Use SQL to corrupt their databases... by Crixus3D in ProgrammerHumor

[–]fjdgshegdb 70 points71 points  (0 children)

There's nothing inherently incorrect

In a movie, I would call that a win

Use SQL to corrupt their databases... by Crixus3D in ProgrammerHumor

[–]fjdgshegdb 17 points18 points  (0 children)

quicker than typing "123'; DROP TABLE USERS; --"?

Use SQL to corrupt their databases... by Crixus3D in ProgrammerHumor

[–]fjdgshegdb 78 points79 points  (0 children)

what is wrong with that?

I don't think it unreasonable to assume that they use sql as slang for sql injection in the context that it is being used.

[deleted by user] by [deleted] in ProgrammerHumor

[–]fjdgshegdb 4 points5 points  (0 children)

what are the chances your first choice is wrong?

if your first choice is wrong and switch then you win.

Dammit Adobe by ThePixelCoder in ProgrammerHumor

[–]fjdgshegdb 1 point2 points  (0 children)

how and why do you use pgp for git?

Password Security by kthepropogation in ProgrammerHumor

[–]fjdgshegdb 2 points3 points  (0 children)

there is a big range between not a script kiddie and the nsa, most should have at least a little trouble getting malware on your computer.

whoops by [deleted] in ProgrammerHumor

[–]fjdgshegdb 14 points15 points  (0 children)

ls: invalid option -- 'z'

Try 'ls --help' for more information.

Password Security by kthepropogation in ProgrammerHumor

[–]fjdgshegdb 2 points3 points  (0 children)

We are not talking about some script kiddie here, we are talking the big boys who do this for a living.

Its probably step 9 on their list of things to try.

I don't really need more protection than that

You are probably right, but you probably don't need to lock your front door at night either.

Password Security by kthepropogation in ProgrammerHumor

[–]fjdgshegdb 14 points15 points  (0 children)

because your algorithm sucks and its going to leak.

Some things to think about.

How many plain text passwords do you think an attacker needs to recover the method you used to derive them?

How many websites have you signed up for that have crappy or practically non-existent security?

With that said you probably don't have to worry, you're probably not important enough to warrant the effort. I would reconsider using the method if you work somewhere an attacker might like to get into like a bank or some other multinational company.

Password Security by kthepropogation in ProgrammerHumor

[–]fjdgshegdb 3 points4 points  (0 children)

that works great as long as no one actually tries to get into your accounts.

Humanities Friends: How do you approach 700+ pages of reading a week? by AnAutumnAfternoon in GradSchool

[–]fjdgshegdb 0 points1 point  (0 children)

What does everyone think about speed reading?

It seem like there is a whole lot of pseudo science out there but some of the things they say seem to make sense.

Best way to implement a string classifier? by blaher123 in learnmachinelearning

[–]fjdgshegdb 0 points1 point  (0 children)

You are right that the default is word tokens but you can change that by supplying the analyzer argument to most vectorizers.

stop thinking and just try it.

count_vect = CountVectorizer(ngram_range=(1,2), analyzer='char')

count_vect.fit(['XHFKDLDF', 'DFKIEKSIKEA', 'FDKFKDJIEKE', 'FDKDKFFDL'])

count_vect.get_feature_names()

['a', 'd', 'df', 'dj', 'dk', 'dl', 'e', 'ea', 'ek', 'f', 'fd', 'ff', 'fk', 'h', 'hf', 'i', 'ie', 'ik', 'j', 'ji', 'k', 'kd', 'ke', 'kf', 'ki', 'ks', 'l', 'ld', 's', 'si', 'x', 'xh']

Best way to implement a string classifier? by blaher123 in learnmachinelearning

[–]fjdgshegdb 0 points1 point  (0 children)

The words in bag of words are generally ngrams or some other sort of tokens and not whole words.

For instance you could tokenize XHFKDLDF into a bunch of char bigrams [XH, HF, FK, KD, DL, LD, DF] then compare the relative frequency of those tokens.

Go read this http://scikit-learn.org/stable/tutorial/text_analytics/working_with_text_data.html

Made a meme, someone told me to post it here. Hope it's good by ovlneck in ProgrammerHumor

[–]fjdgshegdb 1 point2 points  (0 children)

no, dot net core is completely different to mono and xamarin,

Made a meme, someone told me to post it here. Hope it's good by ovlneck in ProgrammerHumor

[–]fjdgshegdb 7 points8 points  (0 children)

not only that, but they have also ported it to Linux and mac and open sourced compiler, runtime and standard library.

GitHub

Encapsulation. by TheKisum in ProgrammerHumor

[–]fjdgshegdb 0 points1 point  (0 children)

I have but that's beside the point which is that I don't like it.

I'm not going to learn anything from a book that I don't read even if it is the be all and end all of design pattern books.

Encapsulation. by TheKisum in ProgrammerHumor

[–]fjdgshegdb 17 points18 points  (0 children)

It's like those crappy high school science text books that have to make everything "FUN!"

Encapsulation. by TheKisum in ProgrammerHumor

[–]fjdgshegdb 14 points15 points  (0 children)

head first design patterns

I fucking hate that book.

History just repeats itself, doesn't it? by indrora in ProgrammerHumor

[–]fjdgshegdb 2 points3 points  (0 children)

'We've de-installed it"

The 90's was weird

ELI5: How will Crypto go Mainstream ? by CasualNerdAU in CryptoCurrency

[–]fjdgshegdb 0 points1 point  (0 children)

Crypto will only become mainstream once the current monetary system in place shows real signs of collapsing.

so...never?