archived stringclasses 2
values | author stringlengths 3 20 | author_fullname stringlengths 4 12 ⌀ | body stringlengths 0 22.5k | comment_type stringclasses 1
value | controversiality stringclasses 2
values | created_utc stringlengths 10 10 | edited stringlengths 4 12 | gilded stringclasses 7
values | id stringlengths 1 7 | link_id stringlengths 7 10 | locked stringclasses 2
values | name stringlengths 4 10 ⌀ | parent_id stringlengths 5 10 | permalink stringlengths 41 91 ⌀ | retrieved_on stringlengths 10 10 ⌀ | score stringlengths 1 4 | subreddit_id stringclasses 1
value | subreddit_name_prefixed stringclasses 1
value | subreddit_type stringclasses 1
value | total_awards_received stringclasses 19
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
True | rbobby | null | It seems more like his examples point to flaws in the tool he's using.
In the first example the empty false block is not being counted as part of the branch (which is nuts... because the non-empty block could easily have manipulated state).
In the second example both the line coverage and branch coverage are both re... | null | 0 | 1316204800 | False | 0 | c2keaju | t3_khhdj | null | t1_c2keaju | t3_khhdj | null | 1427609235 | 1 | t5_2fwo | null | null | null |
True | Minimiscience | null | Only after a new joke arises to take its place, and possibly not even then. | null | 0 | 1316204804 | False | 0 | c2keaka | t3_khtwb | null | t1_c2keaka | t1_c2kd7e4 | null | 1427609235 | 2 | t5_2fwo | null | null | null |
True | tagattack | null | Don't forget GMOs. GMO Patent holders have destroyed the agriculture industry, there are entire agricultural disciplines (such as seed picking) which have been completely wiped out. | null | 0 | 1316204824 | False | 0 | c2keand | t3_khvyw | null | t1_c2keand | t1_c2ke7kh | null | 1427609236 | 16 | t5_2fwo | null | null | null |
True | mdipierro | null | I will buy it. Please let us know when it gets out (feel free to email me personally). | null | 0 | 1316204825 | False | 0 | c2keanr | t3_khrn6 | null | t1_c2keanr | t3_khrn6 | null | 1427609236 | 2 | t5_2fwo | null | null | null |
True | FlySwat | null | http://msdn.microsoft.com/en-us/windows/apps/br229516 | null | 0 | 1316204827 | False | 0 | c2keao4 | t3_khtuh | null | t1_c2keao4 | t1_c2kdh42 | null | 1427609236 | 4 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316204829 | False | 0 | c2keaon | t3_khtwb | null | t1_c2keaon | t1_c2kda57 | null | 1427609236 | 1 | t5_2fwo | null | null | null |
True | bittor | null | No he didn't... | null | 0 | 1316204833 | False | 0 | c2keap2 | t3_khtwb | null | t1_c2keap2 | t1_c2ke675 | null | 1427609236 | 11 | t5_2fwo | null | null | null |
True | axiak | null | The RFC does not mention this. And testing it shows that it will get sent. | null | 0 | 1316204869 | False | 0 | c2keavz | t3_khtwb | null | t1_c2keavz | t1_c2ke54r | null | 1427609239 | 9 | t5_2fwo | null | null | null |
True | axiak | null | I quote:
>Referrer to any pages (SSL or not) that the **fedex page links to.**
(emphasis mine)
| null | 0 | 1316204941 | False | 0 | c2keb9m | t3_khtwb | null | t1_c2keb9m | t1_c2ke4uf | null | 1427609243 | 5 | t5_2fwo | null | null | null |
True | jutct | null | A rainbow table doesn't care about how the hash was generated. | null | 0 | 1316204943 | False | 0 | c2kebab | t3_khtwb | null | t1_c2kebab | t1_c2kdyi8 | null | 1427609243 | -2 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316205027 | False | 0 | c2kebpp | t3_khtwb | null | t1_c2kebpp | t1_c2kdslx | null | 1427609251 | 1 | t5_2fwo | null | null | null |
True | Baron_von_Retard | null | D'oh. Thanks. | null | 0 | 1316205060 | False | 0 | c2kebvd | t3_khtwb | null | t1_c2kebvd | t1_c2ke7ix | null | 1427609253 | 1 | t5_2fwo | null | null | null |
True | cpitchford | null | This is exactly how such https proxies work, however, the monitoring of https traffic is often limited to content filtering, when upload of sensitive content is prohibited (i.e emailing customer details out) or when downloading prohibited / dangerous content (i.e. virus scanning)
Logging of allowed content and urls wo... | null | 0 | 1316205066 | False | 0 | c2kebwg | t3_khtwb | null | t1_c2kebwg | t1_c2ke9bh | null | 1427609253 | 1 | t5_2fwo | null | null | null |
True | ironiridis | null | I don't agree; the source code is open to look at, modify, improve, or ruin. If you aren't able to educate yourself from it, why is that a "because fuck you" attitude?
