedeb | t1_c2keavz | null | 1427609269 | 2 | t5_2fwo | null | null | null |
True | ChangingHats | null | ...and then there's the fact that people use common words...not just 'words in the dictionary'. | null | 0 | 1316205356 | False | 0 | c2kedes | t3_khtwb | null | t1_c2kedes | t1_c2kdon2 | null | 1427609270 | 2 | t5_2fwo | null | null | null |
True | Fidodo | null | I know. Rainbow tables take a long time to build and are only realistically feasible if the hash is quick to compute. If the hash algorithm is hard to compute it will take an unrealistic amount of time to generate the rainbow table and cannot be used in practice. | null | 0 | 1316205373 | False | 0 | c2kedi2 | t3_khtwb | null | t1_c2kedi2 | t1_c2kebab | null | 1427609282 | 0 | t5_2fwo | null | null | null |
True | smek2 | null | You don't seem to like Google very much. Does that mean you're half an idiot? | null | 0 | 1316205416 | False | 0 | c2kedqu | t3_kgb4h | null | t1_c2kedqu | t1_c2k3n90 | null | 1427609285 | 1 | t5_2fwo | null | null | null |
True | LongUsername | null | I can attest that mine did not. | null | 0 | 1316205438 | False | 0 | c2kedv4 | t3_khtwb | null | t1_c2kedv4 | t1_c2ke192 | null | 1428193867 | 3 | t5_2fwo | null | null | null |
True | shea241 | null | There are several reasons a render engine will have its performance slashed into a tiny fraction of what you'd expect. Here's a few!
1. Sending triangles to the GPU, or rendering vertex buffers on the GPU, without paying attention to how similar the materials on those triangles are. Switching the active texture, especially with OpenGL 1.2, is very expensive. You should always group triangles and objects by their texture. This is part of avoiding GPU state changes (one part of the GPU's state is which textures are active or bound).
2. Sending redundant triangle data over the PCI bus. A graphics programmer should always try to construct large globs of triangle data, send it over once, and tell the GPU to store it in its own local memory.
3. Sending too many commands to the GPU -- this clogs up the PCI bus (to an extent) and can do various things to the GPU's command queue / state / etc.
4. Not using mip maps -- mip maps are progressively downscaled versions of a texture. They are used when you're drawing a texture that is very far away, which has two important effects: a) Visually, it causes less sparkling / noise when the texture moves in the distance, since there isn't lots of texture detail 'fighting' to be on the screen. b) Performance wise, it completely spares the texture cache from being raped. A raped (or let's say thrashed) texture cache can make your FPS go from 500 to 4.
5. Overdrawing. This is when you draw a triangle, and then draw one or more triangles over it in the same frame. Sometimes this is done for good reasons (semi-transparency like water, windows, etc). Sometimes it's completely wasting the rasterizer's and/or pixel shader's time (as with opaque triangles, which is 90% of them).
6. Running out of GPU memory. Yep, you can do this, and if you do, the GPU driver will typically start unloading things over the BUS or invalidating GPU buffers, which will force the renderer to recreate them. When this happens in the middle of rendering a frame, your performance is going to become pretty damn sad.
7. Doing really stupid things in the shader pipeline. People have been saying "triangles are triangles," but it's pretty easy to make a 1-triangle scene render at 1FPS with a horribly written shader. Since Minecraft doesn't use shaders, I doubt that's the problem.
I have no idea which of these Minecraft is guilty of doing, but it is very common for a person not experienced with graphics to suffer ALL of them. So, keep that in mind!
