- 3 Posts
- 23 Comments
steventhedev@lemmy.worldto
Programmer Humor@programming.dev•Computer Science Courses that Don't Exist, But Should
8·3 months agoAn object is a poor man’s closure.
A closure is a poor man’s object.
These are two sides of the same coin, and both of them miss the point. You should be dealing with scale, and you should use a language that allows you to concisely describe how to compute large amounts of data easily. The best part is that once you start writing APL, you’ll feel like a wizard.
steventhedev@lemmy.worldto
Do-It-Yourself, Repairs and Fixes@lemmy.ml•Is it worth replacing original joysticks with hall effect ones?
3·4 months agoFrom experience, dont do this unless you have a very good desoldering setup. The joysticks have 14-16 pins and you need to be able to desolder every single one perfectly to get it off the board. Getting the new one on can be similarly difficult.
I have seen some custom tips for these but haven’t tried them yet.
If that hasn’t dissuaded you, then calibration itself is easy. Just connect it to a computer and go to the calibration website (it’s a GitHub page that does it all in JS).
steventhedev@lemmy.worldto
Programmer Humor@programming.dev• Want to piss off your IT department? Are your links not malicious looking enough? This tool is guaranteed to help with that!
65·5 months agothis could be better if it used subdomains to an evil extent - extract the main domain intended and use that:
google.com => google.phishy.pc-helper.xyz/whatever-bullshit-key-they-need
Bonus points if it works for any subdomain.
Extra bonus points for a subdomain that includes https and www (e.g. https.www.google.com.phishy.pc-helper.xyz)
steventhedev@lemmy.worldto
Lemmy Shitpost@lemmy.world•ngl im kinda here just waitin for it 🤣
11·5 months agoMy tractor thinks she’s sexy
It really turns it on…
steventhedev@lemmy.worldto
Android@lemmy.world•How does Play Protect exactly work?English
11·5 months agoSource: worked on something similar a long time ago
Likely hash based scanning like most virus scanners. It will have a set of signatures for various types of malware (keyloggers, local DNS servers, etc), and looks through the apk (which is just a zip file) for things it knows are bad like financial malware added to the app.
Their process for adding signatures to their database and how they label them is fully opaque and completely up to them, like any other antivirus company. So they could incorrectly label things intentionally and you’d have no way to know.
given your device is now compromised you should probably get a new one unless you trust android is able to fully remove the app. Because some financial malware will intercept 2fa sms from your bank.
steventhedev@lemmy.worldto
Programmer Humor@programming.dev•Context: Docker bypasses all UFW firewall rules
191·5 months agoYou’re forgetting the part where they had an option to disable this fuckery, and then proceeded to move it twice - exposing containers to everyone by default.
I had to clean up compromised services twice because of it.
Your readline config sucks because the default sucks.
Add this to your .inputrc:
"\e[A": history-search-backward "\e[B": history-search-forward
At this point, I’m half convinced these are intentional leaks as part of either disinformation campaigns, cover stories for other intelligence ops, or something like that.
It can’t possibly be that expecting a bunch of obsessed 19 year olds to keep something secret would be unreasonable.
According to starch cube theory, two pizzas stacked on top of each other is a cake, same as lasagna.
Clearly you didn’t take the axiom of choice. Because otherwise you could have chosen to not make that monstrosity
steventhedev@lemmy.worldto
Programmer Humor@programming.dev•Meeting Driven Development
28·8 months agoGoogle Docs is the worst IDE ever
steventhedev@lemmy.worldto
linuxmemes@lemmy.world•Conventions contain lots of Blahajs and UwU's
2·9 months agoBGP isnt just Turing complete, It’s Cthulhu complete
steventhedev@lemmy.worldto
linuxmemes@lemmy.world•Conventions contain lots of Blahajs and UwU's
6·9 months agoreal men write their code one bit at a time with a laser pointer and a fiber optic network cable
Or you could just use zig which is better at compiling C than C (the second it supports the espressif chips I’m never touching C again)
Squirrel vs snail - who wins?
The amount of ink that comes with an inkjet printer is tiny. So a new printer comes with 10mL of ink, and the refills are 35mL or more. You quite literally get what you pay for.
The other reason is that inkjet printers need to be used on a regular basis, or the ink can dry out. But manufacturers have handled this by having the printer drip out tiny bits of ink all the time, so it’s literally using the ink even when you aren’t using it.
For the vast majority of people, a cheap laser printer is the far better option. Unless you want to produce art prints, but at that point you’re looking at spending a ton of money anyways.
steventhedev@lemmy.worldto
iiiiiiitttttttttttt@programming.dev•Simple security testEnglish
2·9 months agoNo, he clearly wants to change it from ****** to *******.
For the record, a far more secure password would be ********, because it has a * in it which some websites require
steventhedev@lemmy.worldto
Selfhosted@lemmy.world•[Solved] Looking for ... inventory management, I guess?English
2·9 months agoI get very far by just keeping a set of folders for each piece of equipment in a git repo.
Pictures, etc, and sometimes the PDF manual if I bother.
The difficult part here is being consistent over time - making sure you mark down when you bought things, serial numbers, etc. a proper website/app will force you to do this, but there is flexibility in having whatever convention you like most







A Klingon bird of prey, or a romulan bird of prey?