If you were implementing a video codec, you should be learning about the core topics of encoding and decoding video in a more formal way, with theory. ... | null | 0 | 1316205069 | False | 0 | c2kebx2 | t3_kgqdd | null | t1_c2kebx2 | t1_c2ke3se | null | 1427609253 | 3 | t5_2fwo | null | null | null |
True | tigerthecat5 | null | My friend created the photo I just wanted it to get some others to see it. | null | 0 | 1316205079 | False | 0 | c2kebys | t3_ki0rj | null | t1_c2kebys | t3_ki0rj | null | 1427609254 | 1 | t5_2fwo | null | null | null |
True | MMOSimca | null | Nope, he didn't, but somebody else just did a minute or two ago.
There is extreme irony in complaining about plaintext HTTPS urls and then not changing your password on a site where people can redirect your package. | null | 0 | 1316205115 | False | 0 | c2kec5u | t3_khtwb | null | t1_c2kec5u | t1_c2ke675 | null | 1427609255 | 59 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316205191 | False | 0 | c2kecje | t3_khz8t | null | t1_c2kecje | t1_c2ke21q | null | 1427609262 | 2 | t5_2fwo | null | null | null |
True | pukeorama | null | I hate you reddit | null | 0 | 1316205224 | False | 0 | c2kecps | t3_kgsnl | null | t1_c2kecps | t1_c2k7c3b | null | 1427609263 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | Well that wasnt so fucking hard. The normal wikipedia page made it sound like quantum physics | null | 0 | 1316205224 | False | 0 | c2kecpv | t3_kgfhb | null | t1_c2kecpv | t3_kgfhb | null | 1427609263 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | yep
edit: not really though, its like it only takes 41 years for the cracker to exhaust the possibility that you used a password like this. similar to checking 123456 and 'Password123' because they are typical, a cracker might take a shot at the words**4 approach because it is typical. | null | 0 | 1316205269 | False | 0 | c2kecym | t3_khtwb | null | t1_c2kecym | t1_c2ke77v | null | 1427609265 | 1 | t5_2fwo | null | null | null |
True | dmwit | null | > Proxies for HTTPS do see the communications; they create the external connection on behalf of the client on the internal network.
Citation? | null | 0 | 1316205301 | False | 0 | c2ked4u | t3_khtwb | null | t1_c2ked4u | t1_c2ke8rz | null | 1427609267 | 2 | t5_2fwo | null | null | null |
True | crooks5001 | null | then you distribute both to the internet to make it easier for everybody else to have some fun at your expense | null | 0 | 1316205313 | False | 0 | c2ked6w | t3_khtwb | null | t1_c2ked6w | t3_khtwb | null | 1427609268 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | Is that browser dependant? | null | 0 | 1316205354 | False | 0 | c2kedeb | t3_khtwb | null | t1_c2kedeb | t1_c2keavz | null | 1427609269 | 2 | t5_2fwo | null | null | null |
True | ChangingHats | null | ...and then there's the fact that people use common words...not just 'words in the dictionary'. | null | 0 | 1316205356 | False | 0 | c2kedes | t3_khtwb | null | t1_c2kedes | t1_c2kdon2 | null | 1427609270 | 2 | t5_2fwo | null | null | null |
True | Fidodo | null | I know. Rainbow tables take a long time to build and are only realistically feasible if the hash is quick to compute. If the hash algorithm is hard to compute it will take an unrealistic amount of time to generate the rainbow table and cannot be used in practice. | null | 0 | 1316205373 | False | 0 | c2kedi2 | t3_khtwb | null | t1_c2kedi2 | t1_c2kebab | null | 1427609282 | 0 | t5_2fwo | null | null | null |
True | smek2 | null | You don't seem to like Google very much. Does that mean you're half an idiot? | null | 0 | 1316205416 | False | 0 | c2kedqu | t3_kgb4h | null | t1_c2kedqu | t1_c2k3n90 | null | 1427609285 | 1 | t5_2fwo | null | null | null |
True | LongUsername | null | I can attest that mine did not. | null | 0 | 1316205438 | False | 0 | c2kedv4 | t3_khtwb | null | t1_c2kedv4 | t1_c2ke192 | null | 1428193867 | 3 | t5_2fwo | null | null | null |
True | shea241 | null | There are several reasons a render engine will have its performance slashed into a tiny fraction of what you'd expect. Here's a few!
