Would be funny if somebody went overboard and actually rooted the box, deleted the other entries and changed the site so the problem couldn't be solved (or closed the competition).
Then I guess you'd have to give him the job by default :-)
Always has to be a "him" right? Myopic macho nonsense, just like this company that wants "hyper-motivated" applicants. Ridiculous, geek-macho, over-caffeinated boys who speak first and (maybe) think later.
Regarding whether or not it's too easy...that's something we wondered about. We decided we wanted a relatively straightforward initial screen rather than an complex brainteaser.
So I would by no means liken this to the Greplin Challenge, but we're trying to accomplish something different. We're hoping to eliminate the crappy applicants so we can spend more time on the good ones.
After I initially overreacted about it's simplicity, I saw the point more clearly. In fact, the more I think about it the more I loved it. (from your business's standpoint)
Whenever I've been apart of interviewing candidates, ≈70% of the time was wasted on applicants who fluffed their resumé, got an interview, and were obviously not what they claimed to be. This would probably significantly reduce that overhead and at the same time attract people who enjoy coding vs. do it just to pay the bills.
Not a web developer, but a scientist who plays around with it a little bit. Here is what I tried:
1) Viewed source. Didn't see any obvious comments.
2) Looked at .css files. Nothing obvious there, though there are styles for form/etc classes and elements that aren't used in the page.
3) Tried creating some forms with input and label elements in the markup in Firebug to see if CSS labeling on buttons showed anything. Just showed "Submit Query".
4) Looked at session headers in Firebug/Safari and saw something along the lines of
But no dice. Is this totally the wrong direction? Is this puzzle really that obvious to any real web developer worthy of the name, and if so where did you earn your spurs/what books/sites did you read?
I think that you may have erred on the side of too easy. I have very little web development experience, but I was able to solve it in a few minutes. I didn't even use any developer tools.
Waaay too easy...honestly, I'm not tooting my own horn.
But I guess it would keep the lazy applicant from applying.
EDIT: on second thought, maybe it is the right level. They aren't likely looking for $100k+ hacker geniuses, just guys who can think outside the box and know how to do basic digging and prevent your typical hack.
I retract my statement. Clever application process.
Fun challenge. It took me about 10-15 minutes using curl.
I think it's the right level of difficulty: Difficult enough that you're able to weed out a lot of really low quality applicants, but not so difficult that you run the risk of excluding high quality applicants.
That was fun. Personally I wouldn't make it any harder as it would already weed out a huge portion of the candidates I have interviewed in the past. I would perhaps add something that required a little JavaScript or something written though.
I wonder how many applications you get from people that don't actually want the job.
I quite enjoyed this :-) Reminds me of an online game that I played through years ago which I'm having trouble digging references to now; hack your way through successive levels, starting with really trivial things like default passwords and working your way up through all the exploitation techniques through to the more interesting ones (buffer overflows, off by 1 errors etc).
I was well hooked on the writings of Aleph1, Mudge and Rain Forest Puppy at the time, and this game was an excellent tool for teaching developers about vulnerabilities and thus how to defend against them. I know that the game spawned a plethora of copy-cats later on of varying qualitites - does anybody happen to know the one I'm referring to?
Honestly they should not have made this announcement public, it should be a private message to anyone submitting an application, otherwise random people pick up the challenge and post the answers online.
Great idea! I thought I had it figured out last night but the blank screen I got when submitting kept bothering me. This morning I double checked the requirements and saw if I got a blank screen I had not done it right.
I went back and got it figured out - I think the barrier to entry for this is just right.
[+] [-] zg|15 years ago|reply
Then I guess you'd have to give him the job by default :-)
[+] [-] notr00t|15 years ago|reply
[+] [-] kapilkale|15 years ago|reply
[+] [-] johnswamps|15 years ago|reply
[+] [-] josegonzalez|15 years ago|reply
[+] [-] jack7890|15 years ago|reply
So I would by no means liken this to the Greplin Challenge, but we're trying to accomplish something different. We're hoping to eliminate the crappy applicants so we can spend more time on the good ones.
[+] [-] jayphelps|15 years ago|reply
Whenever I've been apart of interviewing candidates, ≈70% of the time was wasted on applicants who fluffed their resumé, got an interview, and were obviously not what they claimed to be. This would probably significantly reduce that overhead and at the same time attract people who enjoy coding vs. do it just to pay the bills.
[+] [-] temphn|15 years ago|reply
1) Viewed source. Didn't see any obvious comments.
2) Looked at .css files. Nothing obvious there, though there are styles for form/etc classes and elements that aren't used in the page.
3) Tried creating some forms with input and label elements in the markup in Firebug to see if CSS labeling on buttons showed anything. Just showed "Submit Query".
4) Looked at session headers in Firebug/Safari and saw something along the lines of
5) Noticed 'csrf.token' and googled to figure out it was a cross site request forgery prevention token, which seems sort of related.Tried to mess around with this in Python and sort of got somewhere with this
Then tried re-encoding: and then doing an HTTP POST with curl But no dice. Is this totally the wrong direction? Is this puzzle really that obvious to any real web developer worthy of the name, and if so where did you earn your spurs/what books/sites did you read?[+] [-] dwwoelfel|15 years ago|reply
[+] [-] jayphelps|15 years ago|reply
But I guess it would keep the lazy applicant from applying.
EDIT: on second thought, maybe it is the right level. They aren't likely looking for $100k+ hacker geniuses, just guys who can think outside the box and know how to do basic digging and prevent your typical hack.
I retract my statement. Clever application process.
[+] [-] vinhboy|15 years ago|reply
[+] [-] sibsibsib|15 years ago|reply
[+] [-] unknown|15 years ago|reply
[deleted]
[+] [-] atomon|15 years ago|reply
I think it's the right level of difficulty: Difficult enough that you're able to weed out a lot of really low quality applicants, but not so difficult that you run the risk of excluding high quality applicants.
[+] [-] unknown|15 years ago|reply
[deleted]
[+] [-] barrydahlberg|15 years ago|reply
I wonder how many applications you get from people that don't actually want the job.
[+] [-] pennig|15 years ago|reply
I submitted this as my resume: http://www.russellheimlich.com/blog/wp-content/uploads/2007/...
[+] [-] morganpyne|15 years ago|reply
[+] [-] sovande|15 years ago|reply
Edit: Removed potential spoilers.
[+] [-] morganpyne|15 years ago|reply
I was well hooked on the writings of Aleph1, Mudge and Rain Forest Puppy at the time, and this game was an excellent tool for teaching developers about vulnerabilities and thus how to defend against them. I know that the game spawned a plethora of copy-cats later on of varying qualitites - does anybody happen to know the one I'm referring to?
[+] [-] harisenbon|15 years ago|reply
I was completely addicted to that game in college. The also apparently have a version on steam now.
[+] [-] seanalltogether|15 years ago|reply
[+] [-] shyknee|15 years ago|reply
I went back and got it figured out - I think the barrier to entry for this is just right.
[+] [-] outsyder|15 years ago|reply
[+] [-] pseudonym|15 years ago|reply
[+] [-] unknown|15 years ago|reply
[deleted]
[+] [-] unknown|15 years ago|reply
[deleted]
[+] [-] unknown|15 years ago|reply
[deleted]