archived stringclasses 2
values | author stringlengths 3 20 | author_fullname stringlengths 4 12 ⌀ | body stringlengths 0 22.5k | comment_type stringclasses 1
value | controversiality stringclasses 2
values | created_utc stringlengths 10 10 | edited stringlengths 4 12 | gilded stringclasses 7
values | id stringlengths 1 7 | link_id stringlengths 7 10 | locked stringclasses 2
values | name stringlengths 4 10 ⌀ | parent_id stringlengths 5 10 | permalink stringlengths 41 91 ⌀ | retrieved_on stringlengths 10 10 ⌀ | score stringlengths 1 4 | subreddit_id stringclasses 1
value | subreddit_name_prefixed stringclasses 1
value | subreddit_type stringclasses 1
value | total_awards_received stringclasses 19
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
True | BeatLeJuce | null | Tnaks for the hint :) | null | 0 | 1316207663 | False | 0 | c2kep7f | t3_khryi | null | t1_c2kep7f | t1_c2kegfk | null | 1427609417 | 1 | t5_2fwo | null | null | null |
True | gmartres | null | > I've rewritten Neil's PiCF here: https://bitbucket.org/tarballs_are_good/lisp-random/src/50b56958f3ea/picf.lisp
Thanks for that I didn't feel like trying to understand his messy C# code, that's a rather neat algorithm, but I doubt it's really new. Hopefully Bill Gosper will introduce him to Lisp :p. | null | 0 | 1316207685 | False | 0 | c2kepba | t3_khf6j | null | t1_c2kepba | t1_c2kbt2j | null | 1427609420 | 3 | t5_2fwo | null | null | null |
True | cb43569 | null | Yeah, this really belongs in /r/netsec, I'm surprised it hasn't been said yet. | null | 0 | 1316207773 | False | 0 | c2kepq2 | t3_khtwb | null | t1_c2kepq2 | t1_c2ke7i6 | null | 1427609423 | 1 | t5_2fwo | null | null | null |
True | not_a_turtle | null | You best not have any other shipping companies in your wallet. | null | 0 | 1316207790 | False | 0 | c2keptd | t3_khtwb | null | t1_c2keptd | t1_c2kdgi8 | null | 1427609423 | 8 | t5_2fwo | null | null | null |
True | cb43569 | null | What the... what? | null | 0 | 1316207801 | False | 0 | c2kepv7 | t3_khtwb | null | t1_c2kepv7 | t1_c2kentt | null | 1427609424 | 5 | t5_2fwo | null | null | null |
True | bernlin2000 | null | And now you posted it on Reddit for all of us to see/copy...am I missing something? ಠ\_ಠ
| null | 0 | 1316207836 | False | 0 | c2keq0g | t3_khtwb | null | t1_c2keq0g | t3_khtwb | null | 1427609428 | 1 | t5_2fwo | null | null | null |
True | Dgc2002 | null | Actually he didn't change it, somebody else did. He actually showed us all his then current username and password and failed to change it.... | null | 0 | 1316207839 | False | 0 | c2keq12 | t3_khtwb | null | t1_c2keq12 | t1_c2kdz1h | null | 1427609428 | 2 | t5_2fwo | null | null | null |
True | babazka | null | The article discusses a computational complexity of a specific search algorithm. Obviously there may be better ways of solving the search problem, including hash tables and suffix trees, but that's not the point here. | null | 0 | 1316207882 | False | 0 | c2keq7w | t3_ki0wp | null | t1_c2keq7w | t1_c2kep0b | null | 1427609428 | 1 | t5_2fwo | null | null | null |
True | justguessmyusername | null | lol, yes. See, when YOU type hunter2, it shows to us as ******* | null | 0 | 1316207893 | False | 0 | c2keq9t | t3_khtwb | null | t1_c2keq9t | t1_c2kdci4 | null | 1427609428 | 2 | t5_2fwo | null | null | null |
True | tjhei | null | WTF. See [here](http://www.myspace.com/craziibeautiful6969): "Who I'd like to meet:". Also: Ronald is really sad. | null | 0 | 1316208009 | False | 0 | c2keqvg | t3_khtwb | null | t1_c2keqvg | t1_c2kentt | null | 1427609434 | 6 | t5_2fwo | null | null | null |
True | ErstwhileRockstar | null | > `@ImplementedBy(AImpl.class)`
> `interface A { public void a(); }`
I guess the DI aficionados have misunderstood interfaces. | null | 0 | 1316208151 | False | 0 | c2kerlh | t3_khpzu | null | t1_c2kerlh | t3_khpzu | null | 1427609443 | 0 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316208350 | False | 0 | c2kesl1 | t3_khf6j | null | t1_c2kesl1 | t1_c2kcz54 | null | 1428193862 | 2 | t5_2fwo | null | null | null |
True | AnomalyNexus | null | The browser history is a serious problem on public computers. Already had one of my accounts hacked because a site was doing that & I didn't notice it. | null | 0 | 1316208550 | False | 0 | c2ketgh | t3_khtwb | null | t1_c2ketgh | t1_c2kd894 | null | 1427609468 | 2 | t5_2fwo | null | null | null |
True | tbrownaw | null | > From my understanding it moved from "first to invent" to "first to file". Personally I think this is big business christmas. Notice it mentions Google and Apple are big supporters. Basically it lowers the chance of some company releasing something and having to worry that someone invented it first in their garage but hadn't either (1) patented it or (2) their patent wasn't first.