Specifically, I have a feeling the way Minecraft renders its terrain is very sub-optimal. Ideally, the terrain would comprise a mesh | null | 0 | 1316205447 | True | 0 | c2kedxa | t3_kgq62 | null | t1_c2kedxa | t1_c2k7adc | null | 1427609284 | 8 | t5_2fwo | null | null | null |
True | Xorlev | null | When you control the clients and the proxy, then you can MITM without any warnings. You can make your own self-signed CA or any number of valid ways to "forge" certs internally. With your own CA you can sign an SSL certificate for a new site in real time and it's valid. | null | 0 | 1316205489 | False | 0 | c2kee4w | t3_khtwb | null | t1_c2kee4w | t1_c2ke9bh | null | 1427609287 | 3 | t5_2fwo | null | null | null |
True | tairygreene | null | its not a thing? | null | 0 | 1316205524 | False | 0 | c2keeba | t3_khtwb | null | t1_c2keeba | t1_c2kdxro | null | 1427609288 | 5 | t5_2fwo | null | null | null |
True | ModernRonin | null | It's O(k) because you pre-hash them, duh. | null | 0 | 1316205547 | False | 0 | c2keefj | t3_ki0wp | null | t1_c2keefj | t3_ki0wp | null | 1427609297 | 3 | t5_2fwo | null | null | null |
True | sanarothe | null | i was getting hungry. hungrier. oh, now it's gone. | null | 0 | 1316205553 | False | 0 | c2keegm | t3_khtwb | null | t1_c2keegm | t1_c2ke446 | null | 1427609297 | 0 | t5_2fwo | null | null | null |
True | babazka | null | O(NM), where N = number of items in the list, M = length of the string. Two loops, nested: for i = 1..N, for j = 1..M. How can it *not* be O(N*M)?
This article illustrates that when considering big O it is not enough to express the complexity as a function of *some* N; the variable N must be carefully chosen. Total number of characters in the list is a bad choice. | null | 0 | 1316205574 | True | 0 | c2keekn | t3_ki0wp | null | t1_c2keekn | t3_ki0wp | null | 1427609291 | 5 | t5_2fwo | null | null | null |
True | bewmar | null | It is only useful if the table values have been hashed by the same function of the password you are trying to decrypt. It is only useful for one hash algorithm, so in that sense it does care about how the hash was generated. | null | 0 | 1316205607 | False | 0 | c2keera | t3_khtwb | null | t1_c2keera | t1_c2kebab | null | 1427609299 | 4 | t5_2fwo | null | null | null |
True | duniyadnd | null | TIL | null | 0 | 1316205666 | False | 0 | c2kef2i | t3_khtwb | null | t1_c2kef2i | t1_c2kdzyg | null | 1427609302 | -1 | t5_2fwo | null | null | null |
True | queensnake | null | You gave the title too much of a twist IMO; it'd do better if you'd left it as the original,
> iOS, Android, Windows Phone, Windows 8? A coder's guide
-- of wider interest. | null | 0 | 1316205701 | True | 0 | c2kef9h | t3_ki0i2 | null | t1_c2kef9h | t1_c2ke9hh | null | 1427609307 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | True but say you're using a pre-generated rainbow-table you'll only have access to one subset (say lower-case letters). Something you'd likely do if you didn't have access to ludicrous amounts of hard drive space or generated your own rainbow-tables. | null | 0 | 1316205763 | False | 0 | c2kefm1 | t3_khtwb | null | t1_c2kefm1 | t1_c2kdn9t | null | 1427609311 | 3 | t5_2fwo | null | null | null |
True | [deleted] | null | Wow, he seriously didn't change his password after making a submission where he pointed a large red arrow at his password? | null | 0 | 1316205776 | True | 0 | c2kefov | t3_khtwb | null | t1_c2kefov | t1_c2kec5u | null | 1427609308 | 71 | t5_2fwo | null | null | null |
True | systematical | null | Very interesting project. I like the idea. As stated, the UI certainly needs some attention with setting BPM and being more user friendly. But as proof of concept its very awesome! | null | 0 | 1316205786 | False | 0 | c2kefqw | t3_khn6y | null | t1_c2kefqw | t3_khn6y | null | 1427609308 | 1 | t5_2fwo | null | null | null |
