

Hey to be fair I know several people who do know, but so poorly that they’ll still be defnitley grinding your gears lol.


Hey to be fair I know several people who do know, but so poorly that they’ll still be defnitley grinding your gears lol.


Define right wing because the last time I used that insult, it was against users spamming DNC propaganda lol


Ted Ts’o being awoken by the “next gen fs” devs screaming outside his house



sneak up into a dark street corner at night
“Ay you got that ed25519?”
Very critical. GNOME and KDE have two very different UX paradigms.
Usually people used to Windows opt for KDE, and Mac or older Ubuntu users opt for GNOME.
The thing is though, a golden standard DE can easily be setup to act as both. XFCE is so customizable that I’ve seen both DE types setup as UNIX like or Windows like workflow.
I’m not sure if KDE or GNOME can do the same because I’m pretty sure they focus on a target audience.
What are your issues with KDE exactly? I always hated GNOME’s lack of standard window buttons and handling multiple windows in a Mac like fashion. Also the app menu which gives me flashbacks of ChromeOS.


I tried protonmail not for the privacy purpose but just to have a normal web email client.
After wasting an hour before finding out you can’t disable the “sent from protonmail” footer without manually deleting it in each draft you make, I said screw it and deployed my own email server with stalwart lol.
It’s receive only because outgoing SMTP is a pain to make reliable these days and my ISP blocks outgoing SMTP anyway, but for everything else I now use Thunderbird.


Been on it permanently for years now. Only complaint is that I found XFS to be better than BTRFS, though most people probably wouldn’t notice.
Only other “complaint” is Fedora doesn’t have a lot of support for embedded arm devices, so you’re on your own if you want an RPM style distro on something like an Orange Pi.


If you want to ruin a concert’s day, change the thermostat a few clicks lol.


Funny thing is you can actually conduct pretty well with just your hand.
Also a good conductor is usually an astoundingly good player of multiple instruments themselves.
It’s kind of like how football (soccer) team managers are retired players that can still play better than the entire stadium wearing loafers and a suit.


Is this sarcasm about git/svn or are you serious?


Knowing full well this would be coming from a FAANG company, a funnier answer would be to replace the switch with the equivalent smarthome switch, and then spend the next 20 minutes explaining their uttery stupid network pathway from your phone, through the cloud, back to your device to turn on a lightbulb.
The superior mountain goat that’s actually a goat:

Stack Overflow was the antithesis of “Just say something wrong on the internet so that someone will correct you with the real answer” because none of the negative threads actually answered the question lol.


idk let’s ask yaml
wth is the point of a guest network if you have 443 blocked lmao.
Even my VPN port is 443 so it gets past basic port filtering because HTTPS is usually the only one allowed compared to other protocols.


“Man if we had the original source code, it’d be so much easier than reverse engineering this binary in Ghidra”
The source code in question:


This one is funny because it 100% still exists somewhere, but I haven’t had the chance to verify it again.
Okay so basically its a data recorder box (ex: brainbox) that connects to a bunch of industrial sensors and sends the data over the network with your preferred method.
Builtin firmware gives you an HTTP webui to login and configure the device, with a user # and password.
I think the user itself had a builtin default admin which was #0, which everyone uses since there wasn’t really much use for other users.
Anyway, I was looking at the small JS code for the webui and noticed it had an MD5 hashing code that was very detailed with comments. It carefully laid out each operation, and explained each step to generate a hash, and then even why hashes should be used for passwords.
Here’s the kicker: It was all client side JS, so the login page would take your password, hash it, and then send the hash over plaintext HTTP POST to the server, where it would be authenticated.
Meaning you could just mitm the connection to grab the hash, and then login with the hash.
I sat there for like 10 minutes looking at the request over and over again. Like someone was smart enough to think “hey let’s use password hashing to keep this secure” and then proceeded to use it in the compleltly wrong way. And not even part of like a challenge/handshake where the server gives you a token to hash with. Just straight up MD5(password).
It was so funny because there were like a hundred of these on a network, so getting a valid hash was laughably easy.
I never got to check if this was fixed in a newer firmware version.


One one hand, a superior ROM choice
On the other hand, subpar crappy Google hardware
Me flipping on reverse thrust and parking brake before touching the ground in FSX because I’m like 100 kts above the landing speed
The modern web is an insult to the idea of efficiency at practically every level.
You cannot convince me that isolation and sandboxing requires a fat 4Gb slice of RAM for a measly 4 tabs.