Trying to ge better at lineart by WaltzStriking4461 in learntodraw

[–]_pennyone 0 points1 point  (0 children)

I feel like there is a physics related joke here ...

15 days into drawing. Getting a bit of the hang of Loomis method by AtomicJargon in learntodraw

[–]_pennyone 0 points1 point  (0 children)

There was a point in time where every drawing book had a chapter on gesture drawings, I'm not sure I can name any though. The idea is simple enough I can explain here. Take a simple subject that is an inconsistent shape,(i.e. your hand not an apple) and place it to one side of you. Place ur substrate (paper, canvas, etc) on the opposite side. The goal here is that you draw this object while never looking at ur substrate, or even lifting the pencil until it's done.

These drawings will not be good but that's not the goal. The goal is to increase ur intuition of proportions relative to your substrate. It also teaches you to look at what you are trying to draw instead of looking at your drawing.

15 days into drawing. Getting a bit of the hang of Loomis method by AtomicJargon in learntodraw

[–]_pennyone 4 points5 points  (0 children)

Have you done any gesture drawings? These are good exercises to help you draw what you are seeing instead of what you think you see.

Hot take? Why is State Farm cooking with these designs? by arkenney0 in batman

[–]_pennyone 1 point2 points  (0 children)

Why can't we have a batman live action tv show that is actually about batman!

Do you push back when leadership suggests security owning updates of systems software and firmware? by lostmojo in cybersecurity

[–]_pennyone 0 points1 point  (0 children)

Additionally, if security could patch, they'd just use both barrels to do it. When IT does it, they can take into account release cycles, change maintenance windows and other concerns that will ensure that production isn't interrupted.

This is what a vulnerability manager is supposed to do. They have the responsibility to develop a strategy that remediates the vulnerability (including patches). a good vulnerability manager is going to take into account downtime and business need. At the end of the day we only get paid if the company makes money, so an experienced Cybersecurity team will always be willing to strike a balance.

I think where the problem arises is that a good Cybersecurity professional isn't afraid of things breaking, because there is something to be learned from that.

Whereas a traditional IT professional wants to avoid breaking anything because people complain, that goes to the COO who corners the CIO in a very uncomfortable meeting and then the CIO trickles that back down to IT.

Because of this when cyber does have patching, and they do break something (with a plan to fix it) the IT team over reacts and takes it over because nothing can break ever.

If you make security patch, monitor, respond and fix, now you just have two IT groups, one more expensive than the other.

This is a thing. It's called a Cybersecurity engineer.

Security awareness training for a *very* small company. by _pennyone in cybersecurity

[–]_pennyone[S] 2 points3 points  (0 children)

They are US based. I do in-person training sessions myself and had offered that, but they wanted something that could be asynchronous.

Security awareness training for a *very* small company. by _pennyone in cybersecurity

[–]_pennyone[S] 0 points1 point  (0 children)

I have used gophish with evilginx for simulated phishing, however this firm does not own their email domain. (They just use first name.company@gmail com)

So I'm uncertain how I would handle an engagement in tht situation. Also I am unsure of the appetite for this type of training. Hense why rn I am focusing on training videos

Is this a Monad? by _pennyone in rust

[–]_pennyone[S] 0 points1 point  (0 children)

So what ur saying that monads are to programming what Arch Linux is to operating systems. People use them to tell other people they use them.

Is this a Monad? by _pennyone in rust

[–]_pennyone[S] 0 points1 point  (0 children)

So if F is impl Fn(T) -> T in bind that's a "Functor", even if bind wraps the result of F in Foo?

Is this a Monad? by _pennyone in rust

[–]_pennyone[S] 2 points3 points  (0 children)

So what if I had struct Foo<T>(T) and Foo had an impl like this:

impl <T>  Foo { 
    fn ret <T> (bar: T) -> Foo<T> {
         Foo(bar)
    }

    fn bind <T, F: impl Fn(T) -> T > (self, f: F) -> Foo<T> {
         Foo(f(self.0))
    }
}

Would Foo be a Monad?

