archived
stringclasses
2 values
author
stringlengths
3
20
author_fullname
stringlengths
4
12
body
stringlengths
0
22.5k
comment_type
stringclasses
1 value
controversiality
stringclasses
2 values
created_utc
stringlengths
10
10
edited
stringlengths
4
12
gilded
stringclasses
7 values
id
stringlengths
1
7
link_id
stringlengths
7
10
locked
stringclasses
2 values
name
stringlengths
4
10
parent_id
stringlengths
5
10
permalink
stringlengths
41
91
retrieved_on
stringlengths
10
10
score
stringlengths
1
4
subreddit_id
stringclasses
1 value
subreddit_name_prefixed
stringclasses
1 value
subreddit_type
stringclasses
1 value
total_awards_received
stringclasses
19 values
True
BeatLeJuce
null
Tnaks for the hint :)
null
0
1316207663
False
0
c2kep7f
t3_khryi
null
t1_c2kep7f
t1_c2kegfk
null
1427609417
1
t5_2fwo
null
null
null
True
gmartres
null
> I've rewritten Neil's PiCF here: https://bitbucket.org/tarballs_are_good/lisp-random/src/50b56958f3ea/picf.lisp Thanks for that I didn't feel like trying to understand his messy C# code, that's a rather neat algorithm, but I doubt it's really new. Hopefully Bill Gosper will introduce him to Lisp :p.
null
0
1316207685
False
0
c2kepba
t3_khf6j
null
t1_c2kepba
t1_c2kbt2j
null
1427609420
3
t5_2fwo
null
null
null
True
cb43569
null
Yeah, this really belongs in /r/netsec, I'm surprised it hasn't been said yet.
null
0
1316207773
False
0
c2kepq2
t3_khtwb
null
t1_c2kepq2
t1_c2ke7i6
null
1427609423
1
t5_2fwo
null
null
null
True
not_a_turtle
null
You best not have any other shipping companies in your wallet.
null
0
1316207790
False
0
c2keptd
t3_khtwb
null
t1_c2keptd
t1_c2kdgi8
null
1427609423
8
t5_2fwo
null
null
null
True
cb43569
null
What the... what?
null
0
1316207801
False
0
c2kepv7
t3_khtwb
null
t1_c2kepv7
t1_c2kentt
null
1427609424
5
t5_2fwo
null
null
null
True
bernlin2000
null
And now you posted it on Reddit for all of us to see/copy...am I missing something? ಠ\_ಠ
null
0
1316207836
False
0
c2keq0g
t3_khtwb
null
t1_c2keq0g
t3_khtwb
null
1427609428
1
t5_2fwo
null
null
null
True
Dgc2002
null
Actually he didn't change it, somebody else did. He actually showed us all his then current username and password and failed to change it....
null
0
1316207839
False
0
c2keq12
t3_khtwb
null
t1_c2keq12
t1_c2kdz1h
null
1427609428
2
t5_2fwo
null
null
null
True
babazka
null
The article discusses a computational complexity of a specific search algorithm. Obviously there may be better ways of solving the search problem, including hash tables and suffix trees, but that's not the point here.
null
0
1316207882
False
0
c2keq7w
t3_ki0wp
null
t1_c2keq7w
t1_c2kep0b
null
1427609428
1
t5_2fwo
null
null
null
True
justguessmyusername
null
lol, yes. See, when YOU type hunter2, it shows to us as *******
null
0
1316207893
False
0
c2keq9t
t3_khtwb
null
t1_c2keq9t
t1_c2kdci4
null
1427609428
2
t5_2fwo
null
null
null
True
tjhei
null
WTF. See [here](http://www.myspace.com/craziibeautiful6969): "Who I'd like to meet:". Also: Ronald is really sad.
null
0
1316208009
False
0
c2keqvg
t3_khtwb
null
t1_c2keqvg
t1_c2kentt
null
1427609434
6
t5_2fwo
null
null
null
True
ErstwhileRockstar
null
> `@ImplementedBy(AImpl.class)` > `interface A { public void a(); }` I guess the DI aficionados have misunderstood interfaces.
null
0
1316208151
False
0
c2kerlh
t3_khpzu
null
t1_c2kerlh
t3_khpzu
null
1427609443
0
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316208350
False
0
c2kesl1
t3_khf6j
null
t1_c2kesl1
t1_c2kcz54
null
1428193862
2
t5_2fwo
null
null
null
True
AnomalyNexus
null
The browser history is a serious problem on public computers. Already had one of my accounts hacked because a site was doing that & I didn't notice it.
