|
What replaced it?
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
HaHaQuery
|
|
|
|
|
Since jQuery was offensive to SJWs it was replaced with the LGBT-safe version gayQueery.
Utterly ridiculous or totally believable in 2019?
|
|
|
|
|
Watch for a visit from the jQuery Defense League.
|
|
|
|
|
Sander Rossel wrote: SJWs
Had to look that one up to get the context.
This is a joke right? What p/c term then should I use for a database ask?
"Go forth into the source" - Neal Morse
|
|
|
|
|
no
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
Where I worked our regular JavaScript file was pretty much the same as the minified version
Maybe they're in one file because 2014 programmer thought fetching one file instead of two would make load times faster?
And since they're always used together you now only have to reference one file instead of two in all your pages making your load time even faster and your code base a bit smaller?
And since you have to write only one JavaScript reference the development time is faster too.
We know none of this is true, but 2014 programmer was an idiot and who knows what they think
|
|
|
|
|
If you have a cow that won't produce milk, is that a milk dud or an udder failure?
|
|
|
|
|
Could be a low fat de-calf.
Probably wouldn't take any bull.
|
|
|
|
|
I will think of that when I go biking near Uddel
|
|
|
|
|
That's a lotta bull!
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
Does it have one big udder or four smaller ones?
|
|
|
|
|
|
customer said: When the app starts up, load the user name from a file into the clipboard to they only need to paste it in and not type it in. Same with their password"
Makes sense. I mean we are supposed to be "automating the office work".
EDIT:
Also, if they (insert gratuitous self-promotion here ==>) use my C'YaPass app they will never have to type a password again, because it really will allow them to paste it in.
Users Hate Passwords (We're All Users): Never Memorize a Password Again[^]
I'm sorry, it had to be done.
|
|
|
|
|
Swordfish[^]
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
Closed captioning is nice for work viewing.
Marx Bros. Also, you shouldn't a let out the password in the link, but I don't think hackers would figure it out.
|
|
|
|
|
Dagnabit! No one else is supposed to know that one!
|
|
|
|
|
I started to try to write a joke about someone asking for their password to be set to "there" and communication being a routine about there/their/they're, and where the guy points to being a peice of paper he pointing to.
but writing it down didn't seem as funny.
|
|
|
|
|
Sounds like an executive level request to me. So if you can accommodate them . . . . just them.
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
A system I worked on encrypted the password given on the login window and passed it to a component running on an app server which held it in memory for up to 8 hours. All the apps at startup would pass the userid to the app server to get the password. If the password was returned, it decrypted it and logged into the database, bypassing the login window. This allowed the user to only have to type their password once per day. The userid was filled in for them using WNetGetUser.
|
|
|
|
|
Roland M Smith wrote: All the apps at startup would pass the userid to the app server to get the password.
So, really, you just needed the right userid to login. Neat.
I can imagine all the hackers sitting and waiting on their mule to sign in for the day: "Come on! I need my daily access!"
|
|
|
|
|
Sounds like something similar to Kerberos. Maybe it was Kerberos.
Kerberos (developed at MIT) is an extremely well designed single-sign-on system that really could deserve to become a great success. It was one of the flagships of the open source, *nix based packages that was on its way into several of the widespread applications in the erarly 1990s: There were "kerberized" versions of file transfer programs, email, remote login, ... Web pages were not as essential then, but I believe there were web browsers supporting Kerberos authenitcation.
But then... Microsoft discovered it, saying "This is really great! We will build our distributed athentication on the Kerberos protocol". And the reaction from the open source community was exactly as could be expected in the early 1990s: "Is Microsoft using it? Then one thing is for sure: We will not! We will not have anything to do with something that has been touched by MS, even if it really comes from our side!"
So Kerberos was effectively killed by/in the open source environment. Aside from MS, still using it (but not promoting it as it should have been!), there is very clear to zero use of Kerberos. That is certainly not because "better" solutions have displaced it: 99% or more of all logins today are made on authentications systems clearly inferior to Kerberos.
Such is life. And getting sucher and sucher.
|
|
|
|
|
Could work if you added some face recognition routines
|
|
|
|
|
RickZeeland wrote: if you added some face recognition routines
Quote: Shouldn't be difficult.
Sincerely,
PHB
|
|
|
|
|
So their user name and password are both Ctl+V! Brilliant!
"Go forth into the source" - Neal Morse
|
|
|
|