True | Tommstein | null | Then [this](http://www.coboloncogs.org/) should be right up your alley. | null | 0 | 1316205852 | False | 0 | c2keg3q | t3_kdv51 | null | t1_c2keg3q | t1_c2kc5o0 | null | 1427609312 | 1 | t5_2fwo | null | null | null |
True | mechengineer | null | How about [this](http://drdobbs.com/high-performance-computing/231002854)? | null | 0 | 1316205914 | False | 0 | c2kegfk | t3_khryi | null | t1_c2kegfk | t1_c2kclr1 | null | 1427609315 | 2 | t5_2fwo | null | null | null |
True | piratesahoy | null | Er it's not Linux based... | null | 0 | 1316205917 | False | 0 | c2kegg5 | t3_kg1ui | null | t1_c2kegg5 | t1_c2ka81b | null | 1427609315 | 3 | t5_2fwo | null | null | null |
True | umop_apisdn | null | I think you misunderstand; the referrer will not be known to the proxy when you make a request using https in any case (because it is encrypted). This is just catching an edge case when you make a non-secure request after secure browsing. | null | 0 | 1316205975 | False | 0 | c2kegr0 | t3_khtwb | null | t1_c2kegr0 | t1_c2ke5uz | null | 1427609317 | 6 | t5_2fwo | null | null | null |
True | kurin | null | I think the thing is that FedEx sent OP a link he could click to get at his label. Instead of giving him a URL with a bigass one time password (yadda.com/?bigasspass=JKLHp79h3pq498fhqewfweurgh3-tq34r), they just pulled his pass out of a database and used that instead. | null | 0 | 1316206000 | False | 0 | c2kegvr | t3_khtwb | null | t1_c2kegvr | t1_c2ke32o | null | 1427609317 | 5 | t5_2fwo | null | null | null |
True | neuter | null | Don't forget about patenting gene sequences. It blows my mind how they can accept those patents. | null | 0 | 1316206033 | False | 0 | c2keh1h | t3_khvyw | null | t1_c2keh1h | t1_c2ke7kh | null | 1427609319 | 21 | t5_2fwo | null | null | null |
True | shea241 | null | Octrees are very good at partitioning the world into parts you should care about. They're not a magic solution to minimizing graphics calls.
Triangles are not triangles. That get pretty complicated though. | null | 0 | 1316206090 | False | 0 | c2kehc8 | t3_kgq62 | null | t1_c2kehc8 | t1_c2k7g93 | null | 1427609321 | 3 | t5_2fwo | null | null | null |
True | piranha | null | That's what appears to be 10 characters of a 62-character alphabet, randomly selected with uniform distribution. Which is 59.5 bits. Safe by any stretch of the imagination.
It's a good password, because a random password implies that he's probably using a unique password for every site. With the advent of personal computers, cryptography, and password management software, it's now possible, safe, and practical to securely use random, unique passwords for every service you use, and you don't need to remember these randomly-generated, individual passwords. | null | 0 | 1316206103 | False | 0 | c2kehe4 | t3_khtwb | null | t1_c2kehe4 | t1_c2ke5bj | null | 1427609321 | 6 | t5_2fwo | null | null | null |
True | Noink | null | And browser history. | null | 0 | 1316206170 | False | 0 | c2kehrf | t3_khtwb | null | t1_c2kehrf | t1_c2kdprm | null | 1427609323 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | No! Use bcrypt! http://codahale.com/how-to-safely-store-a-password/ | null | 0 | 1316206188 | False | 0 | c2kehup | t3_khtwb | null | t1_c2kehup | t1_c2kdoiq | null | 1427609327 | 2 | t5_2fwo | null | null | null |
True | otakucode | null | To accomplish it. To prove to ones self that one actually can do it. No one else was willing or able to do it... so it's significant to say 'I was willing, and I was able.'
