- 49 Posts
- 567 Comments
steventhedevto
Programmer Humor@programming.dev•Computer Science Courses that Don't Exist, But Should
8·2 个月前An object is a poor man’s closure.
A closure is a poor man’s object.
These are two sides of the same coin, and both of them miss the point. You should be dealing with scale, and you should use a language that allows you to concisely describe how to compute large amounts of data easily. The best part is that once you start writing APL, you’ll feel like a wizard.
steventhedevto
Do-It-Yourself, Repairs and Fixes@lemmy.ml•Is it worth replacing original joysticks with hall effect ones?
3·2 个月前From experience, dont do this unless you have a very good desoldering setup. The joysticks have 14-16 pins and you need to be able to desolder every single one perfectly to get it off the board. Getting the new one on can be similarly difficult.
I have seen some custom tips for these but haven’t tried them yet.
If that hasn’t dissuaded you, then calibration itself is easy. Just connect it to a computer and go to the calibration website (it’s a GitHub page that does it all in JS).
steventhedevto
Programmer Humor@programming.dev• Want to piss off your IT department? Are your links not malicious looking enough? This tool is guaranteed to help with that!
65·3 个月前this could be better if it used subdomains to an evil extent - extract the main domain intended and use that:
google.com => google.phishy.pc-helper.xyz/whatever-bullshit-key-they-need
Bonus points if it works for any subdomain.
Extra bonus points for a subdomain that includes https and www (e.g. https.www.google.com.phishy.pc-helper.xyz)
My tractor thinks she’s sexy
It really turns it on…
Source: worked on something similar a long time ago
Likely hash based scanning like most virus scanners. It will have a set of signatures for various types of malware (keyloggers, local DNS servers, etc), and looks through the apk (which is just a zip file) for things it knows are bad like financial malware added to the app.
Their process for adding signatures to their database and how they label them is fully opaque and completely up to them, like any other antivirus company. So they could incorrectly label things intentionally and you’d have no way to know.
given your device is now compromised you should probably get a new one unless you trust android is able to fully remove the app. Because some financial malware will intercept 2fa sms from your bank.
steventhedevto
Programmer Humor@programming.dev•Context: Docker bypasses all UFW firewall rules
191·4 个月前You’re forgetting the part where they had an option to disable this fuckery, and then proceeded to move it twice - exposing containers to everyone by default.
I had to clean up compromised services twice because of it.
Your readline config sucks because the default sucks.
Add this to your .inputrc:
"\e[A": history-search-backward "\e[B": history-search-forward
At this point, I’m half convinced these are intentional leaks as part of either disinformation campaigns, cover stories for other intelligence ops, or something like that.
It can’t possibly be that expecting a bunch of obsessed 19 year olds to keep something secret would be unreasonable.
Calm down niggle, you have somewhere to go in the morning
According to starch cube theory, two pizzas stacked on top of each other is a cake, same as lasagna.
Clearly you didn’t take the axiom of choice. Because otherwise you could have chosen to not make that monstrosity
Google Docs is the worst IDE ever
BGP isnt just Turing complete, It’s Cthulhu complete
real men write their code one bit at a time with a laser pointer and a fiber optic network cable
Or you could just use zig which is better at compiling C than C (the second it supports the espressif chips I’m never touching C again)
For a slightly more gamified one, Zachtronics has KOHCTPYKTOP



























Crab Rangoon begs to differ, but that is an extreme example