|
Hear granny's legs the wrong way around? (11)
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
|
"WITH 'ER SHINS" I suspect. But only after you pointed it out ... I completely missed the "LEGS"-"SHINS" connection.
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
I think the "hear" part makes it a Homophone indicator, so it may be the other spelling. I quickly searched, "withershins" is the "opposite", whereas the other spelling is "wrong way around".
I don't want to swoop on this as I think Greg did all the hard work.
edit:
Ignore me, answer got posted while I was typing.
// TODO: Insert something here Top ten reasons why I'm lazy
1.
|
|
|
|
|
Yep. I'd also accept WIDDERSHINS (widow...)
Have a free gift of Wednesday!
Cheers,
Peter
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
Let's say you had a genie in a bottle that could make your daily developer life slightly better. What would it be?
I think about this a regularly and it's not necessarily things like "A better IDE" or "a faster computer". Often it's things like
- A TODO list that thinks like I do
- A means of managing source code reviews simply
- A set of templates that actually work
- Something that will scan my setup & tool/component versions and fix it all up (Python, for example, is a nightmare)
- Something that will actually help solve those Nuget / .NET DLL reference issues
- A way to emergency fix my code using my phone (hey - sometimes I break things properly and I'm not near a computer when the screaming starts)
- Something that warns me when a package I'm including (pip, npm, Nuget) has an issue (security, use of a bad library, deprecated soon etc) without needing to do anything (I want a popup notification)
I could go on, but I'd love to hear your wish lists.
cheers
Chris Maunder
|
|
|
|
|
so many things.
a final end to source dependency hell.
a big undo button that lets me unhose my dev machine after I destroyed it.
a shiny object I can distract clients with when I won't have the deliverable they want, when they want it.
Real programmers use butterflies
|
|
|
|
|
honey the codewitch wrote: a shiny object
You mean a knife?
"The only place where Success comes before Work is in the dictionary." Vidal Sassoon, 1928 - 2012
|
|
|
|
|
honey the codewitch wrote: a final end to source dependency hell.
OH PLEASE YES !!! THIS THIS THIS.
I'd rather be phishing!
|
|
|
|
|
Organizations have to get rid of all of the shims, especially the manager types.
~d~
|
|
|
|
|
I've been called a shim before, but not professionally. I've only ever understood it as
1. A slim chunk of material used to space two things or otherwise wedge them into position
2. A (usually dodgy) adapter or interface unit of some type
3. An anti-trans slur.
I'm assuming #2 here? maybe between developers and the people at the company that sign the checks?
Real programmers use butterflies
|
|
|
|
|
I think of them as being interfaces, kind of like that guy in "Office Space" whose sole job was to take specifications and hand them to the developers.
"They have a consciousness, they have a life, they have a soul! Damn you! Let the rabbits wear glasses! Save our brothers! Can I get an amen?"
|
|
|
|
|
|
Shim==takes up space
Nothing personal.
~d~
|
|
|
|
|
ADOS - attention deficit OH Shiny!
( Or as the bosses old poster said "If you can't dazzle them with brilliance, baffle them with BS. )
|
|
|
|
|
'source dependency hell'
oh, that's what I call my life. Thank you for naming it.
Charlie Gilley
<italic>Stuck in a dysfunctional matrix from which I must escape...
"Where liberty dwells, there is my country." B. Franklin, 1783
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
|
|
|
|
|
I’d like management to stay the hell outa my way.
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
Well, you seemingly have a gun and ammo.
|
|
|
|
|
“A” gun?
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
Greg Utas wrote: Well, you seemingly have a gun an armoury and ammo.
JSOP's a Texan...
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Chris Maunder wrote: A way to emergency fix my code using my phone (hey - sometimes I break things properly and I'm not near a computer when the screaming starts)
Not on my wishlist - I have an answer.
An ssh client (I use JuiceSSH on Android) and an ssh-aware editor (DroidEdit). Using the on-screen keyboard is a pita, but it's surprisingly usable with a small bluetooth keyboard.
Oh, and nail down your ssh servers tight. No userid/password logon, decent ECDSA or long RSA keys.
Cheers,
Peter
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
You might want to also update your prime moduli. Most of the operating system vendors are giving everyone the same exact list of primes.
Anyone can precompute group G used in the Diffie–Hellman key exchange and save the tables to disk. It actually requires lots of storage... but you can also estimate how much storage space and cpu time is required for the calculation. Today (2021) it would require less than 20 million dollars of hardware to do this for some of the algorithms/primes used in the 1990's.
On the Linux/BSD family of operating systems you would want to also remove all primes less than 2048 bits from /etc/ssh/moduli
On Windows 10 the designated location is at C:\ProgramData\ssh\moduli
awk '$5 > 4095' /etc/ssh/moduli > /etc/ssh/moduli.better
Someone is probably going to read this and make a comment about the computational difficultly. But you only need to attack a single known prime (like the list of default primes) and it becomes probabilistic whether or not your future SSH connections have a group G precomputation within the table. I don't need to calculate all of the space... I just need to get lucky that your connection parameters fall within the precalculated space. It would become even easier if I can control your PRNG.
Have a look at RFC 2409 section 6[^] from the late 1990's. It's hard to believe that everyone fell for the Oakley primes specified in the standard. It really reveals how very few people understood crypto back in those days.
Best Wishes,
-David Delaune
|
|
|
|
|
I'd be flattered if someone threw $20E6 at cracking my miserable little server!
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
Yeah,
I highly doubt anyone is interested in your server. I am just pointing out that the moduli is equally as important as the key length you mentioned in your post.

|
|
|
|
|
With the exception of our holiday snapshots, everything on my home server can be purchased online for a small fraction of US$20,000,000. I have no IP that requires protection. Even if someone breaks in just in order to destroy the server, I have copies of everything offline. Other than the time to restore everything, I'd lose nothing.
So why bother?
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|