1. Sending triangles to the GPU, or rendering vertex buffers on the GPU, without paying attention to how similar the materials on those triangles are. Switching the active texture, esp... | null | 0 | 1316205447 | True | 0 | c2kedxa | t3_kgq62 | null | t1_c2kedxa | t1_c2k7adc | null | 1427609284 | 8 | t5_2fwo | null | null | null |
True | Xorlev | null | When you control the clients and the proxy, then you can MITM without any warnings. You can make your own self-signed CA or any number of valid ways to "forge" certs internally. With your own CA you can sign an SSL certificate for a new site in real time and it's valid. | null | 0 | 1316205489 | False | 0 | c2kee4w | t3_khtwb | null | t1_c2kee4w | t1_c2ke9bh | null | 1427609287 | 3 | t5_2fwo | null | null | null |
True | tairygreene | null | its not a thing? | null | 0 | 1316205524 | False | 0 | c2keeba | t3_khtwb | null | t1_c2keeba | t1_c2kdxro | null | 1427609288 | 5 | t5_2fwo | null | null | null |
True | ModernRonin | null | It's O(k) because you pre-hash them, duh. | null | 0 | 1316205547 | False | 0 | c2keefj | t3_ki0wp | null | t1_c2keefj | t3_ki0wp | null | 1427609297 | 3 | t5_2fwo | null | null | null |
True | sanarothe | null | i was getting hungry. hungrier. oh, now it's gone. | null | 0 | 1316205553 | False | 0 | c2keegm | t3_khtwb | null | t1_c2keegm | t1_c2ke446 | null | 1427609297 | 0 | t5_2fwo | null | null | null |
True | babazka | null | O(NM), where N = number of items in the list, M = length of the string. Two loops, nested: for i = 1..N, for j = 1..M. How can it *not* be O(N*M)?
This article illustrates that when considering big O it is not enough to express the complexity as a function of *some* N; the variable N must be carefully chosen. Total n... | null | 0 | 1316205574 | True | 0 | c2keekn | t3_ki0wp | null | t1_c2keekn | t3_ki0wp | null | 1427609291 | 5 | t5_2fwo | null | null | null |
True | bewmar | null | It is only useful if the table values have been hashed by the same function of the password you are trying to decrypt. It is only useful for one hash algorithm, so in that sense it does care about how the hash was generated. | null | 0 | 1316205607 | False | 0 | c2keera | t3_khtwb | null | t1_c2keera | t1_c2kebab | null | 1427609299 | 4 | t5_2fwo | null | null | null |
True | duniyadnd | null | TIL | null | 0 | 1316205666 | False | 0 | c2kef2i | t3_khtwb | null | t1_c2kef2i | t1_c2kdzyg | null | 1427609302 | -1 | t5_2fwo | null | null | null |
True | queensnake | null | You gave the title too much of a twist IMO; it'd do better if you'd left it as the original,
> iOS, Android, Windows Phone, Windows 8? A coder's guide
-- of wider interest. | null | 0 | 1316205701 | True | 0 | c2kef9h | t3_ki0i2 | null | t1_c2kef9h | t1_c2ke9hh | null | 1427609307 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | True but say you're using a pre-generated rainbow-table you'll only have access to one subset (say lower-case letters). Something you'd likely do if you didn't have access to ludicrous amounts of hard drive space or generated your own rainbow-tables. | null | 0 | 1316205763 | False | 0 | c2kefm1 | t3_khtwb | null | t1_c2kefm1 | t1_c2kdn9t | null | 1427609311 | 3 | t5_2fwo | null | null | null |
True | [deleted] | null | Wow, he seriously didn't change his password after making a submission where he pointed a large red arrow at his password? | null | 0 | 1316205776 | True | 0 | c2kefov | t3_khtwb | null | t1_c2kefov | t1_c2kec5u | null | 1427609308 | 71 | t5_2fwo | null | null | null |
