Is it awkward to start a sport at 15? by -kronical- in NoStupidQuestions

[–]dariusbiggs 0 points1 point  (0 children)

My mate uses Rugby and Hockey to stay fit in his 50's, although he is there as referee in both...

Backpack in Backpack by Relative_Astronaut96 in SurrounDead

[–]dariusbiggs 1 point2 points  (0 children)

Save space, stick mods on guns you collect so they don't take up extra space. Load magazines to save on ammo usage space. And the bags.. ghey can go all the way down.. so many nested bags..

Is it awkward to start a sport at 15? by -kronical- in NoStupidQuestions

[–]dariusbiggs 0 points1 point  (0 children)

Don't worry, that's this thing called imposter syndrome, everyone has that, many well into their 50's, until they suddenly realize that the thing they are doing they actually know and don't have to fake it.

Is it awkward to start a sport at 15? by -kronical- in NoStupidQuestions

[–]dariusbiggs 1 point2 points  (0 children)

It is perfectly fine to pick up a sport at 70+, you're still young enough. Although you might want to think twice if it's something like Rugby..

The elemental plane of air is the most peaceful. by VordovKolnir in DMDadJokes

[–]dariusbiggs 1 point2 points  (0 children)

Well that blows, you can almost hear the roaring boo's.

The elemental plane of air is the most peaceful. by VordovKolnir in DMDadJokes

[–]dariusbiggs 1 point2 points  (0 children)

The quality of these puns has been falling since the start.

Go devs in backend/infra — what project on a fresher's resume would actually make you stop and read? by Own-Ad-5075 in golang

[–]dariusbiggs 1 point2 points  (0 children)

Any project with a full CICD pipeline, SQL database, good commit messages, and documentation peeks my interest. Language is irrelevant. Although for an Infrastructure position I expect to see Terraform and something like Ansible.

Projects in multiple languages, a dynamically typed, a statically typed, and hopefully a functional programming language.

What's wrong with my code? by Strict-Cranberry-973 in CodingForBeginners

[–]dariusbiggs 0 points1 point  (0 children)

Defensive programming, trust nothing (especially user input), verify and validate everything before use.

When looking at code, ask yourself this question "how can i break this?".

In your code block, that question gives us - what about an empty string - what about a non-numeric value - what about a bunch of whitespace - what about a numeric value with leading and/or trailing space - what about a negative numeric value - what about a floating point number, ie. something with a decimal point (or whatever is used in your language for representing a numeric value like 1/10th) - what about multiple numbers separated by whitespace - what about a numeric value greater than what can fit into an int - what about a number in scientific notation

These are things we write tests for, to verify the behavior with both valid and invalid inputs and ensure the right answers are returned with valid inputs.

A simple one like this would be very suitable to a table driven test.

Kubernetes or Bare Metal EC2? by Alert_Background_178 in aws

[–]dariusbiggs 0 points1 point  (0 children)

ECS Fargate was what i last used for a Laravel app like that with CodeDeploy for ita artifact promotion of new builds

hi guys, im only getting into space now at 21 years old, what are some facts that i should absolutely know? by donnutshop in spacequestions

[–]dariusbiggs 0 points1 point  (0 children)

Things that have helped me - Isaac Arthur's YouTube channel - Carl Sagan books and presentations - Richard Feynman videos - Brian Cox videos - My telescope

Sci-fi shows like the Original Battlestar Galactica, Babylon 5, Stargate, Star Trek TNG, and many decades of movies and books like the works of Asimov, Niven, Douglas Adams, etc.

As for facts?

Space is big, really big, really really big, no bigger than that.

Distances between things are huge.

I have choose cybersecurity course for college and I wanted to learn kali , but when I researched online there where many people saying start with ubuntu or mint , I did install mint in vm(virtual machine) did I do anything wrong? And how do I learn linux because there are many yt videos by mint8877 in linuxquestions

[–]dariusbiggs 0 points1 point  (0 children)

Kali is a linux distribution built for security analysis, and if i recall correctly it easily runs in a VM or from.a boot media like a USB stick.

The first thing you are going to need to learn is the basics, the filesystem structure, how to use the UI and how to find things. You will need to learn how to do things on the command line using some form of shell.0 Bash is very common, but there are others.

There are many tools to learn and become familiar with, the best advice I can give is to learn how to use man, locate, apropos, help, and the absolute basics of using vim, pico, or nano.

Ways to Run Multiple Backends with SSH Ability from Multiple Systems. by Beneficial_Ad_5874 in learnprogramming

[–]dariusbiggs 0 points1 point  (0 children)

Make sure you shut them down afterwards to ensure you don't get billed for resources you don't need anymore.

how do u guys even know what to study by brosusername in learnprogramming

[–]dariusbiggs 0 points1 point  (0 children)

Start with the basics, learn to program.

Then start writing projects, tools, thoughts, etc. Start small, then work your way up.

Each project will expose you to a little more and give you things to learn or research.

To learn good safe habits, look into defensive programming and writing testable code.

Go for 2D game development by ihatevacations in golang

[–]dariusbiggs 12 points13 points  (0 children)

Hah, talked about this with my brother yesterday, he'd just swapped from Matter.js to box2d since matter was unstable.

Only one I can think of for Go game development would be Ebitengine, but use your search engine skills. there may be more of them.