null
0
1316208550
False
0
c2ketgh
t3_khtwb
null
t1_c2ketgh
t1_c2kd894
null
1427609468
2
t5_2fwo
null
null
null
True
tbrownaw
null
> From my understanding it moved from "first to invent" to "first to file". Personally I think this is big business christmas. Notice it mentions Google and Apple are big supporters. Basically it lowers the chance of some company releasing something and having to worry that someone invented it first in their garage but hadn't either (1) patented it or (2) their patent wasn't first. This reduces uncertainty. Once you file, you know *exactly* where you stand. > I'm sure this will be followed by a new feature for fast tracking patents and it will be moved to a "first to be approved" where patents can be put on this track for the right price or through the political buddy network. That would *increase* uncertainty. All the big companies would be against it for the same reasons that they're for the current change.
null
0
1316208604
False
0
c2ketpz
t3_khvyw
null
t1_c2ketpz
t1_c2kdmtn
null
1427609475
8
t5_2fwo
null
null
null
True
God_Liver_Oil
null
how do you memorize a PW like that?
null
0
1316208677
False
0
c2keu2c
t3_khtwb
null
t1_c2keu2c
t3_khtwb
null
1427609476
-1
t5_2fwo
null
null
null
True
kolm
null
[However, the program does not draw a perfect circle, but rather a very round ellipse, which becomes rounder as 1/16 gets closer and closer to 0.](http://nbickford.wordpress.com/2011/04/03/the-minsky-circle-algorithm/)
null
0
1316208823
False
0
c2keut7
t3_khf6j
null
t1_c2keut7
t1_c2k9xjn
null
1427609486
1
t5_2fwo
null
null
null
True
greyfade
null
> The cost of research and FDA approval is so high that no one creates new drugs without millions of dollars of investment anyway, so the costs are lower as a percentage of the industry. The cost of research and FDA approval is actually so *low* (less than $80M for initial R&D, and even less than that for re-purposing drugs) that pharma companies typically recoup their costs very quickly. I would submit that even without patents, drugs would still be invented, possibly with a greater focus on efficacy, stability, and reduction in contraindications.
null
0
1316208858
False
0
c2keuzy
t3_khvyw
null
t1_c2keuzy
t1_c2ke7kh
null
1427609495
3
t5_2fwo
null
null
null
True
[deleted]
null
How in the world do you remember that password?
null
0
1316208865
False
0
c2kev1a
t3_khtwb
null
t1_c2kev1a
t3_khtwb
null
1427609495
1
t5_2fwo
null
null
null
True
piranha
null
The fact is that passwords get compromised, often due to plaintext storage. Password management tools may not be for everyone, but it's a good stop-gap measure until ("until"? as if) public-key authentication for online services becomes more prevalent. But why do you think it's inherently unsafe? You could say that the compromise of your machine leads to the instant compromise of your passwords, and that is true. On the other hand, if an attacker compromises your machine, they could sniff your one password (or one of few passwords that you share between sites) over the course of a few days. I have 691 passwords on file. My choice is to recycle passwords or remember 691 different passwords (or minor permutations of a password). The latter is not practical for me.
null
0
1316208910
False
0
c2kev8x
t3_khtwb
null
t1_c2kev8x
t1_c2kemp5
null
1427609492
1
t5_2fwo
null
null
null
True
SarahC
null
>which is much weaker than the first one. Bollocks: 20 000^4 = 1.6 × 10^17 = 160,000,000,000,000,000 That is NOT weak - and that's even using a dictionary attack on only lowercase words!
null
0
1316208917
False
0
c2keva5
t3_khtwb
null
t1_c2keva5
t1_c2kdiwj
null
1427609492
1
t5_2fwo
null
null
null
True
sbrown123
null
>This reduces uncertainty. Once you file, you know exactly where you stand. Unlikely since almost all current and past patent litigation was a patent holder enforcing their patent, not an inventor insisting they were first versus a patent holder. This removes the "prior art" defense to ensure patent holders can more easily enforce their patents is all. >That would increase uncertainty. Not if you have more money.
null
0
1316209024
True
0
c2kevsw
t3_khvyw
null
t1_c2kevsw
t1_c2ketpz
null
1427609499
16
t5_2fwo
null
null
null
True
addmoreice
null
I didn't know that cleaning a gun that way would cause it to fire and kill the guy standing next to me. But don't worry, I work as a professional gun cleaner.... it's an ethics matter. if you do something for a living, you should understand the security, safety, legal, and financial concerns related to that business. That's a basic ethical requirement.
null
0
1316209032
False
0
c2kevue
t3_khtwb
null
t1_c2kevue
t1_c2kd99h
null
1427609499
1
t5_2fwo
null
null
null
True
babazka
null
GUI is nice, but it should be said that *cProfile* is a standard profiling module, and you can review data collected by the profiler from Python interactive console, using another standard module -- *pstats*. No external tools needed. More information is [here](http://docs.python.org/library/profile.html).
