Pfft. Real programmers use butterflies
Melllvar
Seer of the tapes! Knower of the episodes!
- 0 Posts
- 29 Comments
Melllvar@startrek.websiteto
Programmer Humor@programming.dev•STOP DOING COMPUTER SCIENCEEnglish
191·9 months agoA standard reference model in 3d modeling.
Melllvar@startrek.websiteto
Technology@beehaw.org•TikTok set to be banned in the US after losing appealEnglish
1·1 year agoFrom a national security standpoint of the government, it absolutely does matter who has the data.
Melllvar@startrek.websiteto
Selfhosted@lemmy.world•ICANN approves use of .internal domain for your networkEnglish
8·1 year agoThe value of the DNS is that we all use the same one. You can declare independence, but you’d lose out on that value.
Melllvar@startrek.websiteto
Programmer Humor@programming.dev•It's Friday at 5pm. You're all set to go home and relax then your monitoring dashboard goes like this....English
8·2 years agoFor some reason this specific graphic has always been one of my favorite parts of this movie.
Edit: I love the internet sometimes https://www.youtube.com/watch?v=94jIQm0YcCs
Melllvar@startrek.websiteto
cybersecurity@infosec.pub•Has ethernet become illegitimate? A librarian flipped out after spotting me using ethernetEnglish
74·2 years agoDoes the library provide ethernet jacks for patrons to use? If not then I can understand why a librarian would be surprised.
Melllvar@startrek.websiteto
Technology@beehaw.org•Biden signs TikTok “ban” bill into law, starting the clock for ByteDance to divest itEnglish
2·2 years agoThat’s the opposite of what the court said.
Melllvar@startrek.websiteto
Technology@beehaw.org•Biden signs TikTok “ban” bill into law, starting the clock for ByteDance to divest itEnglish
6·2 years agoWell, no. The courts struck down Trump’s Tiktok ban because he used an executive order that overstepped his authority.
Melllvar@startrek.websiteto
Technology@beehaw.org•Biden signs TikTok “ban” bill into law, starting the clock for ByteDance to divest itEnglish
10·2 years agoTiktok has been a subject of national security concerns since at least 2020.
Melllvar@startrek.websiteto
Programmer Humor@programming.dev•Demand ad companies take security seriously first and maybe we'll talk.English
2·2 years agoInstall SponsorBlock.
Melllvar@startrek.websiteto
Programmer Humor@lemmy.ml•tar -vczfx123 ought to do itEnglish
7·2 years agoTo the boiler room of hell. Allll the way down.
You Linux users sure are a contentious people.
Melllvar@startrek.websiteto
Programmer Humor@lemmy.ml•Ahh...yes...new "code-free" frameworkEnglish
4·2 years agoFun fact: The Windows executable format is originally based on an old Unix executable format.
Melllvar@startrek.websiteto
Open Source@lemmy.ml•WhatsApp's interoperability agreement doesn't allow GNU (A|L)GPL licensesEnglish
52·2 years agoPartner represents and warrants that it shall not introduce into WhatsApp’s Systems or Infrastructure, the Sublicensed Encryption Software, or otherwise make accessible to WhatsApp any viruses
The technical definition of a “computer virus” is actually quite narrow, and true viruses are rare these days because they are passive and slow compared to more modern malware types.
A strict, literal reading of the text says that all other kinds of malware are acceptable.
Melllvar@startrek.websitetoReddit@lemmy.ml•Wait. Why is Reddit losing so much money?English
111·2 years agoThat’s enough money to fund a rogue nuclear weapons program. So, I hereby start the rumor that reddit is developing weapons of mass destruction.
E-mail is a lingua franca. It’s used not because it’s superior, but because you don’t have to worry about whether your recipient is using the right software setup to receive your message. It’s the lowest common denominator of internet messaging and can only be replaced in that role by a new lowest common denominator.
- A company that rejected basic email would necessarily be rejecting some percent of legitimate messages and/or increase their IT costs. While this doesn’t mean it’s impossible, it would be at least be a painful transition. Users will hate it.
- Adding PKI just amplifies the software setup problem because now you have to worry about primitive selection, centralized authorities, key lifecycle management, etc. And there’s no way for the sender and recipient to negotiate security parameters, so they have to be agreed on in advance, something basic email doesn’t need.
- PKI is too finicky and abstract for the average user to understand or care about. We can’t reasonably expect them to make good decisions about a subject that even professionals and large organizations struggle to understand. A big reason for email’s longevity and success is that the average user doesn’t need to understand it at any technical level.
Melllvar@startrek.websiteto
Programmer Humor@programming.dev•Programmer tries to explain binary search to the policeEnglish
1292·2 years agoPart of my job is to review security footage for reported incidents.
If there is a long-lasting visual cue that the event has or has not happened yet (e.g. a window is either broken or not), then a binary search is very useful.
If the event lasts only a moment and leaves no visual cue (e.g. an assault), then binary search is practically useless.


There is no such thing as an innocent billionaire.