It might not be Everest, but people of every age do things 'because it's there' and it's an important factor in what gets things done in society. | null | 0 | 1316206193 | False | 0 | c2kehvz | t3_khf6j | null | t1_c2kehvz | t1_c2kdsds | null | 1427609330 | 6 | t5_2fwo | null | null | null |
True | rootis0 | null | It has been proven that sexual abstinence enhances intellectual capacity greatly: http://www.seinfeldscripts.com/TheAbstinence.htm
**Jerry**: *Louise! That's what's doin' it. You're no longer pre-occupied with sex, so your mind is able to focus.*
**George**: *You think?*
**Jerry**: *Yeah. I mean, let's say this is your brain. (Holds lettuce head) Okay, from what I know about you, your brain consists of two parts: the intellect, represented here (Pulls off tiny piece of lettuce), and the part obsessed with sex. (Shows large piece) Now granted, you have extracted an astonishing amount from this little scrap. But with no-sex-Louise, this previously useless lump, is now functioning for the first time in its existence. (Eats tiny piece of lettuce)*
| null | 0 | 1316206203 | True | 0 | c2kehy3 | t3_khf6j | null | t1_c2kehy3 | t1_c2kad56 | null | 1427609330 | 4 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316206210 | False | 0 | c2kehz9 | t3_khtwb | null | t1_c2kehz9 | t1_c2ke5uz | null | 1427609325 | 18 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316206213 | False | 0 | c2kei06 | t3_khtwb | null | t1_c2kei06 | t1_c2ke2wm | null | 1427609325 | 14 | t5_2fwo | null | null | null |
True | zck | null | Sure, proxies won't see it. But the Referer is sent. Say you go to https://www.google.com, and search for something. You click on a link, say to https://anothersite.com . Your browser sends the Referer to anothersite.com. | null | 0 | 1316206241 | False | 0 | c2kei56 | t3_khtwb | null | t1_c2kei56 | t1_c2kegr0 | null | 1427609327 | 12 | t5_2fwo | null | null | null |
True | PatrickTulskie | null | You've just given me an idea for a robot. What it will do is look for links like this on reddit, then show up at the OP's house, bust open the door, take their computer, and mail it to a child in a developing country. | null | 0 | 1316206254 | False | 0 | c2kei7w | t3_khz8t | null | t1_c2kei7w | t3_khz8t | null | 1427609329 | 0 | t5_2fwo | null | null | null |
True | Cintax | null | Anyone with access to his browser history can see it too... | null | 0 | 1316206324 | False | 0 | c2keikv | t3_khtwb | null | t1_c2keikv | t1_c2kdu4z | null | 1427609332 | 1 | t5_2fwo | null | null | null |
True | greyfade | null | Neither Obama nor the Senate "overhauled" anything. They made a handful of "tweaks" to a broken system and hailed it as "improvements" and "reform," when it is neither of those things.
It fixes none of the problems with Patent Law, potentially might make a few problems *worse*, and changes from a First-to-Invent to a First-to-File system.
All in all, this is bad legislation.
The only legislation that would actually *fix* the problems would start by shortening patent terms and weakening them in the Courts. (For example, eliminating the presumption of validity, which is the single biggest financial burden on those involved in litigation, and the biggest waste of money in all Patent litigation.) | null | 0 | 1316206326 | False | 0 | c2keil8 | t3_khvyw | null | t1_c2keil8 | t3_khvyw | null | 1427609332 | 39 | t5_2fwo | null | null | null |
True | Noink | null | Yes - my office has a proxy that intercepts HTTPS traffic, and firefox reminds me every time I forget and try to use gmail. | null | 0 | 1316206342 | False | 0 | c2keiob | t3_khtwb | null | t1_c2keiob | t1_c2ke9ez | null | 1427609335 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316206344 | False | 0 | c2keion | t3_khtuh | null | t1_c2keion | t1_c2kdh42 | null | 1427609335 | 5 | t5_2fwo | null | null | null |
True | Strmtrper6 | null | If that was the situation, then the first one would be uncrackable compared to the second. Not that there is currently much of a difference between "never" and "1.24 hundred trillion trillion centuries."
Unless I am misunderstanding you, in which case I'm sorry about that.