This reduces uncertainty. Once you file, you know *exactly* where you stand.
> I'm sure this will be followed by a new feature for fast tracking patents and it will be moved to a "first to be approved" where patents can be put on this track for the right price or through the political buddy network.
That would *increase* uncertainty. All the big companies would be against it for the same reasons that they're for the current change. | null | 0 | 1316208604 | False | 0 | c2ketpz | t3_khvyw | null | t1_c2ketpz | t1_c2kdmtn | null | 1427609475 | 8 | t5_2fwo | null | null | null |
True | God_Liver_Oil | null | how do you memorize a PW like that? | null | 0 | 1316208677 | False | 0 | c2keu2c | t3_khtwb | null | t1_c2keu2c | t3_khtwb | null | 1427609476 | -1 | t5_2fwo | null | null | null |
True | kolm | null | [However, the program does not draw a perfect circle, but rather a very round ellipse, which becomes rounder as 1/16 gets closer and closer to 0.](http://nbickford.wordpress.com/2011/04/03/the-minsky-circle-algorithm/) | null | 0 | 1316208823 | False | 0 | c2keut7 | t3_khf6j | null | t1_c2keut7 | t1_c2k9xjn | null | 1427609486 | 1 | t5_2fwo | null | null | null |
True | greyfade | null | > The cost of research and FDA approval is so high that no one creates new drugs without millions of dollars of investment anyway, so the costs are lower as a percentage of the industry.
The cost of research and FDA approval is actually so *low* (less than $80M for initial R&D, and even less than that for re-purposing drugs) that pharma companies typically recoup their costs very quickly. I would submit that even without patents, drugs would still be invented, possibly with a greater focus on efficacy, stability, and reduction in contraindications. | null | 0 | 1316208858 | False | 0 | c2keuzy | t3_khvyw | null | t1_c2keuzy | t1_c2ke7kh | null | 1427609495 | 3 | t5_2fwo | null | null | null |
True | [deleted] | null | How in the world do you remember that password? | null | 0 | 1316208865 | False | 0 | c2kev1a | t3_khtwb | null | t1_c2kev1a | t3_khtwb | null | 1427609495 | 1 | t5_2fwo | null | null | null |
True | piranha | null | The fact is that passwords get compromised, often due to plaintext storage. Password management tools may not be for everyone, but it's a good stop-gap measure until ("until"? as if) public-key authentication for online services becomes more prevalent.
But why do you think it's inherently unsafe? You could say that the compromise of your machine leads to the instant compromise of your passwords, and that is true. On the other hand, if an attacker compromises your machine, they could sniff your one password (or one of few passwords that you share between sites) over the course of a few days.
I have 691 passwords on file. My choice is to recycle passwords or remember 691 different passwords (or minor permutations of a password). The latter is not practical for me. | null | 0 | 1316208910 | False | 0 | c2kev8x | t3_khtwb | null | t1_c2kev8x | t1_c2kemp5 | null | 1427609492 | 1 | t5_2fwo | null | null | null |
True | SarahC | null | >which is much weaker than the first one.
Bollocks: 20 000^4 = 1.6 × 10^17 = 160,000,000,000,000,000
That is NOT weak - and that's even using a dictionary attack on only lowercase words! | null | 0 | 1316208917 | False | 0 | c2keva5 | t3_khtwb | null | t1_c2keva5 | t1_c2kdiwj | null | 1427609492 | 1 | t5_2fwo | null | null | null |
True | sbrown123 | null | >This reduces uncertainty. Once you file, you know exactly where you stand.
Unlikely since almost all current and past patent litigation was a patent holder enforcing their patent, not an inventor insisting they were first versus a patent holder. This removes the "prior art" defense to ensure patent holders can more easily enforce their patents is all.
>That would increase uncertainty.
Not if you have more money. | null | 0 | 1316209024 | True | 0 | c2kevsw | t3_khvyw | null | t1_c2kevsw | t1_c2ketpz | null | 1427609499 | 16 | t5_2fwo | null | null | null |
True | addmoreice | null | I didn't know that cleaning a gun that way would cause it to fire and kill the guy standing next to me. But don't worry, I work as a professional gun cleaner....
it's an ethics matter. if you do something for a living, you should understand the security, safety, legal, and financial concerns related to that business. That's a basic ethical requirement. | null | 0 | 1316209032 | False | 0 | c2kevue | t3_khtwb | null | t1_c2kevue | t1_c2kd99h | null | 1427609499 | 1 | t5_2fwo | null | null | null |
True | babazka | null | GUI is nice, but it should be said that *cProfile* is a standard profiling module, and you can review data collected by the profiler from Python interactive console, using another standard module -- *pstats*. No external tools needed. More information is [here](http://docs.python.org/library/profile.html). | null | 0 | 1316209116 | False | 0 | c2kew8y | t3_khv0w | null | t1_c2kew8y | t3_khv0w | null | 1427609506 | 10 | t5_2fwo | null | null | null |
True | Raven256 | null | "Where can I get a free and legal copy of Windows to test it out?"