True | systematical | null | Very interesting project. I like the idea. As stated, the UI certainly needs some attention with setting BPM and being more user friendly. But as proof of concept its very awesome! | null | 0 | 1316205786 | False | 0 | c2kefqw | t3_khn6y | null | t1_c2kefqw | t3_khn6y | null | 1427609308 | 1 | t5_2fwo | null | null | null |
True | Tommstein | null | Then [this](http://www.coboloncogs.org/) should be right up your alley. | null | 0 | 1316205852 | False | 0 | c2keg3q | t3_kdv51 | null | t1_c2keg3q | t1_c2kc5o0 | null | 1427609312 | 1 | t5_2fwo | null | null | null |
True | mechengineer | null | How about [this](http://drdobbs.com/high-performance-computing/231002854)? | null | 0 | 1316205914 | False | 0 | c2kegfk | t3_khryi | null | t1_c2kegfk | t1_c2kclr1 | null | 1427609315 | 2 | t5_2fwo | null | null | null |
True | piratesahoy | null | Er it's not Linux based... | null | 0 | 1316205917 | False | 0 | c2kegg5 | t3_kg1ui | null | t1_c2kegg5 | t1_c2ka81b | null | 1427609315 | 3 | t5_2fwo | null | null | null |
True | umop_apisdn | null | I think you misunderstand; the referrer will not be known to the proxy when you make a request using https in any case (because it is encrypted). This is just catching an edge case when you make a non-secure request after secure browsing. | null | 0 | 1316205975 | False | 0 | c2kegr0 | t3_khtwb | null | t1_c2kegr0 | t1_c2ke5uz | null | 1427609317 | 6 | t5_2fwo | null | null | null |
True | kurin | null | I think the thing is that FedEx sent OP a link he could click to get at his label. Instead of giving him a URL with a bigass one time password (yadda.com/?bigasspass=JKLHp79h3pq498fhqewfweurgh3-tq34r), they just pulled his pass out of a database and used that instead. | null | 0 | 1316206000 | False | 0 | c2kegvr | t3_khtwb | null | t1_c2kegvr | t1_c2ke32o | null | 1427609317 | 5 | t5_2fwo | null | null | null |
True | neuter | null | Don't forget about patenting gene sequences. It blows my mind how they can accept those patents. | null | 0 | 1316206033 | False | 0 | c2keh1h | t3_khvyw | null | t1_c2keh1h | t1_c2ke7kh | null | 1427609319 | 21 | t5_2fwo | null | null | null |
True | shea241 | null | Octrees are very good at partitioning the world into parts you should care about. They're not a magic solution to minimizing graphics calls.
Triangles are not triangles. That get pretty complicated though. | null | 0 | 1316206090 | False | 0 | c2kehc8 | t3_kgq62 | null | t1_c2kehc8 | t1_c2k7g93 | null | 1427609321 | 3 | t5_2fwo | null | null | null |
True | piranha | null | That's what appears to be 10 characters of a 62-character alphabet, randomly selected with uniform distribution. Which is 59.5 bits. Safe by any stretch of the imagination.
It's a good password, because a random password implies that he's probably using a unique password for every site. With the advent of personal ... | null | 0 | 1316206103 | False | 0 | c2kehe4 | t3_khtwb | null | t1_c2kehe4 | t1_c2ke5bj | null | 1427609321 | 6 | t5_2fwo | null | null | null |
True | Noink | null | And browser history. | null | 0 | 1316206170 | False | 0 | c2kehrf | t3_khtwb | null | t1_c2kehrf | t1_c2kdprm | null | 1427609323 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | No! Use bcrypt! http://codahale.com/how-to-safely-store-a-password/ | null | 0 | 1316206188 | False | 0 | c2kehup | t3_khtwb | null | t1_c2kehup | t1_c2kdoiq | null | 1427609327 | 2 | t5_2fwo | null | null | null |
True | otakucode | null | To accomplish it. To prove to ones self that one actually can do it. No one else was willing or able to do it... so it's significant to say 'I was willing, and I was able.'