Also, typing that out made me wonder what the hell is hundred trillion trillion centuries? Are they not aware of the names of units larger than trillion and century? | null | 0 | 1316206401 | False | 0 | c2keiz2 | t3_khtwb | null | t1_c2keiz2 | t1_c2kefm1 | null | 1427609336 | 1 | t5_2fwo | null | null | null |
True | lftl | null | Yeah... I specifically went back and added the "efficient" in there. You don't know their password OR their username when you start the attack. Other than avoiding some security FedEx may or may not have on their web logins I don't see how it's any easier than brute forcing via the web. | null | 0 | 1316206450 | False | 0 | c2kej8c | t3_khtwb | null | t1_c2kej8c | t1_c2kdrq1 | null | 1427609337 | 1 | t5_2fwo | null | null | null |
True | name_was_taken | null | It's often easy to get to logs when you can't get to sensitive things like database connection info. | null | 0 | 1316206458 | False | 0 | c2kej9o | t3_khtwb | null | t1_c2kej9o | t1_c2kdf4w | null | 1427609337 | 1 | t5_2fwo | null | null | null |
True | lusion | null | Because if there are N characters in total in the whole string list you never actually do more than N comparisons. Hence O(N). The number of characters is >> than the number of strings, so it dominates the time bound. | null | 0 | 1316206501 | False | 0 | c2kejgh | t3_ki0wp | null | t1_c2kejgh | t1_c2keekn | null | 1427609340 | -1 | t5_2fwo | null | null | null |
True | curien | null | While I know that's technically possible, I've *never* seen it done, and I've been working at various places that all had proxies for the purpose of filtering requests for the past 10+ years. | null | 0 | 1316206559 | False | 0 | c2kejqd | t3_khtwb | null | t1_c2kejqd | t1_c2kei06 | null | 1427609342 | 1 | t5_2fwo | null | null | null |
True | nazbot | null | I don't think Google+ is really going to be like facebook or twitter. Google+ is more likely to be like Xbox Live - a central service that you can use to add 'social' to your applications.
Facebook has more of an opportunity here because of it's scale but their APIs are absolutely terrible. Google has a great reputation for building and maintaining solid APIs so they have a chance to overtake facebook this way. | null | 0 | 1316206619 | False | 0 | c2kek09 | t3_kgsnl | null | t1_c2kek09 | t1_c2k9u8w | null | 1427609346 | 1 | t5_2fwo | null | null | null |
True | Durpadoo | null | Or everyone on the internet that he just showed it to now. :D | null | 0 | 1316206709 | False | 0 | c2keki0 | t3_khtwb | null | t1_c2keki0 | t1_c2kczdy | null | 1427609351 | 2 | t5_2fwo | null | null | null |
True | remyroy | null | Let's hope they are pushing for some kind of open standard or open discussion for this. | null | 0 | 1316206733 | False | 0 | c2kekmh | t3_ki1gj | null | t1_c2kekmh | t3_ki1gj | null | 1427609352 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | Is anyone else just impressed by how hardcore our password is? | null | 0 | 1316206735 | False | 0 | c2kekmw | t3_khtwb | null | t1_c2kekmw | t3_khtwb | null | 1427609352 | 0 | t5_2fwo | null | null | null |
True | lusion | null | Building the hash will be O(N) so that saves you nothing. | null | 0 | 1316206745 | False | 0 | c2kekoz | t3_ki0wp | null | t1_c2kekoz | t1_c2keefj | null | 1427609353 | 0 | t5_2fwo | null | null | null |
True | virt_vera | null | > What big kernel lock?
The big kernel NETWORKING lock which this thread is about.
> Should I also point out that the Linux kernel has only gotten rid of the Big Kernel Lock extremely recently
Whoah, that is referring to *removing the call* from every last driver that used it, and Linux has *thousands* of old drivers because, you know, it is widely-used. It's about removing the LAST TRACES.
Linux has had fine-grained locking for something like a decade.
Read this, and note the date:
http://lwn.net/Articles/86859/
> Do you have examples of where NetBSD is actually slow, other than 3D benchmarks?
Yes... **NETWORKING**! Haha, aren't I a stinker.
*The Board of Directors is interested in improving the performance of the networking subsystem of the NetBSD kernel on multiprocessor machines.*
Networking performance kinda, uhh, "matters" for servers and stuff.
> Here are some ruby microbenchmarks
Ruby? Are you serious?