Windows 8: http://msdn.microsoft.com/en-us/windows/apps/br229516
Server 2008 R2: http://www.microsoft.com/en-us/server-cloud/windows-server/2008-r2-trial.aspx | null | 0 | 1316209163 | False | 0 | c2kewg1 | t3_khtuh | null | t1_c2kewg1 | t1_c2kdh42 | null | 1427609508 | 16 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316209275 | False | 0 | c2kewzb | t3_khtwb | null | t1_c2kewzb | t1_c2kec5u | null | 1427609515 | 1 | t5_2fwo | null | null | null |
True | n00bSailboat | null | It's common for IT to publish a trusted root certificate internally to the company, they can then have the proxy provide certs issued by them, but trusted by your browser (because they have admin rights on your work desktop they can install the root certificate as trusted).
The end result is because they have control over the corporate computers they can snoop on SSL traffic this way if they want to. It's not too common in my experience outside of large corporations, but it's also not uncommon.
Next time take a look at who the certificate issuer is, if it's your company name then you know. | null | 0 | 1316209328 | False | 0 | c2kex8i | t3_khtwb | null | t1_c2kex8i | t1_c2ke2ns | null | 1427609518 | 4 | t5_2fwo | null | null | null |
True | lusion | null | Straw man argument. That makes no sense. Your N doesn't represent anything meaningful. You can also loop over an N * M matrix with for i = 1..N, for j = 1..M. That does not make it a O(NM) algorithm. It is still O(N). You have to pick the right M and N. The total number of elements in the matrix is the N, not the rows or column. | null | 0 | 1316209413 | False | 0 | c2kexnf | t3_ki0wp | null | t1_c2kexnf | t1_c2kel5r | null | 1428193860 | -1 | t5_2fwo | null | null | null |
True | Cid_X | null | Do you have Lastpass installed? | null | 0 | 1316209417 | False | 0 | c2kexo0 | t3_khtwb | null | t1_c2kexo0 | t3_khtwb | null | 1428193860 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | "[there are also unknown unknowns – the ones we don't know we don't know](http://en.wikipedia.org/wiki/There_are_known_knowns)" | null | 0 | 1316209535 | False | 0 | c2key85 | t3_khtwb | null | t1_c2key85 | t1_c2kds44 | null | 1427609532 | 3 | t5_2fwo | null | null | null |
True | 7oby | null | [he didn't](http://www.reddit.com/r/programming/comments/khtwb/so_i_got_a_pregenerated_fedex_print_label_and/c2kec5u?context=4) | null | 0 | 1316209555 | False | 0 | c2keyb1 | t3_khtwb | null | t1_c2keyb1 | t1_c2ke6u8 | null | 1427609534 | 3 | t5_2fwo | null | null | null |
True | Giometrix | null | Here are the iso files. Its a free trial, then you need to buy a license. http://www.mydigitallife.info/download-windows-7-iso-official-32-bit-and-64-bit-direct-download-links/ | null | 0 | 1316209643 | False | 0 | c2keypt | t3_khtuh | null | t1_c2keypt | t1_c2kdh42 | null | 1427609539 | 3 | t5_2fwo | null | null | null |
True | Giometrix | null | Here are the iso files. Its a free trial, then you need to buy a license. http://www.mydigitallife.info/download-windows-7-iso-official-32-bit-and-64-bit-direct-download-links/ | null | 0 | 1316209683 | False | 0 | c2keytv | t3_khtuh | null | t1_c2keytv | t1_c2kdh42 | null | 1427609539 | 3 | t5_2fwo | null | null | null |
True | endangered_feces | null | Also server side logging makes URL username/passwords a horrible idea. I've worked in two different industries where such practice is banned and actively audited for because server and app logs are not usually treated in the same security minded way as say a database table of account credentials. Often logs are widely available to benefit debugging and support issues. | null | 0 | 1316209694 | False | 0 | c2keyv7 | t3_khtwb | null | t1_c2keyv7 | t1_c2kdk4p | null | 1427609545 | 2 | t5_2fwo | null | null | null |
True | Sephr | null | The referrer is still going to be sent to HTTPS pages on other domains. | null | 0 | 1316209731 | False | 0 | c2kez57 | t3_khtwb | null | t1_c2kez57 | t1_c2kda57 | null | 1427609543 | 5 | t5_2fwo | null | null | null |
True | NoahFect | null | *It's a good password, because a random password implies that he's probably using a unique password for every site*
Question: can anyone here remember the last time a security violation was determined to have relied on a brute force attack, of the sort that could have been thwarted by using a password with higher entropy? | null | 0 | 1316209779 | False | 0 | c2kezd5 | t3_khtwb | null | t1_c2kezd5 | t1_c2kehe4 | null | 1427609545 | 1 | t5_2fwo | null | null | null |
True | ravenex | null | I think it's not honest to call it reverse engineering. You had the code, it doesn't matter how hacky it was. It's there, it works, it's open for modification. Try reading the disassembly of a heavily optimized/inlined code, such as a video codec.
