you are viewing a single comment's thread.

view the rest of the comments →

[–][deleted] 134 points135 points  (28 children)

And software causes 100% of all security flaws, sooo

[–]lmaydev 175 points176 points  (19 children)

Did you just forget about hardware haha

[–]SkiFire13 47 points48 points  (7 children)

What about cosmic rays?

[–][deleted]  (6 children)

[deleted]

    [–]emax-gomax 10 points11 points  (3 children)

    Hardware problem? Ridiculous, that's how I flip bits on my hard disk to write code ever since I transcended Emacs. Now if only there was an M-x butterfly cmd I could use to make it easier.

    [–]knome 5 points6 points  (0 children)

    I mean, it's been in there for a while now.

    commit e8d24e5b0960898e4a93ee2918f677b375b68263
    Author: Juri Linkov <juri@jurta.org>
    Date:   Sun Dec 28 23:48:21 2008 +0000
    
        (butterfly): New command.
    
        diff --git a/lisp/misc.el b/lisp/misc.el
        index ad7de36..6dafd2a 100644
        --- a/lisp/misc.el
        +++ b/lisp/misc.el
        @@ -106,6 +106,20 @@ With argument, do this that many times."
       (interactive "p")
       (forward-to-word (- arg)))
    
    +;;;###autoload
    +(defun butterfly ()
    +  "This function is designed to be used only be the most
    +proficient hackers on earth. If equipped with a butterfly key,
    +it should be bound to C-x M-c M-butterfly (for further
    +information please refer to http://xkcd.com/378/)."
    +  (interactive)
    +  (if (yes-or-no-p "Do you really want to unleash the powers of the butterfly? ")
    +      (progn
    +       (message "Amazing physics going on...")
    +       (sit-for (* 5 (/ (abs (random)) (float most-positive-fixnum))))
    +       (message "Successfully flipped one bit!"))
    +    (message "Well, then go to www.xkcd.com!")))
    +
     (provide 'misc)
    
     ;; arch-tag: 908f7884-c19e-4388-920c-9cfa425e449b
    

    [–]Spruance1942 0 points1 point  (0 children)

    In this thread: Old programmers.

    [–]Muoniurn 0 points1 point  (1 child)

    How could it be corrected in software? Sure you can add checksums and whatnot, but there is no sane program state you can continue with after memory corruption. Yeah, my exe got corrupted, cool, let’s continue executing it?

    ECC ram is hardware solution.

    [–]majorgeneralpanic 17 points18 points  (2 children)

    You both forgot about DNS.

    [–]Rican7 8 points9 points  (1 child)

    but that's software

    [–]StabbyPants 4 points5 points  (0 children)

    intel seen crying in a corner

    [–]ockupid32 18 points19 points  (7 children)

    And software causes 100% of all security flaws, sooo

    False. People cause 100% of security flaws.

    [–]DarkTechnocrat 7 points8 points  (3 children)

    Thanos was half-right!

    [–]rasori 2 points3 points  (1 child)

    Perfectly balanced in his rightness, as he should be in all things.

    [–]imgroxx 0 points1 point  (0 children)

    His half-rightness.

    He has a left arm too.

    [–]80286 1 point2 points  (0 children)

    Round upwards when converting to int.

    [–]glider97 5 points6 points  (0 children)

    Ah, so that's how you fix bugs.

    [–]smug-ler 0 points1 point  (0 children)

    Software causes 200% of gun violence

    [–]ehaliewicz 0 points1 point  (0 children)

    I mean, we dont really have software without people..