And did you NOTICE the results said things like (this is the 2nd example, the first one with a Linux number):
> bm_hilbert_matrix.rb_10_5
> winner: nbsd
> OS Version Mean results vs Median
> Dragonfly: 2.9 0.0021753884 6.06291e-05
0.002 seconds!! With only 5 iterations!
Are you even aware of the margin of error when running benchmarks?!?
And NO breakdown of system/user/cpu time.
And reinitializing the interpreter every time... which was compiled with DIFFERENT OPTIONS with DIFFERENT COMPILERS running on systems with DIFFERENT BACKGROUND PROCESSES (maybe one was running `locate` and building an index in the background).
Anything running the same ASM will take the same amount of time on whatever OS, so to check differences you generally try to stress different I/O subsystems, like, say, networking.
| null | 0 | 1316206815 | False | 0 | c2kel1k | t3_kejfs | null | t1_c2kel1k | t1_c2kb1yn | null | 1427609358 | -1 | t5_2fwo | null | null | null |
True | babazka | null | And if there are *log N* characters in total in the whole string list (for some N), we have a sublinear algorithm, yay! My point is, anything other than O(NM) is misleading and should not be used to describe the algorithm. | null | 0 | 1316206838 | False | 0 | c2kel5r | t3_ki0wp | null | t1_c2kel5r | t1_c2kejgh | null | 1427609363 | 3 | t5_2fwo | null | null | null |
True | MeinKampfire | null | I agree. Shallow and pedantic. | null | 0 | 1316206890 | False | 0 | c2keldn | t3_khtwb | null | t1_c2keldn | t1_c2ke3al | null | 1427609363 | 3 | t5_2fwo | null | null | null |
True | danharaj | null | Strawmen don't program. | null | 0 | 1316206945 | False | 0 | c2kelnk | t3_kgq62 | null | t1_c2kelnk | t1_c2ka38z | null | 1427609366 | 9 | t5_2fwo | null | null | null |
True | omervk | null | *and* I only just joined reddit to comment on this post :) | null | 0 | 1316207003 | False | 0 | c2kelx7 | t3_khtwb | null | t1_c2kelx7 | t1_c2ke9d0 | null | 1427609370 | 2 | t5_2fwo | null | null | null |
True | grimatongueworm | null | And you posted it on the interwebs.
BRB, going to try this combo at every major bank, PayPal, Amazon, NewEgg, etc... | null | 0 | 1316207005 | False | 0 | c2kelxl | t3_khtwb | null | t1_c2kelxl | t3_khtwb | null | 1427609370 | 4 | t5_2fwo | null | null | null |
True | slid3r | null | BOOO Fedex!! | null | 0 | 1316207006 | False | 0 | c2kelxs | t3_khtwb | null | t1_c2kelxs | t3_khtwb | null | 1427609370 | 0 | t5_2fwo | null | null | null |
True | usaar33 | null | It's the most ingenious idea since sliced bread. | null | 0 | 1316207030 | False | 0 | c2kem29 | t3_kh13i | null | t1_c2kem29 | t1_c2ka4dt | null | 1427609371 | 0 | t5_2fwo | null | null | null |
True | Ryuujinx | null | I don't really see how this would work without the client throwing up MiTM warnings. I've seen SSL proxies that just pass traffic through, but not that decrypt it on the proxy for inspection. | null | 0 | 1316207040 | False | 0 | c2kem3x | t3_khtwb | null | t1_c2kem3x | t1_c2ke8rz | null | 1427609371 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | Nope. | null | 0 | 1316207048 | False | 0 | c2kem57 | t3_khtwb | null | t1_c2kem57 | t1_c2kdfny | null | 1427609373 | 6 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316207050 | False | 0 | c2kem5m | t3_khtwb | null | t1_c2kem5m | t1_c2kejqd | null | 1427609373 | 3 | t5_2fwo | null | null | null |
True | rawbdor | null | there is never any guarantee for what anyone SHOULD do. Only what they must do, and even then only if you have a test suite with rigid enforcement and mandatory certification. | null | 0 | 1316207091 | False | 0 | c2kemcw | t3_khtwb | null | t1_c2kemcw | t1_c2ke3kw | null | 1427609376 | 6 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316207135 | False | 0 | c2kemkg | t3_khtwb | null | t1_c2kemkg | t1_c2kcrkv | null | 1428193867 | 3 | t5_2fwo | null | null | null |
True | Ryuujinx | null | That doesn't really matter - storing it in plaintext, or encrypting it while keeping the key is a bad idea. | null | 0 | 1316207137 | False | 0 | c2kemkr | t3_khtwb | null | t1_c2kemkr | t1_c2kdg8w | null | 1428193867 | 1 | t5_2fwo | null | null | null |