If you read ffmpeg/libav commit logs, you'll see people fixing bugs in the decoders for various proprietary formats I haven't even heard of. ffmpeg allows users to decode them, and the library code is maintained. That's what people need, and I think ffmpeg succeeds at it's mission. As for the specification you wrote, I think it's a great potential contribution for the open source. I have yet to see OSS projects rejecting correct documentation contributions unless there are serious legal/copyright concerns. | null | 0 | 1316209781 | False | 0 | c2kezdi | t3_kgqdd | null | t1_c2kezdi | t1_c2kdzx4 | null | 1427609545 | 1 | t5_2fwo | null | null | null |
True | jaggederest | null | Only within the same domain. I'm pretty sure Fedex already knows your password. It's still bad policy, but HTTPS protects against a *lot* of this kind of stuff. | null | 0 | 1316209787 | True | 0 | c2kezej | t3_khtwb | null | t1_c2kezej | t1_c2keney | null | 1427609546 | 14 | t5_2fwo | null | null | null |
True | Sephr | null | No, afaik all browsers send the `referer` header when navigating to an SSL page from an SSL page, regardless of hostname. | null | 0 | 1316209806 | False | 0 | c2kezhz | t3_khtwb | null | t1_c2kezhz | t1_c2kedeb | null | 1427609547 | 3 | t5_2fwo | null | null | null |
True | blergh- | null | If the app doesn't respond to interactions instantly, it isn't fast enough. If you try to shoehorn a programmable text document description language (HTML with Javascript) into appearing to be a mobile phone gui, there is no way it is going to be as fast as native code, which is as fast as a user expects apps to be.
I do not believe an API can be built that provides native look and feel on platforms that are as different as Android, iOS and Windows Phone. Sure you can create scrollbars and buttons that look right on all platforms, but how are you going to implement the tiles from Windows Phone 7 or the navigation bar from iOS? Native look and feel is about more than rounded text boxes. There's two directions you get: the one Flash took, which doesn't look native on any platform, and the one Java Swing took: it kind of looks native on most platforms, but you can only do what is possible on all platforms (least common denominator) and the behaviors are not correct on any platform.
The difference in the number of web developers versus the number of iOS developers has a number of reasons:
- Developing for the web, you can reach a lot more users (both desktop and mobile). Developing for iOS obviously you will only reach iOS users.
- For developing on iOS you need a Mac, and for any kind of serious development an iOS device. That excludes a lot of people.
- People have been doing web development for many years, many more than iOS ever existed.
Is that an argument for doing web development instead of iOS, Android or Windows Phone? Perhaps. It's a lot easier to get started with web development, that's for sure. But however much time and effort you put into it, the result will never be as good as it could be with a native app. | null | 0 | 1316209886 | False | 0 | c2kezuv | t3_kg2sg | null | t1_c2kezuv | t1_c2kd95z | null | 1427609551 | 1 | t5_2fwo | null | null | null |
True | rhtimsr1970 | null | Can you post the steps you used so that others can try and reproduce it?
I have two different Fedex accounts from which I can print labels - a corporate and a personal. One has the freight billing enabled as well.
I printed several different labels. I then tried "reprint" from history and also logging in and out of that screen directly, thinking the URL params would persist. I do not see my username/password in the URL at any point.
I also tried sending a label from one account to another to simulate the "pre-generated" part and print it on the other side. Still nothing.
I'm having a hard time believing you.
| null | 0 | 1316209899 | True | 0 | c2kezwm | t3_khtwb | null | t1_c2kezwm | t3_khtwb | null | 1427609552 | 1 | t5_2fwo | null | null | null |
True | DasCheeze | null | This is not necessarily correct.
If you have a list of strings, all of which have length=50 and you have a source string which is your search term of length=2, then the total maximum number of comparisons you could boil it down to would be (length of the list of strings)*2 because you would check input[0] == list[n][0] and input[1] == list[n][1].
If our two character length input string has a null terminator as it's second character, we're fine. Otherwise, we may have to check length. Regardless, we do not need to check every character of every string in our searchable list. | null | 0 | 1316209908 | False | 0 | c2kezye | t3_ki0wp | null | t1_c2kezye | t1_c2kexnf | null | 1427609553 | 1 | t5_2fwo | null | null | null |
True | ladyofrage | null | And you just posted it to Reddit? Smart man..... | null | 0 | 1316209914 | False | 0 | c2kezz8 | t3_khtwb | null | t1_c2kezz8 | t3_khtwb | null | 1427609553 | 2 | t5_2fwo | null | null | null |
True | MellonWedge | null | It's still ethics. You have a responsibility to consider the impact of your actions to a reasonable degree, a degree to which someone should have realized that displaying user information in plaintext in the URL is wrong. | null | 0 | 1316209935 | False | 0 | c2kf02t | t3_khtwb | null | t1_c2kf02t | t1_c2kd99h | null | 1427609554 | 1 | t5_2fwo | null | null | null |
True | lusion | null | My point was that you have to go through all the characters of the strings when you hash them. That means if N is the total number of characters for all the strings in the list. Hashing them all is O(N). So for a one off list pre-hashing saves you no time. Of course if you need to make multiple lookups in the same list, hash tables, dictionaries or whatever will save you time. But for the sake of this discussion lets not consider those cases. It is obvious that they give O(K) if K is the length of the search string.
Although I would typically say that it is O(1) emphasizing that what you are interested in knowing is how the computation time grows as you increase the size of the string list. Assuming the input string stays fixed. | null | 0 | 1316210013 | False | 0 | c2kf0g2 | t3_ki0wp | null | t1_c2kf0g2 | t1_c2kemwg | null | 1427609559 | 1 | t5_2fwo | null | null | null |
True | gmartres | null | See [this comment](http://www.reddit.com/r/programming/comments/khf6j/13_year_old_set_new_record_for_the_continued/c2kbt2j) for a much saner and simpler reimplementation.