null
0
1316209116
False
0
c2kew8y
t3_khv0w
null
t1_c2kew8y
t3_khv0w
null
1427609506
10
t5_2fwo
null
null
null
True
Raven256
null
"Where can I get a free and legal copy of Windows to test it out?" Windows 8: http://msdn.microsoft.com/en-us/windows/apps/br229516 Server 2008 R2: http://www.microsoft.com/en-us/server-cloud/windows-server/2008-r2-trial.aspx
null
0
1316209163
False
0
c2kewg1
t3_khtuh
null
t1_c2kewg1
t1_c2kdh42
null
1427609508
16
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316209275
False
0
c2kewzb
t3_khtwb
null
t1_c2kewzb
t1_c2kec5u
null
1427609515
1
t5_2fwo
null
null
null
True
n00bSailboat
null
It's common for IT to publish a trusted root certificate internally to the company, they can then have the proxy provide certs issued by them, but trusted by your browser (because they have admin rights on your work desktop they can install the root certificate as trusted). The end result is because they have control over the corporate computers they can snoop on SSL traffic this way if they want to. It's not too common in my experience outside of large corporations, but it's also not uncommon. Next time take a look at who the certificate issuer is, if it's your company name then you know.
null
0
1316209328
False
0
c2kex8i
t3_khtwb
null
t1_c2kex8i
t1_c2ke2ns
null
1427609518
4
t5_2fwo
null
null
null
True
lusion
null
Straw man argument. That makes no sense. Your N doesn't represent anything meaningful. You can also loop over an N * M matrix with for i = 1..N, for j = 1..M. That does not make it a O(NM) algorithm. It is still O(N). You have to pick the right M and N. The total number of elements in the matrix is the N, not the rows or column.
null
0
1316209413
False
0
c2kexnf
t3_ki0wp
null
t1_c2kexnf
t1_c2kel5r
null
1428193860
-1
t5_2fwo
null
null
null
True
Cid_X
null
Do you have Lastpass installed?
null
0
1316209417
False
0
c2kexo0
t3_khtwb
null
t1_c2kexo0
t3_khtwb
null
1428193860
1
t5_2fwo
null
null
null
True
[deleted]
null
"[there are also unknown unknowns – the ones we don't know we don't know](http://en.wikipedia.org/wiki/There_are_known_knowns)"
null
0
1316209535
False
0
c2key85
t3_khtwb
null
t1_c2key85
t1_c2kds44
null
1427609532
3
t5_2fwo
null
null
null
True
7oby
null
[he didn't](http://www.reddit.com/r/programming/comments/khtwb/so_i_got_a_pregenerated_fedex_print_label_and/c2kec5u?context=4)
null
0
1316209555
False
0
c2keyb1
t3_khtwb
null
t1_c2keyb1
t1_c2ke6u8
null
1427609534
3
t5_2fwo
null
null
null
True
Giometrix
null
Here are the iso files. Its a free trial, then you need to buy a license. http://www.mydigitallife.info/download-windows-7-iso-official-32-bit-and-64-bit-direct-download-links/
null
0
1316209643
False
0
c2keypt
t3_khtuh
null
t1_c2keypt
t1_c2kdh42
null
1427609539
3
t5_2fwo
null
null
null
True
Giometrix
null
Here are the iso files. Its a free trial, then you need to buy a license. http://www.mydigitallife.info/download-windows-7-iso-official-32-bit-and-64-bit-direct-download-links/
null
0
1316209683
False
0
c2keytv
t3_khtuh
null
t1_c2keytv
t1_c2kdh42
null
1427609539
3
t5_2fwo
null
null
null
True
endangered_feces
null
Also server side logging makes URL username/passwords a horrible idea. I've worked in two different industries where such practice is banned and actively audited for because server and app logs are not usually treated in the same security minded way as say a database table of account credentials. Often logs are widely available to benefit debugging and support issues.
null
0
1316209694
False
0
c2keyv7
t3_khtwb
null
t1_c2keyv7
t1_c2kdk4p
null
1427609545
2
t5_2fwo
null
null
null
True
Sephr
null
The referrer is still going to be sent to HTTPS pages on other domains.
null
0
1316209731
False
0
c2kez57
t3_khtwb
null
t1_c2kez57
t1_c2kda57
null
1427609543
5
t5_2fwo
null
null
null
True
NoahFect
null
*It's a good password, because a random password implies that he's probably using a unique password for every site* Question: can anyone here remember the last time a security violation was determined to have relied on a brute force attack, of the sort that could have been thwarted by using a password with higher entropy?
null
0
1316209779
False
0
c2kezd5
t3_khtwb
null
t1_c2kezd5
t1_c2kehe4
null
1427609545
1
t5_2fwo
null
null
null
True
ravenex
null
I think it's not honest to call it reverse engineering. You had the code, it doesn't matter how hacky it was. It's there, it works, it's open for modification. Try reading the disassembly of a heavily optimized/inlined code, such as a video codec. If you read ffmpeg/libav commit logs, you'll see people fixing bugs in the decoders for various proprietary formats I haven't even heard of. ffmpeg allows users to decode them, and the library code is maintained. That's what people need, and I think ffmpeg succeeds at it's mission. As for the specification you wrote, I think it's a great potential contribution for the open source. I have yet to see OSS projects rejecting correct documentation contributions unless there are serious legal/copyright concerns.