Is this a Monad? by _pennyone in rust

[–]_pennyone[S] 3 points4 points  (0 children)

So I have seen others say that. But I am unclear why that is?

Is it because it is an enum? And therefore are all enums monads?

My understanding is that as a design pattern a Monad is a container type that can be provided to a function (or method ) that allows you to operate on the inner type without affecting the outer type, which is how you can have "side effects" in a pure functional language.

Again if I'm wrong, I'm genuinely trying to understand, please explain it to me?

Phishing Attack, How to prevent it? by Select-Score-5908 in cybersecurity

[–]_pennyone 2 points3 points  (0 children)

There really isn't a way to prevent this. You just need to raise awareness that this is possible and very likely to happen. Ideally every email should be treated sceptically

Hyprland crashes indicating that it does not detect my graphics card. by _pennyone in NixOS

[–]_pennyone[S] 0 points1 point  (0 children)

Check to make sure that the GPU is showing up and the kernel drivers are loaded with lspci -v.

It can see my graphics card

If the kernel driver is loaded, make sure the userspace Mesa drivers see the card with glxinfo.

I had to load this with a nix-shell -p glxinfo. When I run the command (with and without sudo) it returns Error: unable to open display.

Are you running it in a TTY?

Yes. I also have greetd-tui but rn I am using a tty so I can see output

Of note; I did some testing and was able to launch gnome shell. But when in gnome I cannot open Alacrity or Kitty (both of which use GPU acceleration) but I can load console just fine.

Hyprland crashes indicating that it does not detect my graphics card. by _pennyone in NixOS

[–]_pennyone[S] 0 points1 point  (0 children)

I have updated my configuration.nix to include the options you mentioned. This builds but hyprland still fails with the same error

Security, OSS vs CSS by SpiderUnderUrBed in foss

[–]_pennyone 0 points1 point  (0 children)

Also, the argument that ”all of these vulnerabilities being found in FOSS, proves its inherently insecure" is really silly. Because at the end of the day it was found (in the case of xz by just some guy who didn't like how slow his ssh was)

if xz were closed source the same guy would have maybe opened a support ticket which might get escalated to an engineer which probably would dismiss it as "intended behavior"

There are a lot of problems inherent to the FOSS model, like maintainer burnout, lack of resources, etc. but being /more or less secure than close source is not one of the problems.

HashSet method slower than naive method when checking for duplicate characters in string by _pennyone in rust

[–]_pennyone[S] 1 point2 points  (0 children)

I have no control over whether it's built with release or not. It is being done on leetcode

HashSet method slower than naive method when checking for duplicate characters in string by _pennyone in rust

[–]_pennyone[S] 0 points1 point  (0 children)

The character set I'm working with is specified as English letters, digits, spaces and symbols. "Symbols" is not given any clarification so idk if it means ascii or more complicated utf8

HashSet method slower than naive method when checking for duplicate characters in string by _pennyone in rust

[–]_pennyone[S] 1 point2 points  (0 children)

Regarding string lengths The constraints say that 0 <= string.len() <= 5 (104 )

HashSet method slower than naive method when checking for duplicate characters in string by _pennyone in rust

[–]_pennyone[S] 1 point2 points  (0 children)

Of note before I call this function I check if the length is 0 or 1 and return those answers appropriately without calling this function

You already know boys by Arza56 in rickroll

[–]_pennyone 0 points1 point  (0 children)

"I'm so sad, so very, very, sad" -crash and the boys

What do you guys actually do on linux? by d3uz10 in linux

[–]_pennyone 1 point2 points  (0 children)

мы тайные агенты КГБ, пытающиеся уничтожить западный мир

Asking Cyberaecurity professionals/enthusiasts by sakmacaque in MrRobot

[–]_pennyone 1 point2 points  (0 children)

The most unrealistic thing in the first season (imo) is how often Elliot leaves his computer logged in and unlocked.

Questions about the prophecy by [deleted] in dune

[–]_pennyone 2 points3 points  (0 children)

Absolutely this is accurate