True | Bluffkin | null | This obviously depends on the language, if the language uses string interning then it is sufficient to check the references are equal, rather than to do character by character comparison. | null | 0 | 1316207141 | False | 0 | c2kemlb | t3_ki0wp | null | t1_c2kemlb | t3_ki0wp | null | 1427609379 | 0 | t5_2fwo | null | null | null |
True | zetec | null | Now we'll never know. | null | 0 | 1316207140 | False | 0 | c2kemld | t3_khtwb | null | t1_c2kemld | t1_c2ke43f | null | 1427609379 | 1 | t5_2fwo | null | null | null |
True | MJZMan | null | Who cares? It's a temp user name, a temp p/w, and a temp label. The worse that could happen is someone (not you) could ship something somewhere. In the event that happened, whoever arranged for the label would simply send you another (with another temp username, temp p/w, and temp label) | null | 0 | 1316207160 | False | 0 | c2kemnk | t3_khtwb | null | t1_c2kemnk | t3_khtwb | null | 1427609379 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | I beg to differ. Too much dependency on third-party software to remember my passwords is entirely overkill as well as an inherently unsafe practice. You presume that everybody would be inclined to or should use the tools that perhaps you do. Again, I beg to differ. I could stretch myself to say that it may technically be a 'safe' password but a good one? Naaw. | null | 0 | 1316207171 | False | 0 | c2kemp5 | t3_khtwb | null | t1_c2kemp5 | t1_c2kehe4 | null | 1427609380 | 1 | t5_2fwo | null | null | null |
True | ModernRonin | null | Depends on how you do it. If you pre-hash the strings when they go into the table, then it comes down to just hashing the input string and seeing if there's anything in the corresponding slot. | null | 0 | 1316207201 | False | 0 | c2kemwg | t3_ki0wp | null | t1_c2kemwg | t1_c2kekoz | null | 1427609384 | 1 | t5_2fwo | null | null | null |
True | superironbob | null | Oddly enough the first demand in the Constitution for the US is the requirement for establishment of a Copyright and Patent system. Eliminating either is nigh impossible in the current political environment.
The systems as they stand today are a gross distortion of what they were intended to be. Both are intended to encourage disclosure instead of relying on secrecy to protect valuable knowledge. This can then be improved. The limited monopoly on the idea/work is offered as a reward for the production of a new idea or improvement. Neither system today accomplishes either. The copyright system is no longer “limited” and the patent system is largely ineffective at awarding patents for new ideas. And both are grossly abused as weapons of strong legal entities against individuals and small groups.
| null | 0 | 1316207234 | False | 0 | c2ken2r | t3_khvyw | null | t1_c2ken2r | t1_c2kdqy5 | null | 1427609395 | 4 | t5_2fwo | null | null | null |
True | [deleted] | null | Dissonance can be painful; pain can be good. | null | 0 | 1316207296 | False | 0 | c2kendq | t3_khtwb | null | t1_c2kendq | t1_c2ke3fi | null | 1427609399 | 2 | t5_2fwo | null | null | null |
True | zck | null | So it's encrypted. But the endpoint can read the referer. That is, the referer *is* sent. | null | 0 | 1316207303 | False | 0 | c2keney | t3_khtwb | null | t1_c2keney | t1_c2kehz9 | null | 1427609399 | 1 | t5_2fwo | null | null | null |
True | albanwr | null | We use the filtering appliance Bloxx and we intercept 100gb of traffic daily in our network. Kids are smart enough to use https proxy avoidance techniques, which in turn means we have to intercept. | null | 0 | 1316207330 | False | 0 | c2kenjp | t3_khtwb | null | t1_c2kenjp | t1_c2kejqd | null | 1427609398 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316207384 | False | 0 | c2kentt | t3_khtwb | null | t1_c2kentt | t3_khtwb | null | 1427609401 | 16 | t5_2fwo | null | null | null |
True | syspig | null | Your experience is not the norm.