null
0
1316209781
False
0
c2kezdi
t3_kgqdd
null
t1_c2kezdi
t1_c2kdzx4
null
1427609545
1
t5_2fwo
null
null
null
True
jaggederest
null
Only within the same domain. I'm pretty sure Fedex already knows your password. It's still bad policy, but HTTPS protects against a *lot* of this kind of stuff.
null
0
1316209787
True
0
c2kezej
t3_khtwb
null
t1_c2kezej
t1_c2keney
null
1427609546
14
t5_2fwo
null
null
null
True
Sephr
null
No, afaik all browsers send the `referer` header when navigating to an SSL page from an SSL page, regardless of hostname.
null
0
1316209806
False
0
c2kezhz
t3_khtwb
null
t1_c2kezhz
t1_c2kedeb
null
1427609547
3
t5_2fwo
null
null
null
True
blergh-
null
If the app doesn't respond to interactions instantly, it isn't fast enough. If you try to shoehorn a programmable text document description language (HTML with Javascript) into appearing to be a mobile phone gui, there is no way it is going to be as fast as native code, which is as fast as a user expects apps to be. I do not believe an API can be built that provides native look and feel on platforms that are as different as Android, iOS and Windows Phone. Sure you can create scrollbars and buttons that look right on all platforms, but how are you going to implement the tiles from Windows Phone 7 or the navigation bar from iOS? Native look and feel is about more than rounded text boxes. There's two directions you get: the one Flash took, which doesn't look native on any platform, and the one Java Swing took: it kind of looks native on most platforms, but you can only do what is possible on all platforms (least common denominator) and the behaviors are not correct on any platform. The difference in the number of web developers versus the number of iOS developers has a number of reasons: - Developing for the web, you can reach a lot more users (both desktop and mobile). Developing for iOS obviously you will only reach iOS users. - For developing on iOS you need a Mac, and for any kind of serious development an iOS device. That excludes a lot of people. - People have been doing web development for many years, many more than iOS ever existed. Is that an argument for doing web development instead of iOS, Android or Windows Phone? Perhaps. It's a lot easier to get started with web development, that's for sure. But however much time and effort you put into it, the result will never be as good as it could be with a native app.
null
0
1316209886
False
0
c2kezuv
t3_kg2sg
null
t1_c2kezuv
t1_c2kd95z
null
1427609551
1
t5_2fwo
null
null
null
True
rhtimsr1970
null
Can you post the steps you used so that others can try and reproduce it? I have two different Fedex accounts from which I can print labels - a corporate and a personal. One has the freight billing enabled as well. I printed several different labels. I then tried "reprint" from history and also logging in and out of that screen directly, thinking the URL params would persist. I do not see my username/password in the URL at any point. I also tried sending a label from one account to another to simulate the "pre-generated" part and print it on the other side. Still nothing. I'm having a hard time believing you.
null
0
1316209899
True
0
c2kezwm
t3_khtwb
null
t1_c2kezwm
t3_khtwb
null
1427609552
1
t5_2fwo
null
null
null
True
DasCheeze
null
This is not necessarily correct. If you have a list of strings, all of which have length=50 and you have a source string which is your search term of length=2, then the total maximum number of comparisons you could boil it down to would be (length of the list of strings)*2 because you would check input[0] == list[n][0] and input[1] == list[n][1]. If our two character length input string has a null terminator as it's second character, we're fine. Otherwise, we may have to check length. Regardless, we do not need to check every character of every string in our searchable list.
null
0
1316209908
False
0
c2kezye
t3_ki0wp
null
t1_c2kezye
t1_c2kexnf
null
1427609553
1
t5_2fwo
null
null
null
True
ladyofrage
null
And you just posted it to Reddit? Smart man.....
null
0
1316209914
False
0
c2kezz8
t3_khtwb
null
t1_c2kezz8
t3_khtwb
null
1427609553
2
t5_2fwo
null
null
null
True
MellonWedge
null
It's still ethics. You have a responsibility to consider the impact of your actions to a reasonable degree, a degree to which someone should have realized that displaying user information in plaintext in the URL is wrong.
null
0
1316209935
False
0
c2kf02t
t3_khtwb
null
t1_c2kf02t
t1_c2kd99h
null
1427609554
1
t5_2fwo
null
null
null
True
lusion
null
My point was that you have to go through all the characters of the strings when you hash them. That means if N is the total number of characters for all the strings in the list. Hashing them all is O(N). So for a one off list pre-hashing saves you no time. Of course if you need to make multiple lookups in the same list, hash tables, dictionaries or whatever will save you time. But for the sake of this discussion lets not consider those cases. It is obvious that they give O(K) if K is the length of the search string. Although I would typically say that it is O(1) emphasizing that what you are interested in knowing is how the computation time grows as you increase the size of the string list. Assuming the input string stays fixed.
