Details
-
AboutAppSec Consultant.
-
SkillsC#, C/C++, Go, Java, Perl, Python, Reversing...
-
LocationDC
Joined devRant on 12/8/2016
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
@Strannch 128 pt font with 200% scaling is the only way I program
-
You sir have won the internet today. I must stop browsing now to cherish this gem. Thank you
-
I need to make this my mantra
-
Ha! I did the exact same thing yesterday!
-
Everything is fine. Nothing to see here. Move along. Lol
-
Not crazy at all!
-
Kill me now... existence is pain!
But seriously, that's way too much code. Time to sit down and refactor! -
@jpichardo lmao 😂 And you've got to say it in the cliche hacker movie way
-
@bas1948 Yeah, but give him a call on his cell ;P
-
@SPA-NL exactly. I like to say "Just because you have the keys to the house, doesn't mean you're welcome".
-
@bas1948 of course! :D happy holidays! Yeah it's neither hacking/cracking. Lol. But I was generalizing the subject to fit the discussion and explaining unauthorized access.
-
@jpichardo And totally not trying to offend you bud. I love your hacker vs. cracker verbiage. I actually prefer hacker since people understand quicker what I'm referring to.
-
@jpichardo The very definition of authorized is having official permission or approval. So this would be interpreted as having official permission from the device owner. Yes, the US law can be confusing and yes it can be very outdated and misguided. I love hacking, but I don't go around doing whatever I want.
-
@B1ng0 ¯\_(ツ)_/¯ unfortunately I looked really stupid by asking that without thinking or reading thoroughly. :P
-
Well. It would certainly be easier to fake it... I wouldn't want to alter my commit behavior for this. Just modify the CSS man. Plus it's still great if it's fake. And damn, if it isn't, that's some dedicated effort.
-
@bas1948 Unauthorized access to a device. Just because you have the password does not mean you have authorization to access the resources. And unfortunately changing settings on the device can be seen as malicious activity :/
-
Well, I probably won't ever say Mongo-D now that I've seen this
-
Good lord. How many files need to be open to cause that error?!
-
Technically that's a felony... in the US :/
-
Unfortunately I haven't used it for anything useful. I hope I can leverage it in a project one of these days because I really enjoyed the language while learning it.
-
Shhhhh... Don't say that bad word.
-
I really like the app UI. It's simple and easy to use. And it doesn't look bad.
-
Switching coffee with tea and cutting down on alcohol. :(
-
I can't stand a dark theme in a well lit room. D:
-
Using a JS framework for this such as Knockout or React. Ensuring you use asynchronous calls were you can.
-
@mehdiMj oh my god me too. But that was like 10 years ago when I just started programming. I'm glad I've moved away from those times :D
-
I'm not a huge fan of VS C++. It's alright but i tend to run into issues that I wouldn't have in other environments. But then again, I'm not a huge fan of CodeBlocks either. When in doubt, just use command line and Vim/Nano :P
-
After about a year at my current job we were able to switch to Git from SVN. I honestly don't have too much against SVN. Git just has better branching and storage capabilities.
-
I make the sound while using the command ;P
-
Depends on the language. With C#, Java, and C++ I do number 2. With C and pretty much all scripting languages I tend to do number 1.