• 1 Post
  • 92 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle

  • That’s absolutely acceptable. Don’t fix what ain’t broke.

    But please don’t publicly post a joke/rant about how your only option to accomplish something was through absurd hacky workarounds, when the issue is that you refused to learn the tools you have.

    What we have here is the slightly more tech literate version of printing out a Word Doc so you can re-arrange, remove, and add pages physically before scanning it back in as a PDF to email someone, then complaining about it being so difficult, rather than just using one of the many many print to PDF and PDF editing/splicing tools.




  • All of those inputs would likely be much better built into the ps1 file. PowerShell is meant as a sucessor to vbscript which was meant as a successor to windows batch.

    Selecting options? Make them parameters that you just set when calling the script: ./build.ps1 -Arch 64 -CompressSplines

    Needing someone to manually confirm something completed? Add a while loop to wait 5 seconds while whatever spawned process is still running.

    Etc.

    Also, you can have multiple terminals open in VSCode.

    You’ve not listed any requirements that aren’t more easily solved with existing features in the tools you’ve listed. Learn the tools your work expects you to use before you start blaming them for shit.



  • wizardbeard@lemmy.dbzer0.comtoF-Droid@lemmy.mlNoice app
    link
    fedilink
    English
    arrow-up
    10
    ·
    2 months ago

    If I remember right, Noice started offering paid subscriptions to stream higher quality sound files from a central server. I just rolled back my install to the last version before that change (looks like 2.5.6) and disabled updating.

    I’ll have to check out soothing noise player!




  • I’m probably a freak, but I can’t stand working on something complex, being pulled away from it for a week or two, and not being able to pick things back up because it’s not documented well. Especially when I’m the only person to blame.

    I also make scripts and programs with the goal to hand them off when I’m done. I’ve got more than enough to keep me busy at work without having to be the only person able to support my projects forevermore. Ultimately I’m still the go to, but I never want to be so critical that I can’t take time off, or that I’m effectively on call 24/7. I want the credit, but the whole point is to reduce responsibility by making shit more efficient and easy.


  • Still hurts, but sometimes it’s the only option.

    If you’re trying to confirm things like account existence/deletion, there’s often no “account exists” function to return true or false. You just have to figure out the specific exception thrown and catch that specific one.

    The worst are libraries that don’t give specific exceptions, so you have to catch all exceptions then do extra work to tell what the specific situation is. Does the account not exist, or is the system unreachable?




  • Only if it’s enabled by default, or the dev knows to enable it.

    I had a lot of weird problems processing some info with names in Powershell until I found out that Powershell doesn’t default to unicode format when shoving output into files. You can easily specify the encoding, but if you don’t it replaces any non-ascii characters with “?” by default, so it’s not even immediately obvious that there’s an incorrect character, as it just silently substitutes a valid one.


  • Depends on if you’re allowed to bring the Pi in at all. Might be safer to just buy what you need “on site”. There’s a lot more to this than just the technical side.

    Whatever you do, just be careful. A lot of places don’t play easy with foreigners breaking the law. It can be easy to hide what you’re specifically doing over a network, but they don’t need to know what you’re spefically doing to say “bypassing the filter at all is illegal”, “using tor gives us probable cause”.

    Depending on your situation and how they check things you bring in, it might be better to just load up a/some big hard drive(s) with enough content to carry you through until your next trip outside the filter. Knew someone who was in a similar situation for a long while that would emulate their way through old console game libraries like that.

    May be worth looking into how political dissidents can protect themselves. Hidden encrypted containers. Private vps outside the filter that you connect to, doing all your questionable shit on the remote server outside, so the only data transfer is video feed to/from. If hiding what you’re doing is needed, steal notes from the people with lives at stake.

    So much of this depends on specifics it may not be safe for you to share. Probably worth asking questions in some of the privacy focused communities.

    OpenWRT won’t hide what you’re doing from the network that handles your internet connection. It’s just an option for something you could use as a router/wifi AP.


  • wizardbeard@lemmy.dbzer0.comtoProgrammer Humor@programming.devClassic Amazon
    link
    fedilink
    English
    arrow-up
    56
    arrow-down
    1
    ·
    3 months ago

    Absolutely the latter. This is similar to how Snowden had access to all the stuff he leaked. He worked at a place that did contract work with the government and was mortified at all he had access to that he should have never been able to see.

    There’s a shit ton of articles in the tech space about how companies keep fucking up with stuff like this. No reasonable expectation that the government and their contractors would do any better.



  • There’s a concept of acceptable levels of risk. Companies are not going to shut down out of fear, or miss out on the business opportunities of online presence. There’s money to be made.

    Even with things as serious as spectre allowing full dumping of CPU and RAM contents simply by loading a website, I can’t think of a single company that just said “well shit, better just die”.

    Serious, potentially business ending, security issues usually have a huge amount of effort when discovered put into mitigations and fixes. Mitigations are usually enough in the immediate “oh shit” phase. Defense in depth is standard practice.