|
Well, go and f*** yourself.
And to his mate who thought this must be default and non-changeable via an option, you can go to.
I know, it is not the first time I rant about this, but oh God does this cost me time.
|
|
|
|
|
Can you not OpenOffice or something?
I want to cackle like a madman watching the pendulum swing back towards "uhhh, this stuff sucks and native apps will always be better".
|
|
|
|
|
I am very open to alternatives, but in this very case it is at my workplace AND I reckon I enjoy the MSOffice suite.
Sharepoint is a big POS however.
|
|
|
|
|
I just found this:
if ( ( _recStatus.OnlineState() == ONLINE ) || (_falseOnline == true) ) in some code. I didn't write it.
What. The. .
... and yes, I know about The Weird and The Wonderful[^], which this is neither. This is motivation for homicide.
Software Zen: delete this;
|
|
|
|
|
Ah, they miss the && (_trueOnline != false).
Or did you mean something else ?
|
|
|
|
|
I need to borrow your CP account name for a while. I promise to give it right back, as soon as I'm finished.
Software Zen: delete this;
|
|
|
|
|
Maybe the author wanted to write:
if ( ( _recStatus.OnlineState() == ONLINE ) || (_pretendOnline == true) ) ...just a thought.
However I have little patience for underscores at the beginning of variable names. Everyone should have got the memo that they are reserved for compiler use since 2003. Seems even Microsoft has heard about that.
Mircea
|
|
|
|
|
Mircea Neacsu wrote: pretendOnline
This is pure gold. Fake it until you make it.
|
|
|
|
|
My thoughts were more along the line of simulateOnline but everyone knows naming is the most difficult part of programming
Mircea
|
|
|
|
|
This is the female version
|
|
|
|
|
Mircea Neacsu wrote: Maybe the author wanted to write: A comment elsewhere in the code indirectly implies that's the intent.
Mircea Neacsu wrote: I have little patience for underscores at the beginning of variable names We use this for private and protected values. It's been part of our naming convention since the late 1990's, predating the compiler reservation. FWIW, we have never had a conflict in all that time over several code bases that run to millions of lines.
Software Zen: delete this;
|
|
|
|
|
I've never had to work with such large code bases and I certainly respect your internal conventions. However, a little devil inside me thinks that a tool converting _variable to variable_ shouldn't be all that bad
Mircea
|
|
|
|
|
A guy bought a bootleg Sunton 4.3" inch off AliExpress. For those of you not familiar with it, it's basically a clearinghouse for chinese knockoffs and a good source of hard to find electronics, even if it's sketchy as hell.
Anyway, he couldn't get the display working, because the thing doesn't advertise what it knocked off, did not come with schematics, nor code.
Based on little more than an image and the name of the LCD controller it used I was able to find the sunton device it was clearly a copy of.
Then we got the display working with the Sunton code.
Now it uses a different touch controller IC than the real mccoy so I'm having the guy run an I2C scan to find out the address the device reports on.
From there I will basically work my way backward to a touch driver chip.
It feels a bit like old school hacking.
Check out my IoT graphics library here:
https://honeythecodewitch.com/gfx
And my IoT UI/User Experience library here:
https://honeythecodewitch.com/uix
|
|
|
|
|
I wouldn't put too much effort into it - in my experience, Chinese electronics have the same shelf life as cheesecake ...
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
It depends on the vendor honestly.
Makerfabs makes quality kit. So does Espressif.
Check out my IoT graphics library here:
https://honeythecodewitch.com/gfx
And my IoT UI/User Experience library here:
https://honeythecodewitch.com/uix
|
|
|
|
|
so, a number of my clients allow me to submit IT support requests via email. Since I'm not an employee, I have no access to the employee portal. I'm left to emailing support-asses@yourguess.com. I made that last part up.
me: "Hi, your remote server is not accessible, and I am on a tight deadline. Help."
email: "Opened on your behalf..."
email: "Your incident has been re-assigned..."
