<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: 286c8cb04bda</title><link>https://news.ycombinator.com/user?id=286c8cb04bda</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 26 Apr 2026 08:49:19 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=286c8cb04bda" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by 286c8cb04bda in "This JPEG is also a webpage"]]></title><description><![CDATA[
<p>It's sending the "wrong" one --<p><pre><code>    $ curl -I http://lcamtuf.coredump.cx/squirrel/
    HTTP/1.1 200 OK
    Date: Thu, 11 Aug 2016 05:18:00 GMT
    Server: Apache
    Last-Modified: Mon, 19 Sep 2011 23:31:49 GMT
    Accept-Ranges: bytes
    Content-Length: 135938
    Content-Type: text/html</code></pre></p>
]]></description><pubDate>Thu, 11 Aug 2016 05:23:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=12266398</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=12266398</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12266398</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "CocoaPods downloads max out five GitHub server CPUs"]]></title><description><![CDATA[
<p>pacman has been ported to OS X a few times<p><pre><code>  https://bbs.archlinux.org/viewtopic.php?id=53960
  https://bbs.archlinux.org/viewtopic.php?id=122544</code></pre></p>
]]></description><pubDate>Wed, 09 Mar 2016 00:58:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=11250077</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=11250077</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11250077</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Show HN: Lescript – Simple PHP client library for Let's encrypt"]]></title><description><![CDATA[
<p><i>> certs are never "renewed" but just reissued with new dates</i><p>This is correct.</p>
]]></description><pubDate>Thu, 10 Dec 2015 15:35:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=10711099</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=10711099</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10711099</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "The chunking express: another approach to foreign-language learning"]]></title><description><![CDATA[
<p><i>> anki is good, but for some reason they have a self signed certificate on their site, which I haven't checked out yet, so I won't link to it</i><p>It's not self signed, it's the wrong domain (Error code: ssl_error_bad_cert_domain) HTTPS requests to ankisrs.net get a certificate for *.ankiweb.net, which is the domain the app uses for the sync web service.</p>
]]></description><pubDate>Mon, 05 Oct 2015 04:09:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=10329926</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=10329926</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10329926</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Obfuscation: A User’s Guide for Privacy and Protest"]]></title><description><![CDATA[
<p>Maybe in theory, but when the DRM tracks when you're reading the book:<p><a href="https://www.adobe.com/privacy/ade.html" rel="nofollow">https://www.adobe.com/privacy/ade.html</a></p>
]]></description><pubDate>Thu, 17 Sep 2015 17:58:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=10234996</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=10234996</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10234996</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Obfuscation: A User’s Guide for Privacy and Protest"]]></title><description><![CDATA[
<p>The ebook version from MIT press is Adobe Digital Editions. It is also available (more expensive) in Kindle format: <a href="http://www.amazon.com/-/dp/B0135G71BG" rel="nofollow">http://www.amazon.com/-/dp/B0135G71BG</a></p>
]]></description><pubDate>Thu, 17 Sep 2015 17:48:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=10234927</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=10234927</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10234927</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Manage like a spymaster"]]></title><description><![CDATA[
<p>An URL for the edification of others -- <a href="http://www.amazon.com/dp/B00L00EJU6" rel="nofollow">http://www.amazon.com/dp/B00L00EJU6</a><p>(I have just purchased the book, and the problem mentioned in negative reviews about the text not matching the title seems to have been fixed.)</p>
]]></description><pubDate>Wed, 02 Sep 2015 14:59:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=10159653</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=10159653</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10159653</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "C# 7 Work List of Features"]]></title><description><![CDATA[
<p>I recommend this book: <a href="http://www.amazon.com/-/dp/0321877586" rel="nofollow">http://www.amazon.com/-/dp/0321877586</a><p>It focuses on the language, not any specific implementation. The examples all use the command-line compiler, not Visual Studio. So you would be able to use the Mono Development Kit.</p>
]]></description><pubDate>Thu, 23 Apr 2015 13:37:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=9426534</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=9426534</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=9426534</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Is This Justice? Charging an Eighth Grader with a Felony for “Hacking”"]]></title><description><![CDATA[
<p>Jails are run by counties or cities, and are for persons awaiting trial (i.e. not been convicted) or persons found guilty and serving short sentences.<p>Prisons are run by a state or by the Federal government, and are for holding persons who have been convicted of a crime and sentanced to a longer term.</p>
]]></description><pubDate>Mon, 20 Apr 2015 14:36:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=9408351</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=9408351</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=9408351</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Unix swiss army knife for headless browser JavaScript"]]></title><description><![CDATA[
<p><i>> 1470 open issues</i><p>That's a  really weak argument. Here's 5000 Firefox bugs:<p><pre><code>    https://bugzilla.mozilla.org/buglist.cgi?component=General&product=Firefox&query_format=advanced&resolution=---&order=bug_status%2Cpriority%2Cassigned_to%2Cbug_id&limit=0</code></pre></p>
]]></description><pubDate>Mon, 20 Apr 2015 13:03:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=9407748</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=9407748</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=9407748</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Apple – OS X – Photos"]]></title><description><![CDATA[
