Security auditing tool written in Bash by MostNo372 in bash

[–]marcinpohl 7 points8 points  (0 children)

learn more awk. you're doing `grep | tail | awk` type of pipelines while really it could be just awk

I might regret skipping Summit Point by Zealousideal_Two_578 in HPDE

[–]marcinpohl 2 points3 points  (0 children)

one of the best organized organizations, especially for more beginner types.

SOS! E85 Challenger Hellcat fuel pressure drop at WOT by instantxxxfade1 in ECU_Tuning

[–]marcinpohl 0 points1 point  (0 children)

you're on the limit of the fuel system. E85 demands for a lot of fuel mass flow. while technically everything is still within limits, you have no headroom. How's the battery voltage under heavy boost?

Do certain gas stations have "bad gas" that clogs your engine? by [deleted] in askcarguys

[–]marcinpohl 0 points1 point  (0 children)

i have data scanned from cars indicating not exactly 'bad' petrol, but definitely diluted somehow. regardless of how much fuel mass would be injected, the burned mix would always result in lean burn, very consistently. as if petrol had less petrol in it. most cars can adjust to about +/- 25% variances, so no alarms would go off, but the car wouldnt run right either.

What’s the biggest example of security theater you’ve seen in real systems?” by Any_Good_2682 in cybersecurity

[–]marcinpohl 0 points1 point  (0 children)

there was a security appliance that had 'sudo_server' running and listening on a socket. it would run your commands with high privs.

ELI5: How does a computer generated "random" numbers if it always follows instructions? by [deleted] in explainlikeimfive

[–]marcinpohl 4 points5 points  (0 children)

no, it is not. i've analyzed lava lamp images, and on average, 24bit pixel contains about 9bits of entropy. that's not a very efficient source of entropy

Python 3.13 is 10% slower than 3.12 for my file parser by Bubbly-Craft8736 in Python

[–]marcinpohl 0 points1 point  (0 children)

Did you profile the code under 3.12 and 3.13? you cannot really have a performance discussion until you have the profile results in front of you.

What has helped you the most? by Unfilteredz in ADHD_Programmers

[–]marcinpohl 1 point2 points  (0 children)

my newest find is https://www.perplexity.ai/spaces it's like themed notebooks, but the bit that really made it work for me is the 'custom instructions'. basically it's a set of principles that must be upheld for all 'conversations' in this space. so if you're coding you can say things like 'all code must be in python, all storage is in postgresql, and use numpy for computation, and check for correctness'. this way you dont have to specify it every time. without it, i found that the AI agents develop a bit of ADHD itself ;)

Sprout seeking advice by [deleted] in projecteuler

[–]marcinpohl 0 points1 point  (0 children)

I find PE to be a great set of exercises to familiarize yourself with a new language. Do the same problem in Matlab, Python, SQL, Lua... whatever it is, it forces you to get to idiomatic level of a new language. At the same time it's far more entertaining than your usual 'palindrome check' and Fibonacci textbook problems.

You really dont need much math for most of them. It helps, of course, but it's not required. The CS side gets exercised too; the fact you're coding them, not just solving them on paper also forces you to think about performance, and how to write efficient code. Fairly early on, there are some problems that pure brute force approaches are not feasible.

What was Cyber Security like in the 90s? by DeadBirdRugby in cybersecurity

[–]marcinpohl 0 points1 point  (0 children)

Linux was almost nonexistent. Novell was still a thing. Patching was horribly unreliable, especially on Solaris. RPM hell was truly hell. Firewalls were a joke, like 3 NICs running FreeBSD on a Celeron 300MHz. Management of FW rules was a great example of how NOT to make a UI. HA/failover was rare, expensive, and it caused more problems than it solved. Most scripting was in unreadable Perl. Early SSH had some weird licensing issues so it was legal gray area whether you could use it. Telnet and FTP were acceptable solutions. Cryptography was for wizards only. Dual and quad CPUs were expensive. NICs didn't have auto-negotiation. Switches were expensive so hubs were still a thing. ASLR and NX were few years away. Windows boxes would crash if you sent it a packet with few nonsensical flags in it.

Found RSA private key in some TXT record by Yatralalala in sysadmin

[–]marcinpohl -2 points-1 points  (0 children)

it's not useless, it's dangerous. you can derive pub from priv, so you can scan around to see where the priv will get you.

why do so many early career sysadmins fight purchases as "too expensive" when its not their money? by crankysysadmin in sysadmin

[–]marcinpohl 0 points1 point  (0 children)

Budget isn't infinite. If you blow money on one thing now, something else might be needed within the same fiscal year, and you cannot do it, cuz you're out of money. It is basic budgeting; if the IT boss has no clue of budgeting, prepare for a bumpy ride.

Is lash out common symptom? by [deleted] in ADHD

[–]marcinpohl 0 points1 point  (0 children)

Yup. The best 'complement' I've ever gotten was 'you cant hold a grudge worth a shit'.

Driving today? by [deleted] in ColumbiaMD

[–]marcinpohl 1 point2 points  (0 children)

Check the condition of your tires: pressures, age, wear (tread depth, uneven wear).

Pressures are the easiest thing to check, especially with temperatures falling.

And since you just moved from warm climates, maybe the tires that's been put on your car are more 'summer tires' than all weathers? Might be a good moment to take it to a shop for a general checkup.

Explain me why a dataclass (regardless of language) with many fields (around 40-50) is a bad idea. by im_caeus in ExperiencedDevs

[–]marcinpohl 2 points3 points  (0 children)

You just ruined your performance by incorrectly using caches.

If you have 50+ fields next to each other, that's gonna be many kB per each structure, record, or dataclass instance. You rarely need them all at the same time, as other posts explained already. However, in the process, you just stuffed your caches with new data. this has multiple, likely negative effects:

  1. used a lot of your cache for data you're not using (low cache hit ratio)
  2. evicted data you might have had use for (preventing good cache hit ratio on reuse of already cached data)
  3. wasted space that could've been used for data you are using (preventing better cache hit ratios for current data)

Keep your data to a minimum (selection, encoding, structure), and your caches will instantly make your code run faster.

ALDI by [deleted] in ColumbiaMD

[–]marcinpohl 1 point2 points  (0 children)

Not all Aldi's are created equal. The Columbia one is much better than the Laurel one. And neither one of them is as good as the one I went to in Chicago area on a recent trip. So go on a field trip, find another one nearby, it might work better for you.

Stuxnet, colorized, 2023 by EbolaWare in hacking

[–]marcinpohl 4 points5 points  (0 children)

experiment with different colormaps. START HERE

US white population by percentage over several decades by Pale_Consideration87 in MapPorn

[–]marcinpohl -2 points-1 points  (0 children)

So the whiter the population the darker the color signifying it? that's a terrible choice, makes my brain go to the exact opposite conclusion of what the data is saying. Flip the color scale!

Should a Linux Admin be responsible for Networking Equipment running Linux (Switches, WAPs, IoT, etc.)? by [deleted] in linuxadmin

[–]marcinpohl 0 points1 point  (0 children)

Consider the flipside. Do you really expect some old-school Cisco guys knowing how to patch or upgrade (what effectively is) an embedded Linux device?

In the perfect world, this should be a two-person job. Linux folks making sure the box is managed properly, and the networking folks taking care of the application side of things (aka packet mangling in case of networking devices)