Details
-
AboutJava dev
-
SkillsJava, XML, Ansible, "Dev-Ops" ... all the fun stuff Recently some Erlang too, because why not?! Ooh and python.. python is real nice
Joined devRant on 7/14/2017
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
Does manjaro count?
-
Bing that shit. If bing can't find it... It can't be found
-
It's a great language! The syntax is a bit weird though :)
-
@Haxk20 Atom is maintained by GitHub
-
📌
-
Sage advice I guess...
How do you define lose the least amount of money? Is that per game ? Per hand? Per year? Do you take into account how many chips it's opponent(s) have ? -
@shaji please no
-
The certificate expired. It happens to the best of us :)
-
What the fuck is that?! Kill it before it lays eggs! Kill it with fire!
-
@Gregozor2121 you could always be more verbose!
boolean isEqual = true;
for ( char c : key.toCharArray() )
{
for (char c1 : key.toCharArray() )
{
if( c != c1 )
{
isEqual = false;
break;
}
}
}
I've seen something very similar in production code.... -
Vim golf
-
You sound like a great guy to work with...
-
@Cyanide it's when we all sit in a circle and huff paint from a brown bag. Right @diobert ?
-
It's pronounced "Shit KDE"
-
@djlazz3 WOMM
-
What about:
:! kill -9 `pgrep -f vim`
Let's you kill your vim session while you're still in it -
Yeah, I guess you've got the basic core of it down there.
Your analogy describes public key cryptography really well. Your pens that are exchanged are the public keys and the glasses are the private keys.
SSL is built on public key cryptography but there are also a lot more things to consider, for your own understanding.
For example how can I prove that the pen I got from B is actually from B and not from an evil C ?
Is there a way I (as C) can send random messages to one of you and look at your responses and work out important information, can I work out what your 'glasses' (private key) look like?
I think your analogy is good for public key cryptography, SSL is public key cryptography ++ -
@LordPeeve thanks for the notes :) I'm going to leave it day or so and give it another crack
-
Fuck I bet it's hot in there...
-
@notarealDev if I consider my child to be a fork from myself.... Can I kill it then?
-
S'ok guys I sorted it. I'll update this in a bit with the solution
-
@Linux I'm using pihole, so 1.1.1.1 as primary and quad9 as backup. Networking is at the top of my "to improve list" so let me know if I'm fucking up! :)
-
@linux what DNS do you recommend? I'm on 1.1.1.1 and quad9 at the moment
-
@jhh2450 Mobile data
-
I can empirically prove that my seniors fuck up more than I do... umount -a has happened MORE THAN ONCE
-
Pi-hole is the way ! Blocks ads at the network level and is super easy to set up. I sometimes get the "you're using an add blocker" pop up bullshit but just click done or I disabled it etc and it'll let you through
-
There is no issue with Java in itself. The issue is with Java developers (I'm one) that insist on abstracting to the fucking eyeballs and making everything ridiculously complex just to make it look pretty.
The same is true for all languages - it's the developers that are the issue - apart from PHP because PHP is a pile of shit -
@nanoandrew4 If you just want to wait a moment why not use Thread.sleep() instead of empty loops?
-
@sslPoodle my little brother (7 y/o) cried when I turned just one on
-
Sounds interesting! I'll pop my 📌 here