Simply put:
1. term = 0
2. D = truncated decimal expansion of pi
3. I = truncate(D); R = D - I;
4. If I = 0, we can't continue the continued fraction, return ContinuedFraction.
5. ContinuedFraction[term] = I
6. D = 1/R
7. term++
8. Goto 3
This works because:
D = I + R
= I + (1 / (1/R))
= I + (1 / (I' + R'))
= I + (1 / (I' + (1 / (1/R'))))
etc. | null | 0 | 1316210083 | False | 0 | c2kf0r4 | t3_khf6j | null | t1_c2kf0r4 | t1_c2kcwg5 | null | 1427609572 | 5 | t5_2fwo | null | null | null |
True | angrymonkeyz | null | I'm lazy, and would never in a million years do that. Ergo, incompetence. | null | 0 | 1316210126 | False | 0 | c2kf0xs | t3_khtwb | null | t1_c2kf0xs | t1_c2kdia6 | null | 1427609567 | 4 | t5_2fwo | null | null | null |
True | Solon1 | null | The NetBSD and FreeBSD projects should merge. FreeBSD solved this problem already, and the weird hardware that NetBSD supports, isn't relevant. No one cares about ancient SGIs that have the processing power of a 486. | null | 0 | 1316210139 | False | 0 | c2kf101 | t3_kejfs | null | t1_c2kf101 | t1_c2jnczf | null | 1427609570 | -1 | t5_2fwo | null | null | null |
True | ngony | null | Yes, we already know that fed ex have messed up, my parent said that browser developers had too. | null | 0 | 1316210140 | False | 0 | c2kf10b | t3_khtwb | null | t1_c2kf10b | t1_c2kdhl8 | null | 1427609570 | 0 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316210197 | False | 0 | c2kf19k | t3_khtwb | null | t1_c2kf19k | t1_c2kepq2 | null | 1427609573 | 9 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316210249 | False | 0 | c2kf1i1 | t3_khtwb | null | t1_c2kf1i1 | t1_c2kdlxb | null | 1427609575 | 1 | t5_2fwo | null | null | null |
True | ThrustVectoring | null | That's why you MITM on HTTP, and use that to dynamically replace HTTPS URLs in the HTTP pages they get. In some situations, it is effectively invisible. | null | 0 | 1316210295 | False | 0 | c2kf1pp | t3_khtwb | null | t1_c2kf1pp | t1_c2ke9bh | null | 1427609588 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316210348 | False | 0 | c2kf1yb | t3_khtwb | null | t1_c2kf1yb | t1_c2kdef6 | null | 1427609586 | 1 | t5_2fwo | null | null | null |
True | irontail | null | Hm, maybe it's someones else's package, and the poster was feeling especially malicious. | null | 0 | 1316210375 | False | 0 | c2kf22q | t3_khtwb | null | t1_c2kf22q | t1_c2kefov | null | 1427609586 | 6 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316210383 | False | 0 | c2kf24c | t3_khtwb | null | t1_c2kf24c | t1_c2keyb1 | null | 1427609588 | -5 | t5_2fwo | null | null | null |
True | [deleted] | null | LOL, if I were trying to brute force a password, I'd take an english dictionary and try word combinations - three or four words - before starting with arbitrary letter/numeral/sign combinations.
Dictionary attack: About ten thousand most common words, so it's ( 10^4 )^4 ~2^53 guesses to find your pw "correcthorsebatterystaple".
The arbitrary letter/sign/numeral combination of length 11 needs 90^11 ~2^71 guesses to find your pw "s%+1H4_5&eF".