null
0
1316210013
False
0
c2kf0g2
t3_ki0wp
null
t1_c2kf0g2
t1_c2kemwg
null
1427609559
1
t5_2fwo
null
null
null
True
gmartres
null
See [this comment](http://www.reddit.com/r/programming/comments/khf6j/13_year_old_set_new_record_for_the_continued/c2kbt2j) for a much saner and simpler reimplementation. Simply put: 1. term = 0 2. D = truncated decimal expansion of pi 3. I = truncate(D); R = D - I; 4. If I = 0, we can't continue the continued fraction, return ContinuedFraction. 5. ContinuedFraction[term] = I 6. D = 1/R 7. term++ 8. Goto 3 This works because: D = I + R = I + (1 / (1/R)) = I + (1 / (I' + R')) = I + (1 / (I' + (1 / (1/R')))) etc.
null
0
1316210083
False
0
c2kf0r4
t3_khf6j
null
t1_c2kf0r4
t1_c2kcwg5
null
1427609572
5
t5_2fwo
null
null
null
True
angrymonkeyz
null
I'm lazy, and would never in a million years do that. Ergo, incompetence.
null
0
1316210126
False
0
c2kf0xs
t3_khtwb
null
t1_c2kf0xs
t1_c2kdia6
null
1427609567
4
t5_2fwo
null
null
null
True
Solon1
null
The NetBSD and FreeBSD projects should merge. FreeBSD solved this problem already, and the weird hardware that NetBSD supports, isn't relevant. No one cares about ancient SGIs that have the processing power of a 486.
null
0
1316210139
False
0
c2kf101
t3_kejfs
null
t1_c2kf101
t1_c2jnczf
null
1427609570
-1
t5_2fwo
null
null
null
True
ngony
null
Yes, we already know that fed ex have messed up, my parent said that browser developers had too.
null
0
1316210140
False
0
c2kf10b
t3_khtwb
null
t1_c2kf10b
t1_c2kdhl8
null
1427609570
0
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316210197
False
0
c2kf19k
t3_khtwb
null
t1_c2kf19k
t1_c2kepq2
null
1427609573
9
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316210249
False
0
c2kf1i1
t3_khtwb
null
t1_c2kf1i1
t1_c2kdlxb
null
1427609575
1
t5_2fwo
null
null
null
True
ThrustVectoring
null
That's why you MITM on HTTP, and use that to dynamically replace HTTPS URLs in the HTTP pages they get. In some situations, it is effectively invisible.
null
0
1316210295
False
0
c2kf1pp
t3_khtwb
null
t1_c2kf1pp
t1_c2ke9bh
null
1427609588
2
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316210348
False
0
c2kf1yb
t3_khtwb
null
t1_c2kf1yb
t1_c2kdef6
null
1427609586
1
t5_2fwo
null
null
null
True
irontail
null
Hm, maybe it's someones else's package, and the poster was feeling especially malicious.
null
0
1316210375
False
0
c2kf22q
t3_khtwb
null
t1_c2kf22q
t1_c2kefov
null
1427609586
6
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316210383
False
0
c2kf24c
t3_khtwb
null
t1_c2kf24c
t1_c2keyb1
null
1427609588
-5
t5_2fwo
null
null
null
True
[deleted]
null
LOL, if I were trying to brute force a password, I'd take an english dictionary and try word combinations - three or four words - before starting with arbitrary letter/numeral/sign combinations. Dictionary attack: About ten thousand most common words, so it's ( 10^4 )^4 ~2^53 guesses to find your pw "correcthorsebatterystaple". The arbitrary letter/sign/numeral combination of length 11 needs 90^11 ~2^71 guesses to find your pw "s%+1H4_5&eF". ____ The other point about "hard to remember" has merit, though. If you follow xkcd's advice about just putting words together - use *unusual* words that won't be contained in small dictionaries.
null
0
1316210409
True
0
c2kf28k
t3_khtwb
null
t1_c2kf28k
t1_c2kcxkq
null
1427609588
0
t5_2fwo
null
null
null
True
contre
null
Any chance for Edit and Continue on x64? Looks like no. I am very disappointed.
null
0
1316210460
False
0
c2kf2h8
t3_khtuh
null
t1_c2kf2h8
t3_khtuh
null
1427609591
7
t5_2fwo
null
null
null
True
[deleted]
null
I'm still on my 46th time.
null
0
1316210463
False
0
c2kf2hq
t3_khtwb
null
t1_c2kf2hq
t1_c2kdiio
null
1427609591
12
t5_2fwo
null
null
null
True
Iceland_jack
null
What joke? All I see is `*** * *** *** hunter2*`.
null
0
1316210477
False
0
c2kf2k3
t3_khtwb
null
t1_c2kf2k3
t1_c2ke3me
null
1427609591
4
t5_2fwo
null
null
null
True
jasonofcompsci
null
At night!
