DaCapoo's comments

DaCapoo | 10 years ago | on: It's called fdisk because

I've cloned hundreds of drives while I worked for two years in the IT department at a large university (30k+ students), and I never had an issue with using Clonezilla or Norton Ghost (which is no longer even supported, but still works perfectly).

If you're moving to a larger drive, just do the above process and then use Gparted to resize the partition. As many warnings as it throws about trashing copies of data, I've never actually seen it happen.

DaCapoo | 10 years ago | on: Block and Unsubscribe

I'd assume so. The CAN-SPAM[0] act mandates that the unsubscribe link must not contain any authorization, e.g., you click the link and you're immediately unsubscribed. This is just trading a click in one location for a click in another, but it's a neat feature to not search through the entire email to try to find the unsubscribe link.

[0] - https://en.wikipedia.org/wiki/CAN-SPAM_Act_of_2003#Unsubscri...

DaCapoo | 10 years ago | on: Ask HN: Who is hiring? (July 2015)

Would you consider hiring someone for a remote, full time or part time position that has relevant work experience but not a degree (yet)?

To be more clear, I've got a year left to complete my degree in CS but I feel that I'm more than capable of contributing to an organization without an internship program.

DaCapoo | 11 years ago | on: Ask HN: What language should I learn first?

Choosing any language because it's in high demand is a bad decision, see "Why SICP matters"[0].

" I tell my students, "the language in which you'll spend most of your working life hasn't been invented yet, so we can't teach it to you. Instead we have to give you the skills you need to learn new languages as they appear." "

With regards to your statement, "It all depends on how you learn JS": That could be said of any language. The fact that you learned the differences between JS and C is what helped you when you were beginning, not that you learned JavaScript instead of Java, Ruby, or Python.

[0] - http://www.eecs.berkeley.edu/~bh/sicp.html

DaCapoo | 11 years ago | on: Why We Might Be Stuck With Passwords for a While

I agree.

"Another good practice is just to ask for passwords less often. If you’re signing in every day from the same computer in your basement, you’ll notice that Google hardly ever asks you to prove who you are."

I'm not sure if he's referring to Google asking for a second form of authentication when you log in from an unknown location (such as sending you a text message with a random number in it, which is unrelated to entering your actual account password) or if he doesn't understand state management with cookies. You obviously won't be asked to reenter your password if the session cookie has been set in your browser and you have a valid session on the server.

DaCapoo | 12 years ago | on: A game based on the Havel-Hakimi algorithm

I have not looked over the Havel-Hakimi algorithm yet, but here's the best way I've found to solve these (with 100% success rate so far)

1. Pick the node with the highest degree 2. Make all the connections for that node until it has a value of zero by connecting it with the highest-value node that it isn't already connected to

For example, in this scenario: http://i.imgur.com/O8MlWzz.png

The way that I see it is that since the highest-degree node needs to make X number of connections, ensure it can make all of those connections before worrying about anything else. In this case, that means start by connecting the 4 to the next highest value node - the 3, then the 2, then the other 2, then the 1.

This leaves the following situation: http://i.imgur.com/9vZjafr.png

It's kind of easy to see where it goes from there. Sure this is a simple example, but as I said it's worked 100% of the time I've tried it.

DaCapoo | 12 years ago | on: The Trap You Set For Yourself

The book itself is amazing, yet I found it had the same effect as other books that hold similar messages - it just doesn't translate well into my day to day thoughts. After reading it I felt the sort of profound enlightenment one might expect when discovering what was written in the book, but woke up the next morning feeling the same as before I had read the book.

"Learning to deal with this fact, to accept and and even rely on this fundamental truth, is the first step towards developing a real purpose in life."

Perhaps I'll get there at some point, but I just haven't figured this out yet. I see the fact there, I understand it, but incorporating it into my daily thinking is just something I can't seem to grasp.

DaCapoo | 12 years ago | on: Monte Carlo Simulations and Fibonacci: Why Developers Still Need The Basics

I'd end up reading the documentation and understanding why I was using the library incorrectly. Failing that, I'd go look at how the library was implemented.

There's a distinct difference between looking at something when it's broken for the sake of fixing it and implementing every library on your own because you don't want to use the abstractions created by the programmers who came before you.

DaCapoo | 12 years ago | on: Apple approves Dogecoin iOS app

Both are using Bootstrap with what appears to be a theme similar to the Bootstrap's own site. Looks like less of a case of one copying the other, and more of both copying the default bootstrap site.

DaCapoo | 12 years ago | on: Reverse Shell Cheat Sheet

Typically, when you open a secure shell (SSH) connection your client is connecting to a SSH server running on the target machine. A reverse shell occurs when the server initiates a connection with a client that is listening - for example, you have access to a shell to run commands on a target computer (usually through a command injection vulnerability in a website). This means you don't have a full shell - just the ability to run arbitrary commands.

You open a reverse shell which instructs your target computer which is running a SSH server to connect to your client, which allows you to now have a full featured shell at your hands.

DaCapoo | 12 years ago | on: Ask HN: Those making $1,000+/month on side projects - what did you make?

The issue with it however is that the initial page is delivered over an insecure connection, which allows any part of it to be modified in the usual MITM style. Nothing prevents an attacker from changing the link that is served to the client with something else that looks like that payment system and functions the same, but logs the payment information. There's a reason Firefox now disallows mixed HTTP/HTTPS content by default[0]

[0] - https://blog.mozilla.org/tanvi/2013/04/10/mixed-content-bloc...

page 1