Bullshit.
Every programmer knows that 'A'
in ['A', 'B', 'C', 'D']
would be the 0th item; the first item is 'B'
Bullshit.
Every programmer knows that 'A'
in ['A', 'B', 'C', 'D']
would be the 0th item; the first item is 'B'
I don’t have a problem with snaps as a technology. If you want to use them, then who am I to judge?
But what I do have a problem with is when I don’t have a choice and I am being forced to use what the distro maintainers think is good for me. That is what finally made me quit Ubuntu and switch to Fedora.
Almost none of the people who are excited about AI know anything about computer science. I say this someone who always encounters idiots claiming my computer science degree will soon be obsolete because of AI… lol
What are the implications of this?
This is kind of what people are missing. These people really do produce millions of dollars worth of labour. That’s how entertainers are paid; the more people want to see their performance, the more that performance is worth.
Password is necessary for two-factor authentication. The factors of authentication are something you know (like a password), something you have (like a cell phone), and something you are (like a biometric).
An example of three-factor authentication would be this—imagine a spy going into a secret bunker. They need to scan their iris, insert a key card, and then enter a passcode before the door opens. This has all three factors of authentication; the passcode is something they know, the key card is something they have, the iris scan is something they are.
If it just sends a code to your phone, that’s one-factor authentication (something you have). Anyone with your phone can get into your account. Unless, of course, your phone hides its notifications and you have a screen lock. Then that’s actually two-factor authentication because you also need to know the phone PIN or have the biometric.
If it just asks for a password, that’s one-factor authentication (something you know).
If it asks for your password and then sends a code to your phone, which you need a fingerprint or face scan to unlock, you have achieved three-factor authentication.
Edit: Interesting tidbit—in the USA, you can rent a mailbox at the post office to receive mail when you don’t want to give out your real address. Useful for privacy reasons. I’m sure they have similar things in other countries. These mailboxes come with a key. This is actually two-factor authentication, because the keys usually don’t have the mailbox number written on them! So you have to have the key and also have to know which mailbox among the hundreds at the post office it opens.
TOTP is standardised by RFC 6238 so all TOTP clients must comply with the standard and therefore work equally well. Pick the one whose UI you like the most and is otherwise good enough for your use case and personal preferences. It’s similar to arguments over CPU thermal paste—its presence or absence makes a much larger difference than the method of application.
You do, however, want to pick something that is free and open-source and also popular. Google Authenticator (closed source) definitely is a functional TOTP client but you have to trust that the Google engineers have done a good job building a secure app. Since it’s Google, they probably have, but a principle in security is that you should not have to trust more people than absolutely necessary.
Yes, but this is like replacing the front door of your house with a bank vault door. Yes, it’s more secure, but there is a point of “reasonably secure enough” for most people and at some point, you are just inconveniencing yourself for no tangible gain.
It’s not a hard concept. In almost every well-designed security system, the weakest links are invariably the humans
The passwords are stored locally. You can test this yourself by turning off your WiFi or disconnecting your Ethernet cable and then going to about:logins. All the passwords will still be there.
Me who only has the original Cantonese version:
Do people not know that Cuzco is a real city? As in the capital city of the Inca Empire?
It’s still there in Peru.
I have a script running that uses the Namecheap API to automatically get wildcard certs from Let’s Encrypt. I didn’t pay a dime for this. Did something change?
Nothing wrong with Boost Mobile, or any other discount telecom provider either. It’s not like the phone signals taste different lmao
It’s just a hallmark of “I bought the cheapest domain name TLD available”.
That’s not necessarily bad if all you need is something to get the job done, but there is a stereotype associated with it.
I’m not a European (I’m American) but I honestly thought von der Leyen was a pinnacle of competence compared to our leaders when she was in office.
Questionable news plus four paragraphs of highly partisan commentary
Even Reddit news is superior, and that place is a shit hole
Normal person: ¬(Garbage | Trash) = okay to put here if it is not garbage and not trash
Computer programmers: ¬ Garbage | Trash = okay to put here if it is not garbage or it is trash, but since garbage and trash are the same thing and ¬P | P = 1, it’s okay to put anything here
ASM is high level. Real programmers use punch cards
That’s because the word “first” in
first()
uses one-based indexing. In true programmer fashion it would have been calledzeroth()
but that is wholly unintuitive to most humans.I maintain that the element with the lowest index is called the “zeroth” element in zero-based indexing and “first” in one-based indexing. The element with index N is the Nth element.