null
0
1316210581
False
0
c2kf32e
t3_khtwb
null
t1_c2kf32e
t1_c2kdgi8
null
1427609596
3
t5_2fwo
null
null
null
True
SicilianEggplant
null
Technology Impaired Redditor Complains about plaintext login and password in URL, Posts unedited picture on website visited by millions.
null
0
1316210585
False
0
c2kf32g
t3_khtwb
null
t1_c2kf32g
t3_khtwb
null
1427609596
7
t5_2fwo
null
null
null
True
Bored
null
Should still not be seen, what if someone saw you computer screen?
null
0
1316210589
False
0
c2kf32w
t3_khtwb
null
t1_c2kf32w
t1_c2kczha
null
1427609596
3
t5_2fwo
null
null
null
True
lusion
null
Totally agree. That is the point the article tries to make as well. If we have a N*M number of chars being compared to K chars where K < M, then we get N*K comparisons. If K > M we get N * M comparisons. We never have more comparisons than the shortest string. But that means that the whole running time has an upper bound determined by the total number of characters in the string list. If that is N, then it naturally follows that O(N) is the upper bound.
null
0
1316210633
False
0
c2kf39w
t3_ki0wp
null
t1_c2kf39w
t1_c2kezye
null
1427609598
0
t5_2fwo
null
null
null
True
koft
null
It's hard to slog through all the extraneous bullshit in this article. Summary: Guy wastes two days tracing down simplistic issue.
null
0
1316210664
False
0
c2kf3fi
t3_khip6
null
t1_c2kf3fi
t3_khip6
null
1427609606
-9
t5_2fwo
null
null
null
True
Jasper1984
null
I hope most certificates are secure, but recently those from diginotar notably werent.
null
0
1316210676
False
0
c2kf3hw
t3_khtwb
null
t1_c2kf3hw
t1_c2kd894
null
1427609600
-1
t5_2fwo
null
null
null
True
KARMA_P0LICE
null
Back in highschool when i worked on the school web team, we had a kid writing a script for submitting emails to teachers. He was submitting it with a GET request, meaning when you hit submit your browser redirected to something like http://www.schoolname.com/teachers/email.php?Teacher=teachername&password=fh29KKJSC&message=the%20whole%20message%20 We tried to tell him that this was a privacy issue as well as being a stupid thing to do, so his solution was to run everything through some sort of encoding scheme. then our urls looked like: http://www.schoolname.com/teachers/email.php?content=BQJ/3+FQaAunqTWyy1k8nyPxTBE9zmp7dcmYVIg5izMWgyGocw0riM+kZacCVC8xDpKop0MgYSMgiG6Nfc2OtWMVXicXfBpKpwYT6+g6rY798jSmoJYOt99opFYxs06X36Rx+mz8hq/RaaASY+1p9vigoQui6oYTaodRTTp8L8=
null
0
1316210683
False
0
c2kf3ij
t3_khtwb
null
t1_c2kf3ij
t3_khtwb
null
1427609600
1
t5_2fwo
null
null
null
True
cb43569
null
Sure thing, then. It's still far more applicable in netsec than it is in programming, even if it's not worth posting in either.
null
0
1316210696
False
0
c2kf3ka
t3_khtwb
null
t1_c2kf3ka
t1_c2kf19k
null
1427609601
2
t5_2fwo
null
null
null
True
[deleted]
null
\#include<other posts on server logs, browser cache, man in the middle, yadda yadda yadda> Also, another concern is a local host proxy. Trojans can install themselves as a proxy so they can intercept traffic. They can also inject themselves directly into the operating system's network stack and capture packets over the network. Of course, a local proxy only works for http, not https, BUT Windows exposes all the HWND handles for processes, so it's possible for a trojan to grab a reference to the location bar and scrape the pixels for logging urls. The scrapped images can *easily* be OCR'd because it's a consistent font with a pixel perfect screen grab. And there can be trojans installed as browser plugins that can trap document loads and gain access to the location bar's text for manual perusing. And there are trojans installed on a host that can take screencaps every X seconds and upload them to a server. And the trojans could install evil certificates and dns host file entries into the browser so that a proxy could decode the encrypted SSL traffic on the fly and grab the HTTP GET and POST lines.
null
0
1316210709
True
0
c2kf3mi
t3_khtwb
null
t1_c2kf3mi
t1_c2kczdy
null
1427609601
0
t5_2fwo
null
null
null
True
curien
null
My entire work experience is in US government facilities, and we've been using Bluecoat proxies for years. They don't MITM SSL connections (not saying they *can't* do this, they're just not configured to), they just use the standard HTTP CONNECT verb to tunnel the encrypted connection through the proxy.
null
0
1316210761
False
0
c2kf3uc
t3_khtwb
null
t1_c2kf3uc
t1_c2keo15
null
1427609604
2
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316210823
False
0
c2kf45z
t3_khtwb
null
t1_c2kf45z
t3_khtwb
null
1427609608
1
t5_2fwo
null
null
null
True
[deleted]
null
The signature thing is (mostly) a scam. Here's to JS getting performant enough to handle all the (any) encryption so we can dump this shit for good.
