[ overboard / cytube] [ leftypol / b / hobby / tech / edu / games / anime ] [ meta ] [ GET / ref]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Flag
File
Embed
Password (For file deletion.)

| Catalog | Home

File: 1608526124642.png (30.58 KB, 1280x720, Top-50-Coding-Interview-Qu….png)

 No.3441[Reply]

What's up with the coding interview? You would think being a competent programmer would be enough to get a job but there's a whole industry out there specialized in preparing people for code interviews. It even has a Wikipedia page of its own. No other industry has a specific Wikipedia page for their job interviews.

Why? What went wrong?
4 posts omitted. Click reply to view.
>>

 No.3742

>>3735
Also nice job citing a blog from 2007, before leetcode, topcoder, projecteuler, khanacademy, etc. etc. were a thing, before FAANG's corporate dominance and consolidation of the internet, before the 2007 financial crisis, before the first iPhone was released, your blog is prehistoric by the rapid pace of the changing IT world.
>>

 No.3754

>>3741
>>3742
>Tesla
Was from the early transitional period when all this started, during an era when safety and reliability standards were far lower, and it only became universal by the post-WWII era even in the US:
https://en.wikipedia.org/wiki/Regulation_and_licensure_in_engineering#History
>Wozniak
Cobbled together a PC design on a shoestring from spare parts, even writing the entire BASIC on paper and typing it in all at once because he didn't have regular access to a workstation. Like all PCs of the era, it was a clumsy hackjob, but the fact it worked at all was more than enough to make it amazing for the time.

That's not an acceptable standard for anything even vaguely resembling the level of maturity the IT sector should've had since the '90s at the latest, not to mention today.

>the changing IT world

Wow, yeah, Indian webdev mills churning out script kiddies that can't "program" in anything except JS, and deploying end-user software for joke "platforms" like Electron.
>>

 No.3763

>>3754
If you're really that much smarter than Tesla and Wozniak combined, why are you wasting your talents shitposting here?
>>

 No.3764

>>3735
In most places of the world, "their field's accrediting body" is the university. If you have a software engineer or computer engineer diploma, you are an engineer and can call yourself one. If you work for industries where it is necessary, you will be held for the same standards as other engineers. Ask anyone working in automotive, healthcare or similar fields.
>>

 No.3879

>>3441
Engineers are naturally drawn towards over-engineered solutions. Just look at Silicon Valley startups. They even invent problems where there are none just so they can create an app.


File: 1608525823735.png (503.48 KB, 934x1000, daily_programming.png)

 No.17[Reply][Last 50 Posts]

What are you working on, /roulette/?
187 posts and 33 image replies omitted. Click reply to view.
>>

 No.2799

>>1774
Sure, and asm is also turing complete, but you will never use it to replace your shell scripts. Now imagine having to work with convoluted json data in bash.
>>

 No.2801

>>2799
https://stedolan.github.io/jq/

It's actually pretty convenient.
>>

 No.2803

>>17
Working making changes to some Vue codebase. I kinda wanna die, ngl.
>>

 No.3373

>>2798
Which one did you end up using?
>>

 No.3861

>>17
Funnily enough, I'm currently working through SICP, CLRS and that one book by Patterson and Hennessy. Don't know if I'm just memeing myself or if this actually werks, but these books are pretty good so far.


File: 1608525839355.jpg (149.08 KB, 640x360, b7cc26f4f413575f1457058a73….jpg)

 No.220[Reply]

What Internet browser does /tech/ use?
personally, I just use firefox
86 posts and 7 image replies omitted. Click reply to view.
>>

 No.3751

>>220
Vivaldi good?
>>

 No.3841

>>512
RIP Mozilla
>>

 No.3850

File: 1608526169974.png (28.08 KB, 633x758, soy198 (2).png)

>>512
>NOOOOOOO!! YOU WERE THE CHOSEN ONE, MOZILLA! YOU WERE SUPPOSED TO DESTROY THE ENEMIES OF THE INTERNET, NOT JOIN WITH THEM! BRING BALANCE TO BROWSER STANDARDS, NOT LEAVE THEM IN DARKNESS!
>>

 No.3852

File: 1608526170231.jpeg (17.16 KB, 400x400, sheev.jpeg)

Did you ever hear the tragedy of Mozilla the Wise? I thought not. It's not a story Google would tell you. It's a hacker legend, you see. Mozilla was a Dark Lord of the Internet, so powerful and so wise he could use his browser to influence web standards… He had such a knowledge of webdev that he could even keep floundering file formats from dying. The dark side of webdev is a pathway to many abilities some consider to be unnatural. He became so powerful… the only thing he was afraid of was losing his power, which eventually, of course, he did. Unfortunately, he taught his apprentice everything he knew, then his apprentice killed him in his sleep. It's ironic… he could save others from death, but not himself.
>>

 No.3856

>>3751
>Vivaldi
Hell no, it's proprietary


File: 1608526166774.jpg (160 KB, 1440x1769, 66464157_465247377541737_6….jpg)

 No.3817[Reply]

"Me? Manjaro is the distro of my preferences."
8 posts and 2 image replies omitted. Click reply to view.
>>

