The Lounge is rated Safe For Work. If you're about to post something inappropriate for a shared office environment, then don't post it. No ads, no abuse, and no programming questions. Trolling, (political, climate, religious or whatever) will result in your account being removed.
I have found, virtually without exception, that poorly formatted code means a crap design. Either the owner didn't care or there wasn't an owner, and the collective didn't care.
On an unrelated topic, I recently realized that anyone with stuff hanging from their rear-view mirror is likely to be a crap driver. Dream catchers, fuzzy dice, rosary beads, little scented cardboard pine trees--it doesn't matter. When I see a vehicle like this in front of me, I start to get wary.
Just too many variables to consider before deciding to redo something from scratch, especially if it's some sort of monstrosity. I don't like to do engage in an endeavour like that unless I'm absolutely required to.
If it works, leave it the f#%! alone. I've seen a far too much to think otherwise.
I usually apply the boy scout rule, leave the code better than I found it.
If I'm just doing a quick fix or if I'm part of a team I'll use the existing formatting and conventions, if I've inherited it I'll start using my own and change existing ones.
I might do some refactoring and probably some variable renaming.
Hopefully, one day, it'll be a piece of art (wishful thinking, but I need a bit of hope to continue on such projects)
I'd rather create my own monster than take over someone elses, thank you very much!
Anything that is unrelated to elephants is irrelephant Anonymous - The problem with quotes on the internet is that you can never tell if they're genuine Winston Churchill, 1944 - Never argue with a fool. Onlookers may not be able to tell the difference. Mark Twain
Ive always wondered about this too...how can you know what happened after the fact?
I’m wondering if there is anything in Windows event logs if you look closely?
There probably isn’t anything but maybe you could see access to network drives or apps that ran. I’m not sure.
Good luck and I hope you find some clues. Let us know if you do I’m very interested.
If an attacker has had control of your computer, it's no longer your computer. Boot a *nix live image to back up data if needed, and then delete your partitions and reinstall the OS from scratch.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
It would have helped if they had linked to it so you could see the render in your browser rather than just pictures of what it apparently looks like in each, with no evidence that it changes. But ho hum ... it would be interesting to see what it looked like in a Chrome IE tab ...
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
AntiTwitter: @DalekDave is now a follower!