null
0
1316210911
False
0
c2kf4j6
t3_kgqxt
null
t1_c2kf4j6
t3_kgqxt
null
1427609613
-1
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316210931
False
0
c2kf4m4
t3_khtwb
null
t1_c2kf4m4
t1_c2ke3me
null
1427609614
5
t5_2fwo
null
null
null
True
guninmouth
null
I laughed when I saw the same thing.
null
0
1316210956
False
0
c2kf4pz
t3_khtwb
null
t1_c2kf4pz
t1_c2kf32g
null
1427609616
1
t5_2fwo
null
null
null
True
[deleted]
null
Be right back, I'm gonna go log into somebody's Fedex for fun.
null
0
1316210962
False
0
c2kf4qt
t3_khtwb
null
t1_c2kf4qt
t3_khtwb
null
1427609616
2
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316210990
False
0
c2kf4uz
t3_khtwb
null
t1_c2kf4uz
t3_khtwb
null
1427609617
1
t5_2fwo
null
null
null
True
beerdeer
null
imma track the shit outta your packages
null
0
1316211027
False
0
c2kf512
t3_khtwb
null
t1_c2kf512
t3_khtwb
null
1427609627
2
t5_2fwo
null
null
null
True
yeswecould
null
> But mono is not a full implementation of .NET so if you wrote an application in .NET it would not run on a mac or linux. It's full implementation of ECMA standard as patent pledge is granted to only full implementations and or its supersets. Full .NET library that comes with Microsoft's implementation are not required. You wouldn't say GCC is incomplete implementation of C++ language because it can't compile and run MFC applications, while MSVC can, so Mono is complete implementation of C# even if it can't run for example WPF applications. > But you won't be able to run your monodroid app on your WP7 device or vice versa. That's understandable. However in larger apps business logic could be shared making C# advantageous over other languages. C++ could be shared between iOS and Android, although Android's support for C++ is even more more flaky than Apples'. Java works on only Android and Obejctive-C only on iOS. C# runs on all three. Again, you would have to rewrite UI for each OS, but core business logic could be shared. > why would any member of the MS DevDiv would use mono under any circumstances let alone love it. I just restated both reasons. They provide an indirect benefit to Microsoft by validating their platform.
null
0
1316211038
False
0
c2kf531
t3_kgl4f
null
t1_c2kf531
t1_c2ka4bj
null
1427609627
3
t5_2fwo
null
null
null
True
cdsmith
null
I didn't mean to necessarily disagree with that. But I did mean to point out that "Oh, that only costs about $80 million" puts you quite a few orders of magnitude off from the "Oh, I had a productive weekend on my open source project, and so I probably infringed a dozen patents" situation in computer software. And many other fields... electronics, business methods and finance, etc... look a lot more like the software patent picture than the pharma one. I completely agree that there are legitimate reasons to oppose pharma patents, but the issues at stake look different. That's all.
null
0
1316211042
False
0
c2kf53g
t3_khvyw
null
t1_c2kf53g
t1_c2keuzy
null
1427609627
13
t5_2fwo
null
null
null
True
SciK
null
tldr: it depends on what you call “N”.
null
0
1316211049
False
0
c2kf54f
t3_ki0wp
null
t1_c2kf54f
t3_ki0wp
null
1427609621
1
t5_2fwo
null
null
null
True
ScreamingGerman
null
GET BACK TO R/SOCCER
null
0
1316211112
False
0
c2kf5ek
t3_khtwb
null
t1_c2kf5ek
t1_c2kdoiq
null
1427609624
2
t5_2fwo
null
null
null
True
tootie
null
And it's possibly cached in a CDN. Default behavior for akamai is to cache all GETs.
null
0
1316211165
False
0
c2kf5na
t3_khtwb
null
t1_c2kf5na
t1_c2kdjhw
null
1428193858
-1
t5_2fwo
null
null
null
True
JeepTheBeep
null
Better than nothing... but not by much.
null
0
1316211216
False
0
c2kf5v2
t3_khtwb
null
t1_c2kf5v2
t1_c2kf3ij
null
1427609640
1
t5_2fwo
null
null
null
True
boost2525
null
> and calling the webmaster a tool while doing so! FYI that text is "too" with a double exclamation point, not "tool"
null
0
1316211272
False
0
c2kf64g
t3_khtwb
null
t1_c2kf64g
t1_c2kefov
null
1427609636
1
t5_2fwo
null
null
null
True
fripletister
null
Sure thing, Adolf.
null
0
1316211307
False
0
c2kf69i
t3_khtwb
null
t1_c2kf69i
t1_c2kf5ek
null
1427609639
1
t5_2fwo
null
null
null
True
lusion
null
What kind of refactoring does it offer that one can't do on xCode? I am interested in switching if there is a lot to gain in the refactoring area. And what about language? xCode differs in capability considerably between C++ and Objective-C.
