SingletonIface | 8 years ago | on: Chrome Enterprise
SingletonIface's comments
SingletonIface | 8 years ago | on: A Tutorial on Portable Makefiles
I seem to be about the only person that makes use of the following feature, but FreeBSD and GNU make will in addition to looking for a file named Makefile, also look for BSDmakefile or GNUmakefile respectively.
So when I write a makefile with GNU make specific contents, I name it GNUmakefile, and when I write one that is specific to FreeBSD make, I name it BSDmakefile.
The user has to do absolutely nothing different; they simply write
make
and if their make is GNU make and my makefile is a GNUmakefile then it builds. Likewise with FreeBSD make and a file named BSDmakefile.The big win is when someone then has the wrong make. Instead of beginning to build and then failing at some point kicking and screaming, they will simply be told
make: no target to make.
make: stopped in (path)
by FreeBSD make, or make: *** No targets specified and no makefile found. Stop.
by GNU make.And at that point they will consult the README I have written for the project in question and they will learn that they need the other make than what they are using if they want to build this software.
SingletonIface | 8 years ago | on: Announcing the Windows Bounty Program
1. The seller would like to keep their identity secret so that they aren't prosecuted or attacked.
2. The buyer would also like to keep their identity secret.
3. The seller wants money. How do they know that the buyer will send them the money if they hand over the exploit before getting paid? Normally you'd report theft to the police but you're not going to go to the police and admit to selling exploits. Also you don't know who the seller is.
4. The seller wants the exploit. If they pay first then how do they know they will get the exploit.
If you contact some agency directly then surely they will not want to pay you out of fear that you will inform either the public or another government or agency about the transaction?
If there was a darknet marketplace for exploits (maybe there already is, maybe there already are several ones?) then that might solve it. There you can have both some degree of anonymity, you can have reputations for sellers and buyers and the DNM can offer escrow of funds.
SingletonIface | 8 years ago | on: MS Paint is here to stay
SingletonIface | 8 years ago | on: Shoebox – my virtual hand-drawn, hand-coded live band
SingletonIface | 8 years ago | on: Mysterious Mac Malware Has Infected Victims for Years
"Unexpected"? How? This would have been obvious to Wardle. Maybe the journalist added this to "inject some suspense"? Thanks but no thanks, I won't bother reading the rest of this article.
SingletonIface | 8 years ago | on: Give in to Procrastination and Stop Prefetching (2013) [pdf]
SingletonIface | 8 years ago | on: Pascal at Apple
https://en.wikipedia.org/wiki/Cfront
Interesting.
SingletonIface | 8 years ago | on: Show HN: $200 Solar Self-Sufficiency Without Your Landlord Noticing
Or better yet, be able to sell the excess power. In the future power grid this will be possible.
SingletonIface | 8 years ago | on: Ask HN: Ubuntu Desktop Default Apps
Email client: ??? Comment: I use mutt but I'm wishing for something better. mutt is too limited
Terminal: Terminology, urxvt
IDE: None; neo-vim is sufficient for programming tasks, don't need most IDE features.
File manager: What ever is the default for the selected DE.
Basic Text Editor: neo-vim
IRC/Messaging Client: irssi and Pidgin
PDF Reader: Evince
Office Suite: LibreOffice
Calendar: Don't know
Video player: VLC
Music player: Tomahawk
Photo Viewer: What ever is default for the selected DE
Screen recording: Open Broadcast Studio
SingletonIface | 8 years ago | on: NASA Uploads Hundreds of Rare Aircraft Films to YouTube
SingletonIface | 8 years ago | on: Pass: A standard Unix password manager
Search for qr on the python package index using pip. There's a module that you can pipe text to and then it'll render a qr code in your terminal using Unicode glyphs. Worked well last I tried. Don't remember what the module was called but you'll be able to find it I som sure.
SingletonIface | 8 years ago | on: A hacker stole $31M of Ether – how it happened, and what it means for Ethereum
https://github.com/nemequ/portable-snippets/blob/master/safe...
Nope, guess it's not :(