|
Well, go and f*** yourself.
And to his mate who thought this must be default and non-changeable via an option, you can go to.
I know, it is not the first time I rant about this, but oh God does this cost me time.
|
|
|
|
|
Can you not OpenOffice or something?
I want to cackle like a madman watching the pendulum swing back towards "uhhh, this stuff sucks and native apps will always be better".
|
|
|
|
|
I am very open to alternatives, but in this very case it is at my workplace AND I reckon I enjoy the MSOffice suite.
Sharepoint is a big POS however.
|
|
|
|
|
I just found this:
if ( ( _recStatus.OnlineState() == ONLINE ) || (_falseOnline == true) ) in some code. I didn't write it.
What. The. .
... and yes, I know about The Weird and The Wonderful[^], which this is neither. This is motivation for homicide.
Software Zen: delete this;
|
|
|
|
|
Ah, they miss the && (_trueOnline != false).
Or did you mean something else ?
|
|
|
|
|
I need to borrow your CP account name for a while. I promise to give it right back, as soon as I'm finished.
Software Zen: delete this;
|
|
|
|
|
Maybe the author wanted to write:
if ( ( _recStatus.OnlineState() == ONLINE ) || (_pretendOnline == true) ) ...just a thought.
However I have little patience for underscores at the beginning of variable names. Everyone should have got the memo that they are reserved for compiler use since 2003. Seems even Microsoft has heard about that.
Mircea
|
|
|
|
|
Mircea Neacsu wrote: pretendOnline
This is pure gold. Fake it until you make it.
|
|
|
|
|
My thoughts were more along the line of simulateOnline but everyone knows naming is the most difficult part of programming
Mircea
|
|
|
|
|
A guy bought a bootleg Sunton 4.3" inch off AliExpress. For those of you not familiar with it, it's basically a clearinghouse for chinese knockoffs and a good source of hard to find electronics, even if it's sketchy as hell.
Anyway, he couldn't get the display working, because the thing doesn't advertise what it knocked off, did not come with schematics, nor code.
Based on little more than an image and the name of the LCD controller it used I was able to find the sunton device it was clearly a copy of.
Then we got the display working with the Sunton code.
Now it uses a different touch controller IC than the real mccoy so I'm having the guy run an I2C scan to find out the address the device reports on.
From there I will basically work my way backward to a touch driver chip.
It feels a bit like old school hacking.
Check out my IoT graphics library here:
https://honeythecodewitch.com/gfx
And my IoT UI/User Experience library here:
https://honeythecodewitch.com/uix
|
|
|
|
|
I wouldn't put too much effort into it - in my experience, Chinese electronics have the same shelf life as cheesecake ...
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
It depends on the vendor honestly.
Makerfabs makes quality kit. So does Espressif.
Check out my IoT graphics library here:
https://honeythecodewitch.com/gfx
And my IoT UI/User Experience library here:
https://honeythecodewitch.com/uix
|
|
|
|
|
so, a number of my clients allow me to submit IT support requests via email. Since I'm not an employee, I have no access to the employee portal. I'm left to emailing support-asses@yourguess.com. I made that last part up.
me: "Hi, your remote server is not accessible, and I am on a tight deadline. Help."
email: "Opened on your behalf..."
email: "Your incident has been re-assigned..."
Via email, I have no ability to tweak the priority level. Or get any contact. I need to start an IT support company
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
When looking for IT support software that was on premises and not online, I was amazed how difficult it was to find something that catered for both our support and IT department needs. It seems support and development are different worlds and they have no clue what's happening on the development side or how information should be coupled with e.g. Git or Continous Integration systems.
|
|
|
|
|
I had some fun with a bit of Microsoft nonsense the other day. I have a rather large hosts file - it's over 600KB. I read something about various devices phoning home to them with every URL visited so I put that address into my hosts file and mapped it to 127.0.0.1. I think it was urs.microsoft.com. Adding that single line to the file triggered the AV program at work and it was deemed to be malicious. At home it triggered a medium level warning when I did a virus scan. I removed that line and it accepted the file with no warnings or notification of any kind.
