![](/static/253f0d9/assets/icons/icon-96x96.png)
![](https://programming.dev/pictrs/image/8140dda6-9512-4297-ac17-d303638c90a6.png)
Today, to configure fail2ban. Before that, yesterday to select which tests to run.
Today, to configure fail2ban. Before that, yesterday to select which tests to run.
Well, lemmy is a place for much more cultured audience. We can appreciate a good shitpost (that does also hold some water).
This is an overstatement, definitely. C is one of the few (main stream) languages where memory safety vulnerabilities are even possible. So if you batch C and C++ together, they probably cover more than 90% of all the memory unsafe cove written in last 50 years, which is a strong implication that they will contribute to 90% of memory vulnerabilities.
All that said, memory vulnerabilities are about 65% of all high implact vulnerabilities on Chromium project[1] and about 70% of vulnerabilities at Microsoft [2].
You are not alone. This is the work git was built for.
There is a bit of benefit if you have code reviewed so separate commits are easier to review instaed of one -900 +1278 commit.
My house was built in 1939. Initial installation of ecectric cables consisted of a wire in a sleeve filled over with concrete. That was all replaced with proper tubing and isolation, but these few outlets do not have ground.
Wait what? What does that even mean? Is he their boss? Is he paying them? Does he mind control them?
I didn’t even notice the new actors, a testimony to how good they are!
Wait, but if you have, for example an HTTP API and you listen on a unix socket in for incoming requests, this is quite a lot of overhead in parsing HTTP headers. It is not much, but also cannot be the recommended solution on how to do network applications.
I use planka, which feels exactly like what trello used to feel: fast & simple. It does not have an app though.
Lol, something felt off, but I just wasn’t sure if I mistyped something until I saw this comment.
She is taking to her children, saying that their grampa is in prison.
Oh it would not be Polexit. There are way better names available than that. Polout, for example.
programming.dev does not get it. Can you explain?
It is kinda obvious that maxist ideas are aligned with the open source ideas. Are they very much against commies?
This is the real big-endian way. So your things line-up when you have all of these:
file_dialogue_open
file_dialogue_close
file_dropdown_open
file_rename
directory_remove
If I were designing a natural language, I’d put adjectives after the nouns, so you start with the important things first:
car big red
instead of
big red car
What soup dawg?
A we the baddies?
Please explain more! What happened?
Did you destroy a database? Expose credentials? Nuke the company intentionally?