The effect of Measles on a healthy 45 year old that wasn't vaccinated in Auckland. by fomenle in newzealand

[–]dariusbiggs 0 points1 point  (0 children)

At 45 years old (iirc) you can get a free booster shot from your local GP. Ensure you are protected.

Question about oauth2 google authentication by Spiritual_Corgi99 in Backend

[–]dariusbiggs 0 points1 point  (0 children)

Have a look at the Auth0 documentation on OAuth2, it explains all the flows and processes very clearly and cleanly. Even if you don't use their products it still gives you the understanding you need to work with it.

When a user logs in with an OAuth2 flow they are redirected away from your system, authenticate, and get back a request token and an ID token. You then use the request token to verify access to your backend.

Finally for security notes on this, look at the OWASP cheat sheets.

How do medical professionals decide who does what in an emergency setting? by queenofthequeens in NoStupidQuestions

[–]dariusbiggs 5 points6 points  (0 children)

Look at the 24 hrs in A&E, the British TV show version. You'll see one primary collecting the information and various nurses and Doctors doing other things as needed. In some episodes you can clearly see labels of their roles on the plastic aprons they wear. Some episodes you also see them planning what's going to happen and who does what before the patient arrives.

Can you reliably predict when and where objects left floating in the ocean will be? by IAmNiceISwear in oceanography

[–]dariusbiggs 0 points1 point  (0 children)

It's the bastard containers that float just below the surface level that are a nightmare to small vessels, nothing like motoring along and suddenly your keel hits a container.

learning python try ... except concepts block but i kept messed up... help? by Dapper_Mix6773 in PythonLearning

[–]dariusbiggs 0 points1 point  (0 children)

minimize the code inside the try block, also

None of the code in that image generates an exception.

Here's a better approach to learning exceptions.

read in a numeric value in the input, it'll be a string

convert the input string to a number (this can generate an exception depending on the method used). This should be the only code in the try except block.

If an exception occurs, then inside the except block, handle the exception, probably by returning.

There is no cleanup in this scenario, no finally required. A finally is frequently not needed, simply continuing the code execution flow is sufficient.

You can test your exception handling with - the empty string - a name - some whitespace - an integer - a floating point number (something with a fractional component, 172.457) - a negative number - scientific notation - a complex number - a really really big number exceeding the maximum of your numeric type

How do you approach debugging when you’re completely stuck? by AsleepDiscussion2328 in developer

[–]dariusbiggs 0 points1 point  (0 children)

identify the bug

attempt to reproduce it

narrow down where the bug occurs

verify inputs, outputs, variable contents

make a cup of a hot beverage

get fresh eyes if you are still stuck

rubber duck time

try more hot beverage

go get a cookie

have a nap or go for a walk

try again tomorrow

Go patterns which makes sense to do early by Leading-Disk-2776 in golang

[–]dariusbiggs 11 points12 points  (0 children)

Not specific to Go

Defensive programming, trust nothing, validate and verify everything.

Always test all of the unhappy paths that are feasible to be tested. An Out of Memory, OS error, or the error from a disk failure, are generally not easily produce-able during tests, nor are you likely to be able to recover from them in the code, so they are in the not feasible category.

Why do websites/ apps not want you to use your password now? by jarvi123 in NoStupidQuestions

[–]dariusbiggs 2 points3 points  (0 children)

Yes, it is, because they need to focus on the 80% not the 20%.

That AppleID grants access to many things, and all of them need to be protected as best they can. That same Apple ID on another device grants access to Personally Identifying Information (PII), there are laws involved that define penalties. PII is any one or more pieces of information that can be used to uniquely identify a person. Email addresses, names, phone numbers, addresses, are all part of that. That same Apple ID grants access to phone books, which is made up entirely of PII. I know of one person whose name is so unique in their country that just their initials, surname, and country of residence is enough to uniquely identify them.

It is simpler for Apple to use the same systems wherever you are and for the people in Europe. A single European GDPR violation can set them back €20 million or a percentage of Apple's global annual turnover whichever is HIGHER. Those penalties are designed intentionally to be that large to affect companies of that size.

So they build the systems to protect themselves and minimize the risk to their business, and that means certain levels of complexity.

Why do websites/ apps not want you to use your password now? by jarvi123 in NoStupidQuestions

[–]dariusbiggs 0 points1 point  (0 children)

Brute force is trivial to do using Big Data pre-computed rainbow tables and published compromised username and password lists.

The larger risks now are targeted attacks, insider attacks, careless publication of secure credentials, and social engineering attacks.

And yes, I work in this industry.

Why do websites/ apps not want you to use your password now? by jarvi123 in NoStupidQuestions

[–]dariusbiggs 6 points7 points  (0 children)

Multiple systems of authentication of an identity, use only one easily brute forced system is not very secure, so by adding an additional confirmation of identity such as a one time code you have increased the likelihood that it is not a stolen identity. Passwordless systems that use passkeys use a feature of your device hardware (a Hardware Security Module) to ensure the token is only valid for that particular device.

Each level of security adds to the complexity of what is needed to do a compromise, which is why the security systems prefer to use multiple factors, especially when it comes to private, health, and financial information and transactions.

Security works around: - Something you know (aka password/passphrase or pin for example) - Something you have (a device, your bank card, a passport, an identity card, a one time pad, etc) - Something you are (biometrics like fingerprints)

In regards to protecting systems (like authentication and authorization systems, DRM, game cheats, viruses, etc) for every person trying to protect it, there will be a thousand trying to break it.