[-] dbx12@programming.dev 15 points 2 weeks ago

Ironically, /usr already stands for "user shared resources"

[-] dbx12@programming.dev 16 points 4 months ago

It usually says this on the label, at least in my country it has a phrase like "Store refrigerated after opening and consume within a few days".

If it has no instructions or you are unsure, I'd default to yes, put them in the fridge after opening.

[-] dbx12@programming.dev 24 points 5 months ago

It's even worse. If done correctly, the length of the password does not affect the size of the stored value. Because if you're doing it right, you only save the hash of the password. And the length of the hash is fixed.

[-] dbx12@programming.dev 20 points 6 months ago

Ah, the horcrux technique.

[-] dbx12@programming.dev 18 points 9 months ago

Thanks to Spider-Man: Far from home, I knew of the glass floor decks :D

(And it was just plausible enough to be not ruled out as "the glass is just in the movie so it can shatter")

[-] dbx12@programming.dev 17 points 10 months ago

Unused variable is an error which fails to compile.

[-] dbx12@programming.dev 21 points 1 year ago

Review is done before code gets into main, but that’s inefficient for most of the non-mission critical projects out there. A better approach is to optimistically merge most changes as soon as not-rocket-science allows it, and then later review the code in situ, in the main branch.

Assuming you have a project with continuous delivery, that is an absolute foot gun. Optimistically merge the change and then realize in situ that you forgot the WHERE part of your SQL command (or analog statement of the query builder)? No fucking thanks.

[-] dbx12@programming.dev 14 points 1 year ago

The hell happened to the feet in the second panel?

[-] dbx12@programming.dev 18 points 1 year ago* (last edited 1 year ago)

I finally made a full backup of my system. I guess be happy about that.

[-] dbx12@programming.dev 16 points 1 year ago

I'm fine with config files, as long as they are where you expect them (~/.config/tool or ~/.tool). What I dislike is yet another funny config syntax because the dev couldn't settle on an established standard. Command line syntax is ok, if you give me sensible completions.

[-] dbx12@programming.dev 15 points 1 year ago

sad Kenya noises

[-] dbx12@programming.dev 24 points 1 year ago

Not exactly. Maybe you benefit from an additional virus scan (if Proton does this). What you certainly benefit from is the "only load external resources when told to" feature. This prevents tracking since loading the external resource == the mail was opened.

What exactly do you want to achieve in terms of security?

view more: ‹ prev next ›

dbx12

joined 2 years ago