____
The other point about "hard to remember" has merit, though. If you follow xkcd's advice about just putting words together - use *unusual* words that won't be contained in small dictionaries. | null | 0 | 1316210409 | True | 0 | c2kf28k | t3_khtwb | null | t1_c2kf28k | t1_c2kcxkq | null | 1427609588 | 0 | t5_2fwo | null | null | null |
True | contre | null | Any chance for Edit and Continue on x64? Looks like no. I am very disappointed. | null | 0 | 1316210460 | False | 0 | c2kf2h8 | t3_khtuh | null | t1_c2kf2h8 | t3_khtuh | null | 1427609591 | 7 | t5_2fwo | null | null | null |
True | [deleted] | null | I'm still on my 46th time. | null | 0 | 1316210463 | False | 0 | c2kf2hq | t3_khtwb | null | t1_c2kf2hq | t1_c2kdiio | null | 1427609591 | 12 | t5_2fwo | null | null | null |
True | Iceland_jack | null | What joke? All I see is `*** * *** *** hunter2*`. | null | 0 | 1316210477 | False | 0 | c2kf2k3 | t3_khtwb | null | t1_c2kf2k3 | t1_c2ke3me | null | 1427609591 | 4 | t5_2fwo | null | null | null |
True | jasonofcompsci | null | At night! | null | 0 | 1316210581 | False | 0 | c2kf32e | t3_khtwb | null | t1_c2kf32e | t1_c2kdgi8 | null | 1427609596 | 3 | t5_2fwo | null | null | null |
True | SicilianEggplant | null | Technology Impaired Redditor
Complains about plaintext login and password in URL,
Posts unedited picture on website visited by millions. | null | 0 | 1316210585 | False | 0 | c2kf32g | t3_khtwb | null | t1_c2kf32g | t3_khtwb | null | 1427609596 | 7 | t5_2fwo | null | null | null |
True | Bored | null | Should still not be seen, what if someone saw you computer screen? | null | 0 | 1316210589 | False | 0 | c2kf32w | t3_khtwb | null | t1_c2kf32w | t1_c2kczha | null | 1427609596 | 3 | t5_2fwo | null | null | null |
True | lusion | null | Totally agree. That is the point the article tries to make as well. If we have a N*M number of chars being compared to K chars where K < M, then we get N*K comparisons. If K > M we get N * M comparisons. We never have more comparisons than the shortest string. But that means that the whole running time has an upper bound determined by the total number of characters in the string list. If that is N, then it naturally follows that O(N) is the upper bound. | null | 0 | 1316210633 | False | 0 | c2kf39w | t3_ki0wp | null | t1_c2kf39w | t1_c2kezye | null | 1427609598 | 0 | t5_2fwo | null | null | null |
True | koft | null | It's hard to slog through all the extraneous bullshit in this article. Summary: Guy wastes two days tracing down simplistic issue. | null | 0 | 1316210664 | False | 0 | c2kf3fi | t3_khip6 | null | t1_c2kf3fi | t3_khip6 | null | 1427609606 | -9 | t5_2fwo | null | null | null |
True | Jasper1984 | null | I hope most certificates are secure, but recently those from diginotar notably werent. | null | 0 | 1316210676 | False | 0 | c2kf3hw | t3_khtwb | null | t1_c2kf3hw | t1_c2kd894 | null | 1427609600 | -1 | t5_2fwo | null | null | null |
True | KARMA_P0LICE | null | Back in highschool when i worked on the school web team, we had a kid writing a script for submitting emails to teachers. He was submitting it with a GET request, meaning when you hit submit your browser redirected to something like
http://www.schoolname.com/teachers/email.php?Teacher=teachername&password=fh29KKJSC&message=the%20whole%20message%20
We tried to tell him that this was a privacy issue as well as being a stupid thing to do, so his solution was to run everything through some sort of encoding scheme. then our urls looked like:
http://www.schoolname.com/teachers/email.php?content=BQJ/3+FQaAunqTWyy1k8nyPxTBE9zmp7dcmYVIg5izMWgyGocw0riM+kZacCVC8xDpKop0MgYSMgiG6Nfc2OtWMVXicXfBpKpwYT6+g6rY798jSmoJYOt99opFYxs06X36Rx+mz8hq/RaaASY+1p9vigoQui6oYTaodRTTp8L8= | null | 0 | 1316210683 | False | 0 | c2kf3ij | t3_khtwb | null | t1_c2kf3ij | t3_khtwb | null | 1427609600 | 1 | t5_2fwo | null | null | null |
True | cb43569 | null | Sure thing, then. It's still far more applicable in netsec than it is in programming, even if it's not worth posting in either. | null | 0 | 1316210696 | False | 0 | c2kf3ka | t3_khtwb | null | t1_c2kf3ka | t1_c2kf19k | null | 1427609601 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | \#include<other posts on server logs, browser cache, man in the middle, yadda yadda yadda>
Also, another concern is a local host proxy. Trojans can install themselves as a proxy so they can intercept traffic. They can also inject themselves directly into the operating system's network stack and capture packets over the network.
Of course, a local proxy only works for http, not https, BUT Windows exposes all the HWND handles for processes, so it's possible for a trojan to grab a reference to the location bar and scrape the pixels for logging urls. The scrapped images can *easily* be OCR'd because it's a consistent font with a pixel perfect screen grab.
And there can be trojans installed as browser plugins that can trap document loads and gain access to the location bar's text for manual perusing.
And there are trojans installed on a host that can take screencaps every X seconds and upload them to a server.
And the trojans could install evil certificates and dns host file entries into the browser so that a proxy could decode the encrypted SSL traffic on the fly and grab the HTTP GET and POST lines. | null | 0 | 1316210709 | True | 0 | c2kf3mi | t3_khtwb | null | t1_c2kf3mi | t1_c2kczdy | null | 1427609601 | 0 | t5_2fwo | null | null | null |
True | curien | null | My entire work experience is in US government facilities, and we've been using Bluecoat proxies for years. They don't MITM SSL connections (not saying they *can't* do this, they're just not configured to), they just use the standard HTTP CONNECT verb to tunnel the encrypted connection through the proxy. | null | 0 | 1316210761 | False | 0 | c2kf3uc | t3_khtwb | null | t1_c2kf3uc | t1_c2keo15 | null | 1427609604 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316210823 | False | 0 | c2kf45z | t3_khtwb | null | t1_c2kf45z | t3_khtwb | null | 1427609608 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | The signature thing is (mostly) a scam. Here's to JS getting performant enough to handle all the (any) encryption so we can dump this shit for good. | null | 0 | 1316210911 | False | 0 | c2kf4j6 | t3_kgqxt | null | t1_c2kf4j6 | t3_kgqxt | null | 1427609613 | -1 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316210931 | False | 0 | c2kf4m4 | t3_khtwb | null | t1_c2kf4m4 | t1_c2ke3me | null | 1427609614 | 5 | t5_2fwo | null | null | null |
True | guninmouth | null | I laughed when I saw the same thing. | null | 0 | 1316210956 | False | 0 | c2kf4pz | t3_khtwb | null | t1_c2kf4pz | t1_c2kf32g | null | 1427609616 | 1 | t5_2fwo | null | null | null |
True | [deleted] | null | Be right back, I'm gonna go log into somebody's Fedex for fun. | null | 0 | 1316210962 | False | 0 | c2kf4qt | t3_khtwb | null | t1_c2kf4qt | t3_khtwb | null | 1427609616 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316210990 | False | 0 | c2kf4uz | t3_khtwb | null | t1_c2kf4uz | t3_khtwb | null | 1427609617 | 1 | t5_2fwo | null | null | null |
True | beerdeer | null | imma track the shit outta your packages | null | 0 | 1316211027 | False | 0 | c2kf512 | t3_khtwb | null | t1_c2kf512 | t3_khtwb | null | 1427609627 | 2 | t5_2fwo | null | null | null |
True | yeswecould | null | > But mono is not a full implementation of .NET so if you wrote an application in .NET it would not run on a mac or linux.