It might not be Everest, but people of every age do things 'because it's there' and it's an important factor in what gets things done in society... | null | 0 | 1316206193 | False | 0 | c2kehvz | t3_khf6j | null | t1_c2kehvz | t1_c2kdsds | null | 1427609330 | 6 | t5_2fwo | null | null | null |
True | rootis0 | null | It has been proven that sexual abstinence enhances intellectual capacity greatly: http://www.seinfeldscripts.com/TheAbstinence.htm
**Jerry**: *Louise! That's what's doin' it. You're no longer pre-occupied with sex, so your mind is able to focus.*
**George**: *You think?*
**Jerry**: *Yeah. I mean, let's say this is y... | null | 0 | 1316206203 | True | 0 | c2kehy3 | t3_khf6j | null | t1_c2kehy3 | t1_c2kad56 | null | 1427609330 | 4 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316206210 | False | 0 | c2kehz9 | t3_khtwb | null | t1_c2kehz9 | t1_c2ke5uz | null | 1427609325 | 18 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316206213 | False | 0 | c2kei06 | t3_khtwb | null | t1_c2kei06 | t1_c2ke2wm | null | 1427609325 | 14 | t5_2fwo | null | null | null |
True | zck | null | Sure, proxies won't see it. But the Referer is sent. Say you go to https://www.google.com, and search for something. You click on a link, say to https://anothersite.com . Your browser sends the Referer to anothersite.com. | null | 0 | 1316206241 | False | 0 | c2kei56 | t3_khtwb | null | t1_c2kei56 | t1_c2kegr0 | null | 1427609327 | 12 | t5_2fwo | null | null | null |
True | PatrickTulskie | null | You've just given me an idea for a robot. What it will do is look for links like this on reddit, then show up at the OP's house, bust open the door, take their computer, and mail it to a child in a developing country. | null | 0 | 1316206254 | False | 0 | c2kei7w | t3_khz8t | null | t1_c2kei7w | t3_khz8t | null | 1427609329 | 0 | t5_2fwo | null | null | null |
True | Cintax | null | Anyone with access to his browser history can see it too... | null | 0 | 1316206324 | False | 0 | c2keikv | t3_khtwb | null | t1_c2keikv | t1_c2kdu4z | null | 1427609332 | 1 | t5_2fwo | null | null | null |
True | greyfade | null | Neither Obama nor the Senate "overhauled" anything. They made a handful of "tweaks" to a broken system and hailed it as "improvements" and "reform," when it is neither of those things.
It fixes none of the problems with Patent Law, potentially might make a few problems *worse*, and changes from a First-to-Invent to a ... | null | 0 | 1316206326 | False | 0 | c2keil8 | t3_khvyw | null | t1_c2keil8 | t3_khvyw | null | 1427609332 | 39 | t5_2fwo | null | null | null |
True | Noink | null | Yes - my office has a proxy that intercepts HTTPS traffic, and firefox reminds me every time I forget and try to use gmail. | null | 0 | 1316206342 | False | 0 | c2keiob | t3_khtwb | null | t1_c2keiob | t1_c2ke9ez | null | 1427609335 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316206344 | False | 0 | c2keion | t3_khtuh | null | t1_c2keion | t1_c2kdh42 | null | 1427609335 | 5 | t5_2fwo | null | null | null |
True | Strmtrper6 | null | If that was the situation, then the first one would be uncrackable compared to the second. Not that there is currently much of a difference between "never" and "1.24 hundred trillion trillion centuries."
Unless I am misunderstanding you, in which case I'm sorry about that.