 No.3826

>>454garbageA point release that only gets point update every two years
>>

 No.3827

>>454its a ubuntu based distro that looks similar to mac os, you should try it
>>

 No.3828

>>3823>arch>compiling everythingDid you mean gentoo?
>>

 No.3829

I use Arch, it works pretty well once you set it up all, my only issue right now is that I haven't been able to set up my printer.
>>

 No.3830

>Be Arch
>Update once


File: 1608526135481.jpg (100.76 KB, 1520x1000, boothole.jpg)

 No.3533[Reply]

Yet another gaping security flaw has been found in the Microsoft Trojan Horse replacement for BIOS known as UEFI. This one affects GRUB2 bootloaders in particular.

https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/

Eclypsium researchers have discovered a vulnerability — dubbed “BootHole” — in the GRUB2 bootloader utilized by most Linux systems that can be used to gain arbitrary code execution during the boot process, even when Secure Boot is enabled. Attackers exploiting this vulnerability can install persistent and stealthy bootkits or malicious bootloaders that could give them near-total control over the victim device.

The vulnerability affects systems using Secure Boot, even if they are not using GRUB2. Almost all signed versions of GRUB2 are vulnerable, meaning virtually every Linux distribution is affected. In addition, GRUB2 supports other operating systems, kernels and hypervisors such as Xen. The problem also extends to any Windows device that uses Secure Boot with the standard Microsoft Third Party UEFI Certificate Authority. Thus the majority of laptops, desktops, servers and workstations are affected, as well as network appliances and other special purpose equipment used in industrial, healthcare, financial and other industries. This vulnerability makes these devices susceptible to attackers such as the threat actors recently discovered using malicious UEFI bootloaders.
1 post omitted. Click reply to view.
>>

 No.3535

>>3534
Basically this vulnerability requires root / admin access to access the grub.cfg file located in the EFI System Partition, which means the attacker must first gain a foothold on the system and escalate privileges (physical access also works). The vuln only helps with persistence across system reboots, so it’s unnecessary — and perilously noisy — for attackers to employ this if they already have root on a system that never reboots. In other words, protect your system from privilege escalation attacks and prevent evil maids in hotel rooms from physically accessing your machine and you protect yourself from this. Also you should laugh at anyone who has ever relied upon Secure Boot to protect themselves, a "feature" that has been broken by design since its inception.
>>

 No.3540

>>3534
it has a catchy name and a logo that means it is scary
>>

 No.3541

>>3535
>Basically this vulnerability requires root / admin access
You're already beyond fucked at that point anyway. There are more important vuls discovered all the time that either escalate the privileges or gain access to the system over network in the first place. But most of them are so specific that there's very little chance you'll get hit if you update your system, even if takes a month for the fix to arrive in your repos.
>>

 No.3778

>>3540
Why is everything so comodified and branded that even something as obscure and technical as security vulnerabilities get flashy logos, graphic design and a name that sounds like it was created by a marketing focus group? It's just ridiculous.
>>

 No.3782

>>3778
It was created by a marketing focus group. It's advertisement for the business that found it.


File: 1608526077417.png (6.32 KB, 109x100, searx.png)

 No.2900[Reply]

I know that if I run my own instance of searx is the most private way to search things up. But what about public instances of searx like search.snopyta.org, are they any safer than just using pure duckduckgo? Because I am still trusting a 3 party with my data, the only other advantage that I see using a public instance of searx is that is completely open source. Are there any other positives?
14 posts omitted. Click reply to view.
>>

 No.3247

>>3245
I like street view though, photo imagery of Earth's surface, rather than the layout?
>>

 No.3271

>>3239
impossible
>>

 No.3368

>>3239
Unless the NSA and friends have made a breakthrough on quantum computing and kept it secret, functionally impossible. With properly set up and non backdoored ssl crypto you're looking at average computation times longer than the heat death of the universe.

Of course they could always do what they did with Dual_EC_DRBG and backdoor the encryption to make it significantly easier to break or just compromise the servers you're talking to.
>>

 No.3760

>>3245
Good post. What's a good .txt dictionary? I tried looking for one once, but they were all antiquated
>>

 No.3761

>>3760
Check this out: https://dumps.wikimedia.org/
Wiktionary has a lot of English words, plus etymologies, pronunciation, translations, etc.


File: 1608526085321.jpeg (38.57 KB, 700x470, AccuVote TSX.jpeg)

 No.2989[Reply]

Many countries around the world, after some initial experiments, have completely dumped the idea of running their election systems with computer hardware and returned to hand-counted paper ballots. One look at the cartoonish hodgepodge of election machines with a million security holes across the United States all making use of unauditable proprietary software and hardware and manufactured by private companies mired by a history of corruption and scandals. One look at all that would be enough to give any reasonable person pause to reconsider the entire idea of electronic voting.

Is it possible to design an electronic voting/counting system that fulfills some basic expectations of security and transparency? I and many other computer security experts would argue that it is not and never will be due to some fundamental aspects of computers. But let's not let that spoil our fun.