null
0
1316211342
False
0
c2kf6ey
t3_khqu6
null
t1_c2kf6ey
t1_c2kd9gb
null
1428193858
3
t5_2fwo
null
null
null
True
[deleted]
null
D'oh
null
0
1316211477
False
0
c2kf6zs
t3_khtwb
null
t1_c2kf6zs
t1_c2kf64g
null
1427609652
2
t5_2fwo
null
null
null
True
AlyoshaV
null
>If someone stole your idea and made money off of it, then he probably did what your lazy ass couldnt. So think of another one. I FUCKING LOVE CORPORATIONS!!!!!!!!
null
0
1316211484
False
0
c2kf717
t3_khvyw
null
t1_c2kf717
t1_c2kdqy5
null
1427609652
0
t5_2fwo
null
null
null
True
cdemi
null
And you know that how?
null
0
1316211523
False
0
c2kf77u
t3_khtwb
null
t1_c2kf77u
t1_c2ke24c
null
1427609654
2
t5_2fwo
null
null
null
True
cortesoft
null
CDNs will not cache SSL requests, since only the end server sees the actual URL
null
0
1316211539
False
0
c2kf7af
t3_khtwb
null
t1_c2kf7af
t1_c2kf5na
null
1427609655
5
t5_2fwo
null
null
null
True
[deleted]
null
So what your saying is you have no clue how to answer my question? Do you feel cool using big words?
null
0
1316211644
False
0
c2kf7r4
t3_khf6j
null
t1_c2kf7r4
t1_c2kdciy
null
1427609659
1
t5_2fwo
null
null
null
True
TheContrarian2
null
How many others tried the logins?
null
0
1316211646
False
0
c2kf7sq
t3_khtwb
null
t1_c2kf7sq
t3_khtwb
null
1427609659
3
t5_2fwo
null
null
null
True
metamatic
null
> I read a lot of comments from Java developers like, "Keep the language pure [OO]." Like Java is pure OO to start with...
null
0
1316211684
False
0
c2kf7zc
t3_kf2xi
null
t1_c2kf7zc
t1_c2jsovr
null
1427609660
1
t5_2fwo
null
null
null
True
wOlfLisK
null
And so you post it on reddit where *everyone* can see it?
null
0
1316211730
False
0
c2kf878
t3_khtwb
null
t1_c2kf878
t3_khtwb
null
1427609662
2
t5_2fwo
null
null
null
True
[deleted]
null
[deleted]
null
0
1316211773
False
0
c2kf8ec
t3_khtwb
null
t1_c2kf8ec
t1_c2keney
null
1427609663
-1
t5_2fwo
null
null
null
True
TangledFireGarden
null
Does anyone know how big the actual download of VS11 for Win7 is? The download util says it will install 8.25 gig, but I can't imagine the download itself is that size. Normally I wouldn't worry so much, but I'm not at home and I don't want to blow through the bandwidth of this place.
null
0
1316211779
False
0
c2kf8f7
t3_khtuh
null
t1_c2kf8f7
t3_khtuh
null
1427609663
0
t5_2fwo
null
null
null
True
flargenhargen
null
I got a statement from my bank. It had my card number hidden except for the last 4 numbers. *** **** *** *** 1234 then, in big letters at the bottom of the page, it had the full card number printed out as "reference number"
null
0
1316211801
False
0
c2kf8im
t3_khtwb
null
t1_c2kf8im
t3_khtwb
null
1427609666
3
t5_2fwo
null
null
null
True
iLoveCuil
null
And then what?
null
0
1316211851
False
0
c2kf8r4
t3_khtwb
null
t1_c2kf8r4
t1_c2kf3ij
null
1427609669
1
t5_2fwo
null
null
null
True
ldpreload
null
It says that GET isn't a *safe* method, which means something completely unrelated in context to sensitive data.
null
0
1316211958
False
0
c2kf985
t3_khtwb
null
t1_c2kf985
t1_c2kdhl8
null
1427609682
1
t5_2fwo
null
null
null
True
Rotten194
null
Nothing wrong with Eclipse :|
null
0
1316212021
False
0
c2kf9iy
t3_kgq62
null
t1_c2kf9iy
t1_c2k920s
null
1427609679
1
t5_2fwo
null
null
null
True
pozorvlak
null
> I've seen people do repetitive tasks over and over every day that could be done with a 5 line script. I'm sure we've all seen the T-shirts that say "Go away, or I shall replace you with a very small shell script".
null
0
1316212023
False
0
c2kf9jl
t3_kgbzq
null
t1_c2kf9jl
t1_c2kbd08
null
1427609679
3
t5_2fwo
null
null
null
True
clarke187
null
at least its SSL
null
0
1316212047
False
0
c2kf9nl
t3_khtwb
null
t1_c2kf9nl
t3_khtwb
null
1428193855
1
t5_2fwo
null
null
null