Also, typing that out made me wonder what ... | null | 0 | 1316206401 | False | 0 | c2keiz2 | t3_khtwb | null | t1_c2keiz2 | t1_c2kefm1 | null | 1427609336 | 1 | t5_2fwo | null | null | null |
True | lftl | null | Yeah... I specifically went back and added the "efficient" in there. You don't know their password OR their username when you start the attack. Other than avoiding some security FedEx may or may not have on their web logins I don't see how it's any easier than brute forcing via the web. | null | 0 | 1316206450 | False | 0 | c2kej8c | t3_khtwb | null | t1_c2kej8c | t1_c2kdrq1 | null | 1427609337 | 1 | t5_2fwo | null | null | null |
True | name_was_taken | null | It's often easy to get to logs when you can't get to sensitive things like database connection info. | null | 0 | 1316206458 | False | 0 | c2kej9o | t3_khtwb | null | t1_c2kej9o | t1_c2kdf4w | null | 1427609337 | 1 | t5_2fwo | null | null | null |
True | lusion | null | Because if there are N characters in total in the whole string list you never actually do more than N comparisons. Hence O(N). The number of characters is >> than the number of strings, so it dominates the time bound. | null | 0 | 1316206501 | False | 0 | c2kejgh | t3_ki0wp | null | t1_c2kejgh | t1_c2keekn | null | 1427609340 | -1 | t5_2fwo | null | null | null |
True | curien | null | While I know that's technically possible, I've *never* seen it done, and I've been working at various places that all had proxies for the purpose of filtering requests for the past 10+ years. | null | 0 | 1316206559 | False | 0 | c2kejqd | t3_khtwb | null | t1_c2kejqd | t1_c2kei06 | null | 1427609342 | 1 | t5_2fwo | null | null | null |
True | nazbot | null | I don't think Google+ is really going to be like facebook or twitter. Google+ is more likely to be like Xbox Live - a central service that you can use to add 'social' to your applications.
Facebook has more of an opportunity here because of it's scale but their APIs are absolutely terrible. Google has a great reputa... | null | 0 | 1316206619 | False | 0 | c2kek09 | t3_kgsnl | null | t1_c2kek09 | t1_c2k9u8w | null | 1427609346 | 1 | t5_2fwo | null | null | null |
True | Durpadoo | null | Or everyone on the internet that he just showed it to now. :D | null | 0 | 1316206709 | False | 0 | c2keki0 | t3_khtwb | null | t1_c2keki0 | t1_c2kczdy | null | 1427609351 | 2 | t5_2fwo | null | null | null |
True | remyroy | null | Let's hope they are pushing for some kind of open standard or open discussion for this. | null | 0 | 1316206733 | False | 0 | c2kekmh | t3_ki1gj | null | t1_c2kekmh | t3_ki1gj | null | 1427609352 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | Is anyone else just impressed by how hardcore our password is? | null | 0 | 1316206735 | False | 0 | c2kekmw | t3_khtwb | null | t1_c2kekmw | t3_khtwb | null | 1427609352 | 0 | t5_2fwo | null | null | null |
True | lusion | null | Building the hash will be O(N) so that saves you nothing. | null | 0 | 1316206745 | False | 0 | c2kekoz | t3_ki0wp | null | t1_c2kekoz | t1_c2keefj | null | 1427609353 | 0 | t5_2fwo | null | null | null |
True | virt_vera | null | > What big kernel lock?
The big kernel NETWORKING lock which this thread is about.
> Should I also point out that the Linux kernel has only gotten rid of the Big Kernel Lock extremely recently
Whoah, that is referring to *removing the call* from every last driver that used it, and Linux has *thousands* of old ... | null | 0 | 1316206815 | False | 0 | c2kel1k | t3_kejfs | null | t1_c2kel1k | t1_c2kb1yn | null | 1427609358 | -1 | t5_2fwo | null | null | null |
True | babazka | null | And if there are *log N* characters in total in the whole string list (for some N), we have a sublinear algorithm, yay! My point is, anything other than O(NM) is misleading and should not be used to describe the algorithm. | null | 0 | 1316206838 | False | 0 | c2kel5r | t3_ki0wp | null | t1_c2kel5r | t1_c2kejgh | null | 1427609363 | 3 | t5_2fwo | null | null | null |
True | MeinKampfire | null | I agree. Shallow and pedantic. | null | 0 | 1316206890 | False | 0 | c2keldn | t3_khtwb | null | t1_c2keldn | t1_c2ke3al | null | 1427609363 | 3 | t5_2fwo | null | null | null |
True | danharaj | null | Strawmen don't program. | null | 0 | 1316206945 | False | 0 | c2kelnk | t3_kgq62 | null | t1_c2kelnk | t1_c2ka38z | null | 1427609366 | 9 | t5_2fwo | null | null | null |
True | omervk | null | *and* I only just joined reddit to comment on this post :) | null | 0 | 1316207003 | False | 0 | c2kelx7 | t3_khtwb | null | t1_c2kelx7 | t1_c2ke9d0 | null | 1427609370 | 2 | t5_2fwo | null | null | null |
True | grimatongueworm | null | And you posted it on the interwebs.