How would [b]you[/b] design electronic voting systems to be secure and transparent? What would the hardware be like? What would the software be like?
10 posts and 1 image reply omitted. Click reply to view.
>>

 No.3012

>>2993
This work work fine too. A pseudonymous but verifiable cryptographic signature is a solved problem. Look into zero knowledge proofs as well: https://research.kudelskisecurity.com/2018/11/05/e-voting-crypto-protocols/
>>

 No.3030

>>3011
>Its simply not feasible to have tons & tons of properly organised paper votes for things like workers councils making small decisions.
Why not? It's being done right now.
>>

 No.3031

The fundamental issue isn't that its an unsolveable problem, its that you still have to trust the organisation running the election more than you do for a paper ballot.
>>

 No.3186

>>2990
>copyleft openrisc
>not permissively-licensed risc-v meme ISA
giga based
>>

 No.3731

>>3006
>1. In what ways are current pen-and-paper election systems are broken?
Insecure, unreliable, centralized, slow, expensive, inflexible.
>2. How would an ideal digital election system fix this issues?
Public-private keys are a simple centralized solution, blockchains are a more elaborate decentralized solution.

>>3031
>its that you still have to trust the organisation running the election more than you do for a paper ballot
Not true. Crypto systems can be completely decentralized.


 No.1235[Reply]

>>1287
>Would such a decentralization and expression come back to the internet in a socialist world or would it be used for something different?
Outside of government/state/defense/scientific network/Internet use it would be similar to how it was in the beginning: hobbyists running servers and websites. The profit motive and market that enables advertising is the reason for most of the websites existing, it's all SEOs, paywalls and ads, once that is gone, the shit parts of the Internet will be too.
10 posts and 1 image reply omitted. Click reply to view.
>>

 No.1260

>>1259
I've heard zeronet and ipfs are very sloppily built projects.
This is just a guess, but I believe I2P is a better built network than both, technically.
>>

 No.1300

File: 1608525937246.png (30.34 KB, 320x280, gnunet-logo-dark-text.png)

>>1248
This shit's cool IMO. I read one of the features was it has a "bridge" mode that lets you communicate over gnunet without requiring any of your current applications to be rewritten for it.
>>

 No.1310

>>1252
There is a meshnet in my town and it's pretty cool, they use wireless equipment for connecting to each other. I haven't researched how much the equipment would cost but i'd guess that its somewhere in the hundreds for just a short link, but the subscription is dirt cheap and the speeds are very fast. Internet access isn't guaranteed though, there are some people within the network that share their internet connection. Meshnets should be way more popular and widespread than they currently are.
>>

 No.1328

>>1300
I was always curious about this but I could never figure out how to get it set up or understand exactly how it works.
>>

 No.3728

>>1235
>it's all SEOs, paywalls and ads, once that is gone, the shit parts of the Internet will be too.
Link extremely related:
https://idlewords.com/talks/what_happens_next_will_amaze_you.htm
If the surveillance/advertising/datamining/botnet bubble pops, the entire corporate web and its SNSs could die overnight.

>>1243
Quick reminder WWW was just supposed to be HTML+CSS via HTTP, for creating/editing/distributing hypertext documents, with GUI editing integrated into all clients using a standard open library, raw markup and URLs never supposed to be seen nor touched by humans.

Both the 1-way consoomer "Web 1.0" and the monstrous JS hodgepodge of "Web 2.0" are perverse accidents of history.

Note there was an attempt by the web's original authors to fight all this, and right the course of the web with semantic metadata:
https://www.w3.org/2009/Talks/01-15-steven-website/
But it was scuppered by Google/Apple in the fight between W3C vs. WHATWG, resulting in the death of XHTML in favor of HTML5.


File: 1608526156501.jpg (62.69 KB, 1920x1080, discord.jpg)

 No.3720[Reply]

I have heard from a relative on discord about a user named hill-
, Do any anon's have some information about this mysterious person?
>>

 No.3721

its hillary clinton
>>

 No.3722

File: 1608526156652.jpeg (22.05 KB, 300x300, ab67706c0000da841ab43cdcb….jpeg)

>>3721
he knows tuu much. take 'im down


File: 1608525928728.jpg (39.06 KB, 640x360, Fuck All Niggers.jpg)

 No.1199[Reply]

How do I DDoS a website?
Not a fed.
6 posts and 1 image reply omitted. Click reply to view.
>>

 No.1583

>>1199
get a group of people with fast internet, make them all use LOIC on your target and done
>>

 No.1594

Post on weibo that there is free Sora Aoi AV downloads on the webstite. The Chinese human wave will overwhelm puny western intertube.
>>

 No.1813

File: 1608525984061.png (3.1 MB, 1230x1593, test.png)

spoiler thumbnail test
>>

 No.2810

File: 1608526069258.png (3.16 MB, 850x1055, image.png)

negative thumbnail test
>>

 No.3710

File: 1608526154807.png (3.16 MB, 850x1419, image.png)

rotated thumbnail test


Delete Post [ ]
[ overboard / cytube] [ leftypol / b / hobby / tech / edu / games / anime ] [ meta ] [ GET / ref]
[ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 ]
| Catalog | Home