|
First, this is the kind of question asked by someone given an assignment in school. Normally, they aren't answered. However, you have an opportunity to have a little fun.
Come up with an answer that's as advanced as you can come up with. For this one, I'd probably use LINQ or lambdas because it's obvious the guy is in a beginner's class, and any instructor worth his salt will raise an eyebrow at something like that. The more over the top the solution is, the more likely it is that his instructor will notice the work isn't his.
BTW, nothing will change regarding the quality of questions. Someone else already pointed it out - CodeProject's primary goal is to make money, and the number of visitors - regardless of coding adeptitude (I know it's not a word, but it was fun to type) - is how it makes that money.
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
I am strongly against that approach. As other have suggested there are no stupid questions. I generally agree. But if a young'un is having problems, one of the only call centers that the OP can use is CP. I would think that following your suggestion would pull down the value of this site.
Gus Gustafson
|
|
|
|
|
A young'un having problems ain't the same as a young'un that's too damn lazy to figure out something like a homework assignment on his own, or at the very least, google for an answer. Approach it any way you see fit, but complaining about it in the lounge is pointless.
Either answer the question, or don't.
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
gggustafson wrote: Recently ?? I have been visiting quick answers - view unanswered questions.
That question was posted & answered on 26th Oct 2013 !
|
|
|
|
|
Unfortunately, CP allows the OP to repost the question by making a minor Improve question entry. I belive that updates the DTG of the question.
Gus Gustafson
|
|
|
|
|
Another issue is that the original poster rarely comes back and marks the answers for correctness 
|
|
|
|
|
I think it may be worse than that - they don't come back to read the solutions!
Gus Gustafson
|
|
|
|
|
It's a funny world is electronics. A bus has rails, sometimes several of them, only one of which is on the ground. It also has buffers. But these buffers (often bidirectional) are a means of getting on the bus, and they can contend for it. There are usually many conductors on the bus, and many drivers, though each driver should only drive one conductor at any time. The bus has signals, and may also have a clock. If you get on the bus, you may be required to handshake, and if you don't, you may well cause exception. The bus doesn't have a destination, but it does have addresses, maybe billions of them. Some users might have privileged access. Usually, if you miss the bus you have to wait for many cycles
Ger
|
|
|
|
|
|
May I steal it and send it to FacebookLand?
|
|
|
|
|
|
It is very buggy, incomplete, crashes whenever you take a quiz or a test, has hundreds of spelling and grammar mistakes, and is very slow, among other things.
Ivy Tech is trying it out, but it seems they will pass it on due to the many issues it has.
I was trying to take a quiz when it stopped loading.
The timer on quizzes/tests keeps going even if the question is loading! How stupid is that?
What do you get when you cross a joke with a rhetorical question?
|
|
|
|
|
I guess just about all of us have now heard about the heartbleed bug[^].
From the rather massive media coverage it appears that this can be exploited in ways that allows an attacker to potentially retrieve logon information such as user names and passwords.
If this is possible, it also means that the actual password, and not a cryptographic digest, has been sendt to the server - and that the actual real password is kept in memory, and that it is either stored locally by the server, or the server can retrieve the password from another server on the network, or farward it to another server for authentication.
Even if there was no heartbleed bug, this sounds like a f***up on a much grander scale than the heartbleed bug, because it makes it likely that a lot of people believe they have implemented strong security, while actually implementing something that is quite vulnerable.
Thoughts anybody? or jokes (if you can come up with good ones)
[Update]
Just to be clear: I think we should allways use transport level security, and even then we should never send the password in a form that can be easily reconstructed.
modified 14-Apr-14 6:00am.
|
|
|
|
|
Obligatory XKCD link[^].
Espen Harlinn wrote: Thoughts anybody? or jokes
Covering all bases here.
|
|
|
|
|
|
Go to QA, and you will see that the "next generation" of developers not only store clear text passwords, but that they access them by concatenating strings:
string sql = "SELECT * FROM Users WHERE UserId='" + tbUser.Text + "' AND Password='" + tbPassword.Text+"'"; So not only is the site vulnerable to Heartbleed, but SQL Injection and password bypass. So if I type:
Chris Maunder';-- in the Username textbox, I could log in as the Admins...(Needless to say, that won't work here on CP!)
Worse, if you pick them up on it they give the keyboard equivalent of a shrug and ignore you...
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
OriginalGriff wrote: developers
Feeling generous are we? More like "copy/pasters".
|
|
|
|
|
To you and I (and the majority of Lounge inhabitants) they are "copy'n'paste" merchants.
To themselves, and their lecturers - and worse, their bosses - they are developers par excellence!
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
I think you have way too less confidence in your abilities. Just because you know you are worse than me, you cannot call me names.
|
|
|
|
|
OriginalGriff wrote: developers par excellence!
Unfortunately, all too true. I know of at least 2 members that have been here for multiples years. One such person has gotten his entire application written by copying and pasting code around in questions getting people to write and rewrite his code for him. Even more sadly, this person cannot write code, cannot debug his code or anything else (by his own admission BTW), but for some strange reason, thinks he is qualified to teach students how to program! WTE?
I have said it before and I will say it again, Griff my old friend, you Sir could probably teach Job a thing or two. I don't know how you do it. But my hat is off to you!
|
|
|
|
|
OriginalGriff wrote: Worse, if you pick them up on it they give the keyboard equivalent of a shrug and ignore you...
I know - and they'll continue to get paid for it ... it's like 2013 never happened[^]
|
|
|
|
|
OriginalGriff wrote: So if I type:
Chris Maunder';-- in the Username textbox,
Uh, 'Griff? Can I have my password back now? Please?
cheers
Chris Maunder
|
|
|
|
|
Oh... All right...
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
Espen Harlinn wrote: If this is possible, it also means that the actual password, and not a
cryptographic digest, has been sendt to the server
The way I read it is that the key pair can be read and thus the pwd decrypted. So the pwd is stored in an encrypted form so it doesn't look as bad as you think.
At least that's my take, but I don't know jack about security stuff.
"The whole idea that carbon dioxide is the main cause of the recent global warming is based on a guess that was proved false by empirical evidence during the 1990s." climate-models-go-cold
|
|
|
|
|
Munchies_Matt wrote: so it doesn't look as bad as you think
Errhm ... hearbleed lets you read memory from the server:When it is exploited it leads to the leak of memory contents from the server
There shouldn't be any passwords to read from the memory on the server - only the cryptographic digest, which, on it's own should be worthless ...
|
|
|
|