It's full implementation of ECMA standard as patent pledge is granted to only full implementations and or its supersets. Full .NET library that comes with Microsoft's implementation are not required. You wouldn't say GCC is incomplete implementation of C++ language because it can't compile and run MFC applications, while MSVC can, so Mono is complete implementation of C# even if it can't run for example WPF applications.
> But you won't be able to run your monodroid app on your WP7 device or vice versa.
That's understandable. However in larger apps business logic could be shared making C# advantageous over other languages. C++ could be shared between iOS and Android, although Android's support for C++ is even more more flaky than Apples'. Java works on only Android and Obejctive-C only on iOS. C# runs on all three. Again, you would have to rewrite UI for each OS, but core business logic could be shared.
> why would any member of the MS DevDiv would use mono under any circumstances let alone love it.
I just restated both reasons. They provide an indirect benefit to Microsoft by validating their platform.
| null | 0 | 1316211038 | False | 0 | c2kf531 | t3_kgl4f | null | t1_c2kf531 | t1_c2ka4bj | null | 1427609627 | 3 | t5_2fwo | null | null | null |
True | cdsmith | null | I didn't mean to necessarily disagree with that. But I did mean to point out that "Oh, that only costs about $80 million" puts you quite a few orders of magnitude off from the "Oh, I had a productive weekend on my open source project, and so I probably infringed a dozen patents" situation in computer software. And many other fields... electronics, business methods and finance, etc... look a lot more like the software patent picture than the pharma one. I completely agree that there are legitimate reasons to oppose pharma patents, but the issues at stake look different. That's all. | null | 0 | 1316211042 | False | 0 | c2kf53g | t3_khvyw | null | t1_c2kf53g | t1_c2keuzy | null | 1427609627 | 13 | t5_2fwo | null | null | null |
True | SciK | null | tldr: it depends on what you call “N”. | null | 0 | 1316211049 | False | 0 | c2kf54f | t3_ki0wp | null | t1_c2kf54f | t3_ki0wp | null | 1427609621 | 1 | t5_2fwo | null | null | null |
True | ScreamingGerman | null | GET BACK TO R/SOCCER | null | 0 | 1316211112 | False | 0 | c2kf5ek | t3_khtwb | null | t1_c2kf5ek | t1_c2kdoiq | null | 1427609624 | 2 | t5_2fwo | null | null | null |
True | tootie | null | And it's possibly cached in a CDN. Default behavior for akamai is to cache all GETs. | null | 0 | 1316211165 | False | 0 | c2kf5na | t3_khtwb | null | t1_c2kf5na | t1_c2kdjhw | null | 1428193858 | -1 | t5_2fwo | null | null | null |
True | JeepTheBeep | null | Better than nothing... but not by much. | null | 0 | 1316211216 | False | 0 | c2kf5v2 | t3_khtwb | null | t1_c2kf5v2 | t1_c2kf3ij | null | 1427609640 | 1 | t5_2fwo | null | null | null |
True | boost2525 | null | > and calling the webmaster a tool while doing so!
FYI that text is "too" with a double exclamation point, not "tool" | null | 0 | 1316211272 | False | 0 | c2kf64g | t3_khtwb | null | t1_c2kf64g | t1_c2kefov | null | 1427609636 | 1 | t5_2fwo | null | null | null |
True | fripletister | null | Sure thing, Adolf. | null | 0 | 1316211307 | False | 0 | c2kf69i | t3_khtwb | null | t1_c2kf69i | t1_c2kf5ek | null | 1427609639 | 1 | t5_2fwo | null | null | null |
True | lusion | null | What kind of refactoring does it offer that one can't do on xCode? I am interested in switching if there is a lot to gain in the refactoring area. And what about language? xCode differs in capability considerably between C++ and Objective-C. | null | 0 | 1316211342 | False | 0 | c2kf6ey | t3_khqu6 | null | t1_c2kf6ey | t1_c2kd9gb | null | 1428193858 | 3 | t5_2fwo | null | null | null |
True | [deleted] | null | D'oh | null | 0 | 1316211477 | False | 0 | c2kf6zs | t3_khtwb | null | t1_c2kf6zs | t1_c2kf64g | null | 1427609652 | 2 | t5_2fwo | null | null | null |
True | AlyoshaV | null | >If someone stole your idea and made money off of it, then he probably did what your lazy ass couldnt. So think of another one.