Via email, I have no ability to tweak the priority level. Or get any contact. I need to start an IT support company
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
When looking for IT support software that was on premises and not online, I was amazed how difficult it was to find something that catered for both our support and IT department needs. It seems support and development are different worlds and they have no clue what's happening on the development side or how information should be coupled with e.g. Git or Continous Integration systems.
|
|
|
|
|
I had some fun with a bit of Microsoft nonsense the other day. I have a rather large hosts file - it's over 600KB. I read something about various devices phoning home to them with every URL visited so I put that address into my hosts file and mapped it to 127.0.0.1. I think it was urs.microsoft.com. Adding that single line to the file triggered the AV program at work and it was deemed to be malicious. At home it triggered a medium level warning when I did a virus scan. I removed that line and it accepted the file with no warnings or notification of any kind.
Apparently Microsoft deems it to be an act of malice to block one of their sites and I think that is nonsense.
"They have a consciousness, they have a life, they have a soul! Damn you! Let the rabbits wear glasses! Save our brothers! Can I get an amen?"
|
|
|
|
|
I need to start a website with advertising....
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
Maybe you could try setting up a PiHole Pi-hole – Network-wide Ad Blocking, and add the offending address to the blacklist? Or just add the redirect to the hosts file on the system hosting PiHole (PiHole reads the local hosts file and adds entries to it's DNS database)?
There's instructions on how to install PiHole inside a docker instance, if you want to go that route.
Plus, if you can modify your DHCP server to point to the PiHole for DNS, than every system on your local net gets the ad-blocking goodness. Only downside (?) I've encountered is that PiHole does block google ad services, too, so you can't click on any "sponsored" google link, or the "Shopping" links when doing a google search. Which is occasionally annoying. You can find instructions on how to allow ad services through the PiHole, but I think doing so will allow a number of, possibly unwanted, other ad services through as well
"A little song, a little dance, a little seltzer down your pants"
Chuckles the clown
|
|
|
|
|
Thirtysome years ago I designed and built cryptographic modules for EFT processing. Early days...
In those days there were two main algorithms for PIN verification.
The IBM Derived PIN system used data from the mag stripe (some of the account number and other fields) to crunch up with DES and other things to generate the expected PIN, which was verified by direct comparison (at a processing system, since the terminal did not have the relevant DES keys etc).
The (more popular) VISA method took the PIN and some stripe data, crunched them up and came out with a 4 digit value which was compared with the PVV (PIN verification value) from the stripe (or issuer's database).
This can be viewed as an elaborate hash function (4 digit PIN -> 4 digit PVV)
I investigated its properties as a hash, and (re-)discovered some interesting statistics.
Obviously a 1:1 mapping could be fairly easily brute-forced, so information is "destroyed" to make it a one-way operation.
As a consequence, looking at the PVV space:
1/e (almost 37%) of PVVs are unreachable - no corresponding PINs
1/e have one PIN mapped to them
1/2e (over 18%) of PVVs have TWO PINs that map to them
1/6e (6%+) of PVVS have THREE PINs that map
1/24e (1.5%+) have FOUR ... and so on
So, (back in PIN space) there is a very real chance that your card has more than one PIN that would work. (Good luck finding the other(s)!)
That fact blew the mind of more than a few bean-counters and auditors....
With regard to OG's thread below, we had requests from card issuing institutions to NOT generate "simple" PINs.
In the end I think we discarded PINs with 4 consecutive digits or more than two repeats.
(A little repetition is good - my favoured PINs have two characteristics:
They can be keyed by laying my hand over the PIN pad and merely flexing fingers.
They include a repeat so even keen watchers wind up missing something.)
Some time later, customer selected PINs (and PIN change terminals) hit the streets...
Ah, nostalgia (ain't what it used to be)!
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
Wordle 1,095 5/6*
⬛⬛🟨⬛🟨
⬛🟨🟨⬛🟨
🟨🟨⬛🟨⬛
🟩🟩⬛🟩⬛
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,095 6/6
⬜⬜⬜⬜🟨
🟨⬜⬜🟨⬜
⬜🟩🟨🟩⬜
⬜🟩⬜🟩🟩
🟩🟩⬜🟩🟩
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,095 3/6
⬜⬜⬜⬜🟨
🟩🟨🟨⬜⬜
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,095 3/6*
⬜🟨🟨⬜🟨
⬜🟩⬜🟩🟩
🟩🟩🟩🟩🟩
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|