rom1v is a user on hostux.social. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.

On est en 2018.

Les checksums de la nouvelle version de GDB sont en MD5…

sourceware.org/ml/gdb/2018-01/

English is difficult. But it can be taught through thorough thought, though!

(stolen here: reddit.com/r/ProgrammerHumor/c)

> How's your day going? I ran "source .bash_history" instead of "source .bash_profile"

twitter.com/teek_eh/status/942

AbstractSingletonProxyFactoryBean : Convenient proxy factory bean superclass for proxy factory beans that create only singletons.
docs.spring.io/spring/docs/2.5

rom1v boosted

Je crois qu'il est bon que les temps de cerveau disponibles lisent de temps en temps ce que les pubards racontent, juste pour se rappeler pourquoi il faut installer un ad blocker frenchweb.fr/la-necessaire-dis

#publicité

rom1v boosted

[basherie] je viens de découvrir (merci StackOverflow) `cmd1 | tee >(cmd2) >(cmd3) >(cmd4)` pour passer le résultat d’une commande à plusieurs autres. Ça déchire !
(cas d’usage : plusieurs traitements à effectuer sur le résultat d’une commande assez coûteuse, et je voulais éviter de passer par des fichiers temporaires).

How Adversarial Attacks Work
blog.ycombinator.com/how-adver

Ou comment, en modifiant seulement quelques pixels, on peut faire voir à l'IA l'image qu'on veut.

hostux.social/media/JmESeXsV6Q

La SNCF a dû se tromper, la place 44 était déjà prise…

rom1v boosted

> Why did OpenBSD silently release a patch before the embargo?
>
> […] As a compromise, I allowed them to silently patch the vulnerability. In hindsight this was a bad decision, since others might rediscover the vulnerability by inspecting their silent patch. To avoid this problem in the future, OpenBSD will now receive vulnerability notifications closer to the end of an embargo.

krackattacks.com/

rom1v boosted

As #OpenBSD's de-facto wifi maintainer, I first learned about this WPA problem in June. A simple patch was provided which I could commit with slight modifications.

The original embargo was already 2 months long, and then extended again for 2 months.

The generall public (you) were left in the dark about this for at least 4 months.

This is a very sad state of affairs. It takes the industry much too long to apply a simple patch.

Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping
arstechnica.com/information-te

> people should avoid using Wi-Fi whenever possible until a patch or mitigation is in place

Rien que ça… 😟