Apparently Microsoft deems it to be an act of malice to block one of their sites and I think that is nonsense.
"They have a consciousness, they have a life, they have a soul! Damn you! Let the rabbits wear glasses! Save our brothers! Can I get an amen?"
|
|
|
|
|
I need to start a website with advertising....
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
Thirtysome years ago I designed and built cryptographic modules for EFT processing. Early days...
In those days there were two main algorithms for PIN verification.
The IBM Derived PIN system used data from the mag stripe (some of the account number and other fields) to crunch up with DES and other things to generate the expected PIN, which was verified by direct comparison (at a processing system, since the terminal did not have the relevant DES keys etc).
The (more popular) VISA method took the PIN and some stripe data, crunched them up and came out with a 4 digit value which was compared with the PVV (PIN verification value) from the stripe (or issuer's database).
This can be viewed as an elaborate hash function (4 digit PIN -> 4 digit PVV)
I investigated its properties as a hash, and (re-)discovered some interesting statistics.
Obviously a 1:1 mapping could be fairly easily brute-forced, so information is "destroyed" to make it a one-way operation.
As a consequence, looking at the PVV space:
1/e (almost 37%) of PVVs are unreachable - no corresponding PINs
1/e have one PIN mapped to them
1/2e (over 18%) of PVVs have TWO PINs that map to them
1/6e (6%+) of PVVS have THREE PINs that map
1/24e (1.5%+) have FOUR ... and so on
So, (back in PIN space) there is a very real chance that your card has more than one PIN that would work. (Good luck finding the other(s)!)
That fact blew the mind of more than a few bean-counters and auditors....
With regard to OG's thread below, we had requests from card issuing institutions to NOT generate "simple" PINs.
In the end I think we discarded PINs with 4 consecutive digits or more than two repeats.
(A little repetition is good - my favoured PINs have two characteristics:
They can be keyed by laying my hand over the PIN pad and merely flexing fingers.
They include a repeat so even keen watchers wind up missing something.)
Some time later, customer selected PINs (and PIN change terminals) hit the streets...
Ah, nostalgia (ain't what it used to be)!
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
Wordle 1,095 5/6*
⬛⬛🟨⬛🟨
⬛🟨🟨⬛🟨
🟨🟨⬛🟨⬛
🟩🟩⬛🟩⬛
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,095 6/6
⬜⬜⬜⬜🟨
🟨⬜⬜🟨⬜
⬜🟩🟨🟩⬜
⬜🟩⬜🟩🟩
🟩🟩⬜🟩🟩
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,095 3/6
⬜⬜⬜⬜🟨
🟩🟨🟨⬜⬜
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,095 3/6*
⬜🟨🟨⬜🟨
⬜🟩⬜🟩🟩
🟩🟩🟩🟩🟩
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
🟩🟨⬜⬜🟨
🟩🟩🟩🟩🟩
In a closed society where everybody's guilty, the only crime is getting caught. In a world of thieves, the only final sin is stupidity. - Hunter S Thompson - RIP
|
|
|
|
|
Wordle 1,095 4/6*
⬜⬜⬜⬜🟨
⬜⬜🟨🟩⬜
🟩⬜⬜🟩🟩
🟩🟩🟩🟩🟩
Happiness will never come to those who fail to appreciate what they already have. -Anon
And those who were seen dancing were thought to be insane by those who could not hear the music. -Frederick Nietzsche
|
|
|
|
|
Wordle 1,095 3/6
⬛🟩⬛🟩🟩
⬛🟩⬛🟩🟩
🟩🟩🟩🟩🟩
Ok, I have had my coffee, so you can all come out now!
|
|
|
|
|
American here for context
In the light of recent revelations of MS cooperating with the CCP and the PLA and the fact that the DoD and the Feds (I know that's redundant) moved all their crap to the cloud - all of it classified - none of it protected by the OS, I give you this...
So, I have deliberately covered my built in webcam. I login through a password or a pin. The login process or whatever it is has thrown an exception condition. I cannot login. The mouse has gone stupid. The laptop is hung.
The inmates are in charge of the asylum.
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|