BRB, going to try this combo at every major bank, PayPal, Amazon, NewEgg, etc... | null | 0 | 1316207005 | False | 0 | c2kelxl | t3_khtwb | null | t1_c2kelxl | t3_khtwb | null | 1427609370 | 4 | t5_2fwo | null | null | null |
True | slid3r | null | BOOO Fedex!! | null | 0 | 1316207006 | False | 0 | c2kelxs | t3_khtwb | null | t1_c2kelxs | t3_khtwb | null | 1427609370 | 0 | t5_2fwo | null | null | null |
True | usaar33 | null | It's the most ingenious idea since sliced bread. | null | 0 | 1316207030 | False | 0 | c2kem29 | t3_kh13i | null | t1_c2kem29 | t1_c2ka4dt | null | 1427609371 | 0 | t5_2fwo | null | null | null |
True | Ryuujinx | null | I don't really see how this would work without the client throwing up MiTM warnings. I've seen SSL proxies that just pass traffic through, but not that decrypt it on the proxy for inspection. | null | 0 | 1316207040 | False | 0 | c2kem3x | t3_khtwb | null | t1_c2kem3x | t1_c2ke8rz | null | 1427609371 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | Nope. | null | 0 | 1316207048 | False | 0 | c2kem57 | t3_khtwb | null | t1_c2kem57 | t1_c2kdfny | null | 1427609373 | 6 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316207050 | False | 0 | c2kem5m | t3_khtwb | null | t1_c2kem5m | t1_c2kejqd | null | 1427609373 | 3 | t5_2fwo | null | null | null |
True | rawbdor | null | there is never any guarantee for what anyone SHOULD do. Only what they must do, and even then only if you have a test suite with rigid enforcement and mandatory certification. | null | 0 | 1316207091 | False | 0 | c2kemcw | t3_khtwb | null | t1_c2kemcw | t1_c2ke3kw | null | 1427609376 | 6 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316207135 | False | 0 | c2kemkg | t3_khtwb | null | t1_c2kemkg | t1_c2kcrkv | null | 1428193867 | 3 | t5_2fwo | null | null | null |
True | Ryuujinx | null | That doesn't really matter - storing it in plaintext, or encrypting it while keeping the key is a bad idea. | null | 0 | 1316207137 | False | 0 | c2kemkr | t3_khtwb | null | t1_c2kemkr | t1_c2kdg8w | null | 1428193867 | 1 | t5_2fwo | null | null | null |
True | Bluffkin | null | This obviously depends on the language, if the language uses string interning then it is sufficient to check the references are equal, rather than to do character by character comparison. | null | 0 | 1316207141 | False | 0 | c2kemlb | t3_ki0wp | null | t1_c2kemlb | t3_ki0wp | null | 1427609379 | 0 | t5_2fwo | null | null | null |
True | zetec | null | Now we'll never know. | null | 0 | 1316207140 | False | 0 | c2kemld | t3_khtwb | null | t1_c2kemld | t1_c2ke43f | null | 1427609379 | 1 | t5_2fwo | null | null | null |
True | MJZMan | null | Who cares? It's a temp user name, a temp p/w, and a temp label. The worse that could happen is someone (not you) could ship something somewhere. In the event that happened, whoever arranged for the label would simply send you another (with another temp username, temp p/w, and temp label) | null | 0 | 1316207160 | False | 0 | c2kemnk | t3_khtwb | null | t1_c2kemnk | t3_khtwb | null | 1427609379 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | I beg to differ. Too much dependency on third-party software to remember my passwords is entirely overkill as well as an inherently unsafe practice. You presume that everybody would be inclined to or should use the tools that perhaps you do. Again, I beg to differ. I could stretch myself to say that it may technically ... | null | 0 | 1316207171 | False | 0 | c2kemp5 | t3_khtwb | null | t1_c2kemp5 | t1_c2kehe4 | null | 1427609380 | 1 | t5_2fwo | null | null | null |
True | ModernRonin | null | Depends on how you do it. If you pre-hash the strings when they go into the table, then it comes down to just hashing the input string and seeing if there's anything in the corresponding slot. | null | 0 | 1316207201 | False | 0 | c2kemwg | t3_ki0wp | null | t1_c2kemwg | t1_c2kekoz | null | 1427609384 | 1 | t5_2fwo | null | null | null |
True | superironbob | null | Oddly enough the first demand in the Constitution for the US is the requirement for establishment of a Copyright and Patent system. Eliminating either is nigh impossible in the current political environment.
