Don’t worry, with those flower stuffs already in the bath, a few slices of cucumber won’t make much of a difference. Bringing a tablet into a bathtub was already a bad idea to begin with, so a submarining android was the expected outcome anyway.
Oh no, you!
- 16 Posts
- 801 Comments
neidu3@sh.itjust.worksto
Programmer Humor@programming.dev•Simple Optimization TrickEnglish
13·3 months agoChris Sawyer is an absolute legend
neidu3@sh.itjust.worksto
Technology@lemmy.zip•UK households could face VPN 'ban' after use skyrockets following Online Safety BillEnglish
1·4 months agoValid. There’s no practical way of implementing a blanket ban on VPN. Hell, I’ve set up a VPN tunnel to the UK that I use for work. I wish them the best of luck, while I grab my popcorn.
If a ban were to be implemented, there would be no way of enforcing it.
neidu3@sh.itjust.worksto
Programming@programming.dev•Ranking programming languages by energy efficiency (2021)English
54·4 months agoPython should be even further down - this list doesn’t account for the fact that you have to rewrite everything because “That’s not pythonic”.
Perl should be higher up because it let’s you just do the things with some weird smileys without jumping through hoops.
neidu3@sh.itjust.worksto
Buy European@feddit.uk•The new age verifying app for the EU will only accept Google Play integrity for Android, de-facto banning any aftermarket OS like GrapheneOSEnglish
591·4 months agoGovernment MANDATED Enshitification
neidu3@sh.itjust.worksto
Buy European@feddit.uk•Trump pushes for up to 20% minimum tariffs on European Union: FTEnglish
10·4 months agoBring it, bitch. We all know TACO.
Using Grok to develop Grok… This sounds like Model Collapse with extra steps.
Years ago, my mate and I stole one, took it into the forest, and used it as a grill during the summer. Which alignment does that make us?
I can still do this provided that the language is Perl. But the few cases when I actually have to do so are rare, and never in public.
neidu3@sh.itjust.worksto
Programmer Humor@programming.dev•Types of development illustratedEnglish
4·4 months agoYup. In addition to the above, “When I spend a Saturday evening adding a shitty perl hack to fix a critical system flaw in production”, it can be illustrated by a UN emergency food drop. It may be 99% rice, but it’ll keep you from starving and it’ll have to do for now.
neidu3@sh.itjust.worksto
Buy European@feddit.uk•Windows loses 400 million users as mobile, Linux, and Mac use growsEnglish
10·4 months agoDid that myself 6ish months ago. I didn’t even allow windows to boot, I went straight to the Mint install USB. I spent some time doing mint live just to check that there weren’t any hardware/warranty issues, and then I let the cleansing commence.
So.
Fucking.
Gratifying.
Just for the record: He’s not royalty
Doing some QA on these web handlers I wrote. Trying all sorts of stupid combinations just in case I forgot something: None of them should do anything unless the client presents a valid session cookie. And only a few combinations of header parameters are valid.
Not with that attitude you won’t
neidu3@sh.itjust.worksto
Programmer Humor@programming.dev•"Encrypted"? Yeah, right!English
1·5 months agoI don’t know.
Russian military anno 1939 encrypted
neidu3@sh.itjust.worksto
Technology@lemmy.zip•Researchers claim spoof-proof random number generator breakthroughEnglish
3·5 months agoNot that much of a fix. It’s mostly down to pedantry on my behalf.
My understanding is that:
/dev/random is blocking unless sufficient entropy is available.
/dev/urandom is non-blocking and will supply output anyway.So for security-critical stuff that might run in a low entropy state (such as during boot), you probably want to use /dev/random. But in 99% of the cases /dev/urandom is fine, and it won’t halt your program.
neidu3@sh.itjust.worksto
Technology@lemmy.zip•Researchers claim spoof-proof random number generator breakthroughEnglish
3·5 months agourandom*









My previous job needed this sign. The problem was that so many (thought they) needed access to various hardware for various reasons, that it was hard to enforce anything. Too often someone would come along and “You know what, this particular thing would work if I just connect this over here”.
Sure, things kept working, but as the company grew from an office of 10 people to 100 people, it ended up so messy that nobody could troubleshoot anything, and no diagrams or cable lists matched reality. And this server room was supporting remote field operations where downtime could cost millions per day.
It got to the point where my coworker and VP IT went over to the building manager and simply blocked ALL access. Nobodys card would work unless they really needed it and they’d be given an intro on proper rack hygiene. I joined around this time, and one of my first tasks was to help tear out almost everything and rewire it from scratch during a few days of scheduled downtime.
After cleanup was done there was a pile on the floor with several kilometers of leftover cabling. Most of the spaghetti had been replaced by proper use of VLANs, and this way it was easy to let Server A talk to Toaster B by just remotely opening a route between the two instead of adding another cable.
That room wasn’t really part of my job, as I mostly dealt with field hardware. But I had a router stack there that was mine, so I got to keep my access. Rarely needed it, though.
Funny thing is, about a year later the company moved to a different building. When moving was close to finished and our lease was officially out, my card somehow still worked. So VP IT needed me to let him in the day we tore out the final bit of hardware.
My guess is that it was down to the fact that my access card needs didn’t really fit any of the standard “profiles” in that I needed access to the server room, the manufacturing lab, and storage, but not the usual stuff such as cantina and most of the office floors. I mostly worked from home or in the field.