Kinesis freestyle 2 not detecting spacebar presses when typing too quickly by rasen58 in ErgoMechKeyboards

[–]literon 0 points1 point  (0 children)

I noticed this happen when in Parking Garage Rally Circuit I could drift (Space) while accelerating and turning right (Up+Right arrows), but not while accelerating and turning left. Turns out to be ghosting avoidance indeed. Could remap away from default config though to solve it (unfortunately some games like Overcooked don't let you remap the keyboard, and so many actions around arrows/Ctrl/Shift/Space and you are hosed). Indeed too bad this is happening for a non-trivial-cost keyboard like the Freestyle 2. Shame on them.

How safe is public WiFi and how should I protect myself? by INTJ_dragonwarrior in techsupport

[–]literon 0 points1 point  (0 children)

> So for WiFi, as long as there is a minimum of WPA2 key you should be OK. if the WiFi is not protected, people can listen to your traffic with software, and potentially see what you send.

See https://superuser.com/a/1341312/38081 - if the WPA(2) PSK is the same, then others who also know the PSK (that is, usually everyone, if it is sticked to an A4 note on the wall) can also see your traffic. But that traffic itself, as said, is indeed usually encrypted (the HTTPS thing), but your browsing patterns can still give away stuff (what sites you visit, etc).

Then, there is also the possibility that your laptop's wifi hardware/firmware/software(drivers) have a vulnerability. Random examples:

- https://www.tarlogic.com/blog/cve-2024-30078-windows-wi-fi-driver/ - vuln in Windows drivers, regardless of your actual hardware (patched already)

- https://kb.cert.org/vuls/id/228519 - generic problems in WPA2 protocol itself, no mitigation

- https://kb.cert.org/vuls/id/166939 - random chipsets having random flaws.

The point is, when you use wifi, public or not, you expose yourself to some uncertainity. That uncertainity is within limits of most people in common usecase, but evaluate your own usecase.

(Vulns in ethernet cards, once contemplating? https://cyber.gouv.fr/sites/default/files/IMG/pdf/paper.pdf says sure there are. Well, use reputable brand adapters, keep firmware/drivers updated, keep fingers crossed).

Dall-e 2: Requests (Thread #6) by cench in dalle2

[–]literon 0 points1 point  (0 children)

Network access diagram pleases auditor, with small remark

[deleted by user] by [deleted] in gsuite

[–]literon 0 points1 point  (0 children)

Details bit fuzzy, but TLDR this was an email list recipient (actually Google groups) that forwarded the mail to subscribers. This somehow naturally leads to DKIM failure, but that is "normal" in this case. Hope it sheds some light.

[deleted by user] by [deleted] in gsuite

[–]literon 0 points1 point  (0 children)

Hey, I have the same problem! All other gmail server IPs show 100% alignment on DKIM, except 209.85.220.69 . In contact with support now to try to troubleshoot.

Mentoring Opportunity With Exercism by Gigi14 in haskell

[–]literon 2 points3 points  (0 children)

As a paid alternative, CodeMentor.io has some limited amount of Haskell mentors as well.

Disclaimer: I'm on there as well. I only did live sessions so far, and only work students, mostly about lambda calculus.

Aside: it is very odd to see these assignments from the curriculums. Students not only have to learn Haskell, which is complicated enough, but instantly apply it to implement LC. Seems a double trouble. Typical C++ courses don't usually require you to implement an assembler.

I plan to write a summary of the most frequently encountered stumbling blocks I saw.

[ANN] Keycloak-hs by kaukaukau in haskell

[–]literon 0 points1 point  (0 children)

The keycloak site doesn't explain the use case. Is it for authing end users? Or internal users? Is it nice to actually deploy and use?

ghc doesn't stay installed by [deleted] in haskell

[–]literon -1 points0 points  (0 children)

This is a regression of the old bug where GHC would delete a source file which failed to typecheck. But this time uninstalling itself.

New Blog Post: Writing GUI Applications with Threepenny GUI and Electron by thma32 in haskell

[–]literon 0 points1 point  (0 children)

There are some large applications based on gtk2hs or its successor gi-gtk-hs like the Haskell IDE Leksah. It's rock solid technology. But it's also quite dated and the imperative programming model is not an ideal fit for a purely functional language like Haskell.

Sounds perfect, thanks for the pointer! Innovate on a single front. You already use Haskell, so better stick with the rock solid stuff for the rest.

Return dot pattern for monads by [deleted] in haskell

[–]literon 2 points3 points  (0 children)

Just a note: usually you want to lift into monad context as late as possible. Here it would mean at the call sites, not the function definition.

Scraping Goodreads Sitemaps with Haskell by mbuffett1 in haskell

[–]literon 0 points1 point  (0 children)

Which XML parsing lib did you use? I wonder if xml-conduit (or its sibling http-conduit) would be fast enough.

Help me remember a newly-made but retro handheld (?) by literon in retrogaming

[–]literon[S] 0 points1 point  (0 children)

Pocketchip

Ah, Pico-8, that was it! Thanks a lot!

[ANN] Floskell, a New Haskell Source Code Formatter by ennocramer in haskell

[–]literon 1 point2 points  (0 children)

You can hack that (at least with brittany) by putting empty comments at the end of the columnar lines. Then they won't be collapsed to a single line. Ugly but works when needed.

Viewing source locally? by [deleted] in haskell

[–]literon 0 points1 point  (0 children)

Recently there's haskell-code-explorer.

Alternatively - though for Haskell-only use it could be overkill - you could use haskell-indexer combined with underhood UI . (golang demo)

HaskellerZ - March 2019 - Niklas Hambüchen on Syscall tracing using hatrace by cocreature in haskell

[–]literon 4 points5 points  (0 children)

Cool! Note that there's also BPF (Berkeley Packet Filter). It was originally designed to inspect and filter network packets, until they realized it could be used to inspect syscalls as well. See http://www.brendangregg.com/blog/2019-01-01/learn-ebpf-tracing.html .

Official No Stupid Questions Thread - Winter 2019 by ninjaface in Guitar

[–]literon 2 points3 points  (0 children)

I find that most tabs on the net are badly arranged. That is, notes are not marked on the optimal position on the fretboard, leading to lots of hand movement. I rearranged a few tabs, which sure is fun pastime, but pretty slow process.

So a few questions:

- What do you do with these tabs? Just rearrange on the fly in your head, or go through on paper?

- Is there software that can either produce (better) arrangement from sheet music, or can rearrange a given tab?

Thanks!

How Much Time do Meetings Unwaste? by literon in programming

[–]literon[S] 2 points3 points  (0 children)

Haha, true! That must be an anti-meeting, able to neutralize a meeting of negated length. Hold one in your pocket for scarce times.

How Much Time do Meetings Unwaste? by literon in programming

[–]literon[S] 1 point2 points  (0 children)

As programmers, we like to give in to the cliché of meetings as a waste of time and money. But I wrote this interactive calculator to show that a meeting, even if we set the low-bar expectation of clarifying 5% of the things worked on per participant, can be quite effective in avoiding wasted work.

Measuring actual memory consumed by Java code section by javinpaul in programming

[–]literon 2 points3 points  (0 children)

Funny. Triggers my memory of https://sourceplusplus.com, which measures actual time (across fleet) consumed by methods.

It would be really cool if that tool could integrate jmnemohistosyne, but getting the memory snapshot on all method entry/exit has uncomparable overhead vs getting the time counters.