The systems as they stand today are a gross distortion of what they were intended to be. Both are intended to e... | null | 0 | 1316207234 | False | 0 | c2ken2r | t3_khvyw | null | t1_c2ken2r | t1_c2kdqy5 | null | 1427609395 | 4 | t5_2fwo | null | null | null |
True | [deleted] | null | Dissonance can be painful; pain can be good. | null | 0 | 1316207296 | False | 0 | c2kendq | t3_khtwb | null | t1_c2kendq | t1_c2ke3fi | null | 1427609399 | 2 | t5_2fwo | null | null | null |
True | zck | null | So it's encrypted. But the endpoint can read the referer. That is, the referer *is* sent. | null | 0 | 1316207303 | False | 0 | c2keney | t3_khtwb | null | t1_c2keney | t1_c2kehz9 | null | 1427609399 | 1 | t5_2fwo | null | null | null |
True | albanwr | null | We use the filtering appliance Bloxx and we intercept 100gb of traffic daily in our network. Kids are smart enough to use https proxy avoidance techniques, which in turn means we have to intercept. | null | 0 | 1316207330 | False | 0 | c2kenjp | t3_khtwb | null | t1_c2kenjp | t1_c2kejqd | null | 1427609398 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316207384 | False | 0 | c2kentt | t3_khtwb | null | t1_c2kentt | t3_khtwb | null | 1427609401 | 16 | t5_2fwo | null | null | null |
True | syspig | null | Your experience is not the norm.
Bluecoat proxies are used everywhere - they're likely in the vast majority of Fortune 1000 companies, and most government entities. Including the little podunk regional utility I work for.
SSL intercept is not only common in such environments, it's completely invisible to the end user... | null | 0 | 1316207423 | False | 0 | c2keo15 | t3_khtwb | null | t1_c2keo15 | t1_c2kejqd | null | 1427609402 | 14 | t5_2fwo | null | null | null |
True | Scottamus | null | Is being an idiot unethical? | null | 0 | 1316207564 | False | 0 | c2keoqg | t3_khtwb | null | t1_c2keoqg | t1_c2kcxdp | null | 1427609412 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316207623 | False | 0 | c2kep0b | t3_ki0wp | null | t1_c2kep0b | t3_ki0wp | null | 1427609414 | 1 | t5_2fwo | null | null | null |
True | henk53 | null | Rather cool really! Shows how powerful dynamic proxies can be.
A CDI implementation would be interesting as well. | null | 0 | 1316207630 | False | 0 | c2kep1g | t3_khpzu | null | t1_c2kep1g | t3_khpzu | null | 1427609414 | 3 | t5_2fwo | null | null | null |
True | VaginaDentata | null | SQL Injection and security vulnerability. | null | 0 | 1316207646 | False | 0 | c2kep4d | t3_khtwb | null | t1_c2kep4d | t3_khtwb | null | 1427609417 | 1 | t5_2fwo | null | null | null |
True | monocasa | null | What's wrong with 1.10? | null | 0 | 1316207657 | False | 0 | c2kep6d | t3_kggd3 | null | t1_c2kep6d | t3_kggd3 | null | 1427609417 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | > SySV IPC (semget()) exists and is supported and you can use it, but it's not used any more.
Exactly. Just like Microsoft platforms.
Also, unless my memory betrays me, there was this weird issue that if you want to atomically modify several semaphores, you should use System V ones, because fuck you.
> I don'... | null | 0 | 1316207658 | False | 0 | c2kep6i | t3_kgl4f | null | t1_c2kep6i | t1_c2kd6wu | null | 1427609417 | 4 | t5_2fwo | null | null | null |
Subsets and Splits
Filtered Reddit Uplifting News
The query retrieves specific news articles by their link IDs, providing a basic overview of those particular entries without deeper analysis or insights.
Recent Programming Comments
Returns a limited set of programming records from 2020 to 2023, providing basic filtering with minimal analytical value.