Details
-
AboutI will find you - and you will never see me coming.
-
SkillsC, Go, JavaScript, torture, ArchLinux, Java, Rust
Joined devRant on 6/19/2017
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
@rooter https://docs.docker.com/compose/...
Here you are ;) -
Have you had a look at the expose flag? Ports opens ports to the outside, expose opens them only inside the docker network. No need for 127.0.0.1
-
No man, you don't understand. You don't understand at all. This is not a bug, this is a feature. It's called multi possibility value provider.
As soon as you have enough people eating your shit, you can sell it to the Person bidding the most to change the binary and use it as a cheap bot network. Now you got money from your "customers" and the people running the network. And in the end you blame the developers for their failure... Ingenious! -
Well I guess it depends on how you define painful. Because my job is excruciatingly painful I love it so much
-
Ok whatever that's fine for me. Here is the example. I had to crop it a lot. On top is the output of the program returning the body part of the json response from aws. On bottom ... Well it should be self explanatory. Don't mind that the top has less IDs. It has a filter
-
@SortOfTested now you are asking me something :D. Is there a way to find out? I'm using https://aur.archlinux.org/packages/... and never had difficulties with any of the other apis 🤷♂️
-
@SortOfTested I actually wanted to provide some examples. Then I found out that not even the aws docu works...and yes I'm using v2 and this is the v2 doc...
-
Wait... Do they sound like they don't want you to tell them their security vulnerabilities...
Like wtf? Shhhhh we don't want to hear how bad everything is -
@Bybit260 u sure about that.
I might be closer then you think.
That feeling under your skin. It inches and it never goes away.
But remember it's not my fault. I don't want to do it but someone has to do it. I'm just the weapon, the vessel of destruction. -
Jep I know exactly what you mean. But sometimes I mix a bit of "changing commits of other people and force push" into it. My colleagues love me for doing that.
-
Wow nice way to introduce yourself to someone. "Hey I'm your boss now and I will require your whole attention fuck that shit you're doing now and come with me".
Damn I would have punched that person right on the spot -
Check your .bashrc. it's most likely a trap which executes an echo. Similar to this:
https://stackoverflow.com/questions...
Also the way to do it of you want to replicate ;) -
Have a look at https://www.wps.com/office/linux. Not perfect but a lot better then libreoffice
-
@AlgoRythm
You can get a daily blacklist (api) from https://www.abuseipdb.com/
And this shows how to create a blacklist via iptables:
https://google.com/amp/s/...
But careful, ips might switch owners - you have to update it regularly -
@alexbrooklyn @AlgoRythm
Should work on pretty much every system as long as node is in the path
@highlight
#!/usr/bin/env node -
Am I the only one wondering why both answers were made by the same person. But who knows, maybe I'm missing something.
-
@C0D4 What happens to the people who don't follow the link. Will their account be disabled if they don't do it after a few days?
Point is, yes it is that hard. Because most times business won't allow accounts to be disabled. Those people cought come back one day. -
@C0D4 how would you do that? You can't change the hash of something you don't know. Except blocking every user and sending mails to reset passwords.
-
@arraysstartat1 at first yes. But your body adopts quite quickly.
I'm sleeping on the ground with only one centimeter of mat below me. -
@gudishvibes congratulations, you made me loose hope for humanity once again...
-
Or his queries are his porn. Similar to cable porn Oo
-
@heyheni yey another rust book. I love how much time they take to write all that stuff down and the quality of it.
-
@shelladdicted oh no, why is everything on fire
-
@irene well you are of course right with that one :D. But some of us have a job to do ;)
-
@jschmold yes - that was my response as well. And Linux (host) is not safe either.
So far I never saw a virus capable of but it just takes one... -
@jespersh never use a virtual maschine to test a virus. There are so many vulnerabilities discovered ever year to escape a VM it's ridiculous.
Always use a second pc not connected to the network. Best is an iso which works only in ram and is cleared after shutdown -
@chabad360 that's not correct. Manjaro does not use the Archlinux packages. They compile their own packages using an arch like repository structure. Thus if there are problems with those package the arch forum is not a good place to go to.
@athlon So the answer is no - you wouldn't be using arch -
@PaperBag not necessarily. If the gitignore is checked in then nothing happens
-
So...is it more of a raid0 (time equally shared between those two) or more of a raid1 where everything you do automatically accounts for both?
-
@zlice envy? For not wearing shoes or for having a company allowing that?