

Why would anyone want to run unmainlined security patches from a company?
This is how CrowdStrike happened.
This feels like security via business decision which is always the opposite of security. At least this would be open source now? 🤷♂️
Why would anyone want to run unmainlined security patches from a company?
This is how CrowdStrike happened.
This feels like security via business decision which is always the opposite of security. At least this would be open source now? 🤷♂️
The brutal cognitive dissonance you manage to encapsulated in this comment is impressive.
byeeeeeeee
Yep, and to the person justifying the IT department’s invasion of privacy: they’ve been lying to us for years, there are breaches ALL THE TIME. Workers will give up every right in the face of corporate excuses? 🤷♂️
You are a fintech dev using floating point? And your advice is to encode things as strings?
…
This is why I got out of fintech.
(I am sorry, I know there are horrors and I am sure I am not familiar with your exact scenario.)
Edit: just for anyone who passes by: try to stick with integers in a currency’s smallest unit of division. (This is only one small bit of this problem, but the number of times I have seen currency values in floating point makea me psychotic.)
There are still some errors where you just need to know the fix. In that case it’s a baseball bat.
I get the joke.
But if, like me, you actually feel this here’s how I got away from it: make sure you actually understand things.
Read the error message over and over again, look up the words, understand what it is saying.
If something isn’t working, start reading the code and making sure you understand what each line is doing.
It will feel incredibly slow and painful at first. Eventually you will strengthen those.muscles, however, and it’ll become second nature.
Then you can cut and paste with confidence! 🤣
I am having a hard time following what this does or why this is desirable. You’re saying there’s a patch this thing provides that … disables memory access … unless a flag is set in an executable … which will then bypass the security?