Bluecoat proxies are used everywhere - they're likely in the vast majority of Fortune 1000 companies, and most government entities. Including the little podunk regional utility I work for.
SSL intercept is not only common in such environments, it's completely invisible to the end user. Since most of these sites use AD, internal trusted certs are easily pushed out to the clients without their knowledge, and the Bluecoat uses a cert signed by this internal trusted root.
We can easily see the contents of any https URI, as well as decrypting any SSL traffic coming/going from/to our internal hosts.
Yes, it sucks - but it's commonplace.
| null | 0 | 1316207423 | False | 0 | c2keo15 | t3_khtwb | null | t1_c2keo15 | t1_c2kejqd | null | 1427609402 | 14 | t5_2fwo | null | null | null |
True | Scottamus | null | Is being an idiot unethical? | null | 0 | 1316207564 | False | 0 | c2keoqg | t3_khtwb | null | t1_c2keoqg | t1_c2kcxdp | null | 1427609412 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316207623 | False | 0 | c2kep0b | t3_ki0wp | null | t1_c2kep0b | t3_ki0wp | null | 1427609414 | 1 | t5_2fwo | null | null | null |
True | henk53 | null | Rather cool really! Shows how powerful dynamic proxies can be.
A CDI implementation would be interesting as well. | null | 0 | 1316207630 | False | 0 | c2kep1g | t3_khpzu | null | t1_c2kep1g | t3_khpzu | null | 1427609414 | 3 | t5_2fwo | null | null | null |
True | VaginaDentata | null | SQL Injection and security vulnerability. | null | 0 | 1316207646 | False | 0 | c2kep4d | t3_khtwb | null | t1_c2kep4d | t3_khtwb | null | 1427609417 | 1 | t5_2fwo | null | null | null |
True | monocasa | null | What's wrong with 1.10? | null | 0 | 1316207657 | False | 0 | c2kep6d | t3_kggd3 | null | t1_c2kep6d | t3_kggd3 | null | 1427609417 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | > SySV IPC (semget()) exists and is supported and you can use it, but it's not used any more.
Exactly. Just like Microsoft platforms.
Also, unless my memory betrays me, there was this weird issue that if you want to atomically modify several semaphores, you should use System V ones, because fuck you.
> I don't use vim, so I don't know what it does; it's true that there are different file-notification APIs on different Unixes, but it's certainly not true that vim couldn't use them, if it doesn't.
Well, it could, but, you know, as we are talking about UNIX, the fact that it's not standardised tells a lot about the state of UNIX. And should prevent anyone from pointing at UNIX as an example of a nicely evolving platform.
> It is a key, just also a byte that means something else. That's not an API issue, nor is it the Unix API's fault what vim happened to choose.
Ohoho. It was a key (except not a key) that _vi_ chose thirty-something fucking years ago, and was standardised by POSIX and everyone else. And during all those thirty years no one has noticed that there's something very wrong going on, or at least no one has managed to speak loud enough to make everybody to use say `^[^[` to signify an escape key press in a terminal. Mind boggles. | null | 0 | 1316207658 | False | 0 | c2kep6i | t3_kgl4f | null | t1_c2kep6i | t1_c2kd6wu | null | 1427609417 | 4 | t5_2fwo | null | null | null |
Subsets and Splits
Filtered Reddit Uplifting News
The query retrieves specific news articles by their link IDs, providing a basic overview of those particular entries without deeper analysis or insights.
Recent Programming Comments
Returns a limited set of programming records from 2020 to 2023, providing basic filtering with minimal analytical value.