punkcoder

joined 1 year ago
[–] [email protected] 1 points 1 day ago

The main problem is that when you use the same tools that you use at work for your game, then your game starts to feel like work.

[–] [email protected] 3 points 1 day ago

The real question you have to ask yourself is how long they can do that before it starts to affect their bottom line.

[–] [email protected] 3 points 1 week ago

(Not intending to pick a fight, but intended for levity…)

But this is a vegan cat bringing you its prey.

[–] [email protected] 1 points 1 week ago

This is what I always assumed the game root was like.

[–] [email protected] 7 points 2 weeks ago

The network was a fun album, but like the rest of their spin off it’s really a personal thing. But its gotta be hard to play the same thing day in, day out, putting out album after album to the sound of people telling you: you sold out. Its fun to see the depth even if its not your thing…. Mother Mary slaps.

[–] [email protected] 6 points 2 weeks ago

Depends on if you are a music fan or a green day fan.

[–] [email protected] 48 points 2 months ago (3 children)

chik-fil-a…

[–] [email protected] 9 points 2 months ago

it’s almost like moving from pensions to 401(k) programs only benefited the employers.

[–] [email protected] 5 points 2 months ago

I'm not surprised... I think people ('the ones that care at least') would be horrified to know how much of this stuff slips through, because it's hard (there are so many other things that are pulling at developers that something falls through the cracks). Most of the time the right answer is to bring it up. Then thank them when they resolve the issue (with beer and pizza money at the very least).

Looks like it's waiting for approval, https://github.com/signalapp/Signal-Desktop/pull/6933 for anyone else thats interested.

[–] [email protected] 7 points 2 months ago (2 children)

I think the issue that they are trying to make is that there are modern ways of protecting the keys with hardware level security, that aren’t being used. As someone who works in AppSec this is all too common. All it takes is one library in an application to be popped (doesn’t have to be signal), and security keys end up leaked. If it isn’t already, I’m sure that signals keys will be included in exfil scripts.

Tools like TPM and SecureEnclaves (TrustZone,etc) mean that malware, and other nasties have a higher bar that they need to meet.

[–] [email protected] 20 points 3 months ago

Oh man… someones in for a fun night.

18
Building a tool (test.gamemasterdesign.com)
 

Hopefully I'm not breaking any rules about self promotion or any other nonsense. If so let me know and I will either modify or remove.

I have recently found myself unemployed and I am going through and trying to work with a new programming stack that I haven't worked with in the past. Not sure what I am going to do with it yet, but I was hoping that there might be some people who are interested in trying it out.

In the past I have utilized other tools for tracking the content of my worlds, but I never found one that really worked for me. The last one that I ended up working with was worldanvil. The tools is amazing.... but, I found myself spending more time trying to make things look better than actually writing content. So here is my crack at things, you can register and poke around, if you have any thoughts for things that you would like to see let me know, not sure if I'm going to fully stand it up as a hosted things or maybe dump it as a docker container.

Thoughts and feedback would be greatly appreaciated.

 

Test-Driven Development (TDD) is a development methodology that prioritizes writing tests for code before the code itself, followed by writing the code to pass those tests. This approach not only ensures the functionality of the code but also presents an opportunity to address security concerns, particularly validation bugs, early in the development process.

 

In the last blog we talked about what everyone assumed was the most boring topic that you could talk about, keeping your dependencies up to date. But I think I’ve got it topped this time, this time we are going to be talking about that number one thing that all developers love spending their time working on... Logging.

 

The differences between application security and developer security are simple enough in principle, but go significantly further as soon as you get past the surface. Many people in the cyber security community seem to place a great emphasis on the effectiveness of application security but in many cases, will completely negate the secondary portion of this which is securing the individual who is responsible for introducing security bugs to the software. I'm not saying that to be harsh, mistakes are a simple part of life and without the proper tooling and education it is very easy to continue to produce mistakes especially when greeted with constricted timelines and consistent budget crunch.

 

Every time that there is a leak like this it's infinitely aggravating how the spin department tries to downplay what happened. If you are using SMS based MFA you probably want to stop doing that now.

 

So here’s the problem that I have, I have several generations of back ups, which are currently taking over huge amounts of space on my NAS server. I want to be able to go through and process all of the files that are on it while the duplicating, and possibly going through and tagging any files that I find that are helpful. Is anyone aware of a good tool to help accomplish this task. Again because of the nature of the backups, I don’t want to utilize any software I’m not running locally.

Thanks in advance.

40
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
 

The goal was to find out if the minion was killed at then end of the monologue, since the party has been invested in thinking that the minion was the BBEG.

Well that didn't go as planned.

Edit: Apparently posting images is down at the moment, so had to troubleshoot.

view more: next ›