I FUCKING LOVE CORPORATIONS!!!!!!!! | null | 0 | 1316211484 | False | 0 | c2kf717 | t3_khvyw | null | t1_c2kf717 | t1_c2kdqy5 | null | 1427609652 | 0 | t5_2fwo | null | null | null |
True | cdemi | null | And you know that how? | null | 0 | 1316211523 | False | 0 | c2kf77u | t3_khtwb | null | t1_c2kf77u | t1_c2ke24c | null | 1427609654 | 2 | t5_2fwo | null | null | null |
True | cortesoft | null | CDNs will not cache SSL requests, since only the end server sees the actual URL | null | 0 | 1316211539 | False | 0 | c2kf7af | t3_khtwb | null | t1_c2kf7af | t1_c2kf5na | null | 1427609655 | 5 | t5_2fwo | null | null | null |
True | [deleted] | null | So what your saying is you have no clue how to answer my question? Do you feel cool using big words? | null | 0 | 1316211644 | False | 0 | c2kf7r4 | t3_khf6j | null | t1_c2kf7r4 | t1_c2kdciy | null | 1427609659 | 1 | t5_2fwo | null | null | null |
True | TheContrarian2 | null | How many others tried the logins? | null | 0 | 1316211646 | False | 0 | c2kf7sq | t3_khtwb | null | t1_c2kf7sq | t3_khtwb | null | 1427609659 | 3 | t5_2fwo | null | null | null |
True | metamatic | null | > I read a lot of comments from Java developers like, "Keep the language pure [OO]."
Like Java is pure OO to start with... | null | 0 | 1316211684 | False | 0 | c2kf7zc | t3_kf2xi | null | t1_c2kf7zc | t1_c2jsovr | null | 1427609660 | 1 | t5_2fwo | null | null | null |
True | wOlfLisK | null | And so you post it on reddit where *everyone* can see it? | null | 0 | 1316211730 | False | 0 | c2kf878 | t3_khtwb | null | t1_c2kf878 | t3_khtwb | null | 1427609662 | 2 | t5_2fwo | null | null | null |
True | [deleted] | null | [deleted] | null | 0 | 1316211773 | False | 0 | c2kf8ec | t3_khtwb | null | t1_c2kf8ec | t1_c2keney | null | 1427609663 | -1 | t5_2fwo | null | null | null |
True | TangledFireGarden | null | Does anyone know how big the actual download of VS11 for Win7 is? The download util says it will install 8.25 gig, but I can't imagine the download itself is that size. Normally I wouldn't worry so much, but I'm not at home and I don't want to blow through the bandwidth of this place. | null | 0 | 1316211779 | False | 0 | c2kf8f7 | t3_khtuh | null | t1_c2kf8f7 | t3_khtuh | null | 1427609663 | 0 | t5_2fwo | null | null | null |
True | flargenhargen | null | I got a statement from my bank. It had my card number hidden except for the last 4 numbers. *** **** *** *** 1234
then, in big letters at the bottom of the page, it had the full card number printed out as "reference number"
| null | 0 | 1316211801 | False | 0 | c2kf8im | t3_khtwb | null | t1_c2kf8im | t3_khtwb | null | 1427609666 | 3 | t5_2fwo | null | null | null |
True | iLoveCuil | null | And then what? | null | 0 | 1316211851 | False | 0 | c2kf8r4 | t3_khtwb | null | t1_c2kf8r4 | t1_c2kf3ij | null | 1427609669 | 1 | t5_2fwo | null | null | null |
True | ldpreload | null | It says that GET isn't a *safe* method, which means something completely unrelated in context to sensitive data. | null | 0 | 1316211958 | False | 0 | c2kf985 | t3_khtwb | null | t1_c2kf985 | t1_c2kdhl8 | null | 1427609682 | 1 | t5_2fwo | null | null | null |
True | Rotten194 | null | Nothing wrong with Eclipse :| | null | 0 | 1316212021 | False | 0 | c2kf9iy | t3_kgq62 | null | t1_c2kf9iy | t1_c2k920s | null | 1427609679 | 1 | t5_2fwo | null | null | null |
True | pozorvlak | null | > I've seen people do repetitive tasks over and over every day that could be done with a 5 line script.
I'm sure we've all seen the T-shirts that say "Go away, or I shall replace you with a very small shell script". | null | 0 | 1316212023 | False | 0 | c2kf9jl | t3_kgbzq | null | t1_c2kf9jl | t1_c2kbd08 | null | 1427609679 | 3 | t5_2fwo | null | null | null |
True | clarke187 | null | at least its SSL | null | 0 | 1316212047 | False | 0 | c2kf9nl | t3_khtwb | null | t1_c2kf9nl | t3_khtwb | null | 1428193855 | 1 | t5_2fwo | null | null | null |
Subsets and Splits
Filtered Reddit Uplifting News
The query retrieves specific news articles by their link IDs, providing a basic overview of those particular entries without deeper analysis or insights.
Recent Programming Comments
Returns a limited set of programming records from 2020 to 2023, providing basic filtering with minimal analytical value.