

120·
10 months agoRight image, but under those each one below would also be wearing large pants covering each side of the subtree.
Right image, but under those each one below would also be wearing large pants covering each side of the subtree.
As someone who also has produced code that looks like random characters spewed onto a terminal while using fpdf, I feel this one.
It can still have issues with potential attacks that would redirect your client to a system outside of the VPN. It would prevent MitM but not complete replacement.
Likely you needed to include the intermediate cert chain. Let’s encrypt sets that up automatically so it’s quite a bit easier to get right.
The plastic and wire twist ties that come on cables would work too.
The underutilized post pre increment operator.
It can often improve performance and memory latency and usually only has a minor CPU performance impact as it trades cycles waiting for memory for cycles decompressing memory. It is usually decent even on low power embedded devices.
There are a few edge cases where ZRam is not great. If your data is already compressed or encrypted copying it around in memory is much more expensive. It’s also harder to tell exactly how much data can be loaded into the “free” memory. It’s also a bit slower for serialized memory access in large data sets if the compression ratio is low.