<p>The biggest recurring issue was deadlocks in the garbage collector. It would start cleanup in a subvolume and trip all over itself. After that, any I/O to that specific directory would never return. The only solutions was to reboot the server and fsck for a few hours.<p>Second frequent problem: Hitting 90% capacity in a filesystem has a non-trivial chance to ruin it forever. Hit the wrong code path, and, even if you immediately delete a bunch of things, I/O to that filesystem would be forever 3000% slower.</p>
]]></description><pubDate>Fri, 10 Apr 2015 05:03:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=9352662</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=9352662</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=9352662</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Apple – OS X – Photos"]]></title><description><![CDATA[
<p>I've used btrfs (at several-petabytes-of-data scale) and wouldn't trust it any more than HFS+.<p>Use ZFS if you like, or XFS, or even ext4 instead.</p>
]]></description><pubDate>Wed, 08 Apr 2015 20:16:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=9343603</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=9343603</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=9343603</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "PuTTY 0.64 released, fixing a security hole"]]></title><description><![CDATA[
<p><i>> Though they provide RSA and DSA signatures how would I verify the signatures themselves?</i><p>Ideally, it goes something like this --<p>1. Start with the master keys. Download them from their website & import them into your keyring.<p>2. Fetch signatures for those keys from some key servers. (E.g. gpg --recv-keys 6A93B34E).<p>3. Examine the signatures (E.g. gpg --list-sigs 6A93B34E). Do you trust anybody in that list to have verified the ownership of the keys?<p>If "yes", then import the release keys and verify that _they_ have been signed by the master keys. You can use the release keys to verify the downloaded binary.<p>If "no", then you might recurse down those keys to see if you know anyone who signed any of _them_. At this point, you'll need to consider very carefully what your trust policy is going to be.</p>
]]></description><pubDate>Tue, 03 Mar 2015 15:06:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=9137954</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=9137954</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=9137954</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Libsqlfs: A POSIX-style file system on top of an SQLite database"]]></title><description><![CDATA[
<p><i>> I'm still certain I've seen talk of indexing metadata...</i><p>This reminded me of BFS: <a href="https://en.wikipedia.org/wiki/Be_File_System" rel="nofollow">https://en.wikipedia.org/wiki/Be_File_System</a></p>
]]></description><pubDate>Sat, 04 Oct 2014 04:43:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=8408789</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=8408789</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8408789</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Edit: A Relaxing Mix of Vi and Acme"]]></title><description><![CDATA[
<p><i>> Presumably in this editor "_" represents the "whole line" region, which leads to also "c_" and "y_".</i><p>That's not specific to this editor. In vim _ goes from the cursor to the end of the line (but does not include the newline at the end like $ does).</p>
]]></description><pubDate>Tue, 23 Sep 2014 18:29:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=8357157</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=8357157</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8357157</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "An Unusual Language That Linguists Thought Couldn’t Exist"]]></title><description><![CDATA[
<p>That's kinda close. In sign languages, individual signs can be decomposed into different elements: Hand shape, motion, position, et al. Related terms or ideas will use some of the same elements.<p>I'll use a couple of examples from American Sign Language:<p>1. The gender of a subject in a phrase is sometimes communicated by performing the corresponding motion with the specific hand shape in front of your forehead (for male) or in front of your chin (female).<p>2. A signer could communicate "a chair", "then he sat down", and "so help you god, jimmy, you better go sit down right now or i'm going to make you wish that you were never born" with what is basically the same sign (first two fingers on right hand tapping top of first two fingers on left hand), just by repeating it more times and with more emphasis.</p>
]]></description><pubDate>Tue, 23 Sep 2014 04:42:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=8354044</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=8354044</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8354044</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "A Server Naming Scheme"]]></title><description><![CDATA[
<p><i>> Why do they do this?</i><p>This short form is "for historical reasons". That's not "they're too lazy to fix it" reasons, rather there is a very large amount of hardware deployed elsewhere which you might have to interact with making assumptions. You have to fit within the lowest common denominator of all those assumptions.<p><i>> If your tools cannot handle unlimited length names, use different tools.</i><p>Because that's not possible. According to the RFC[1], FQDNs are are limited to 255 characters. Individual components (i.e. between the dots) are limited to 64 characters. Having to account
for e.g. IDN, means space limits are an active concern.<p>[1] <a href="http://www.ietf.org/rfc/rfc1035.txt" rel="nofollow">http://www.ietf.org/rfc/rfc1035.txt</a></p>
]]></description><pubDate>Wed, 09 Jul 2014 18:15:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=8011305</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=8011305</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8011305</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Jumpers and the Software Defined Localhost"]]></title><description><![CDATA[
<p><i>> Application configuration can be static (just hardcode localhost:3306 for your DB, for example).</i><p>I wonder how this scales when you have multiple databases, or have read-only slaves, or something like that.<p>Then developers have to remember to send some traffic to localhost:3306 and some traffic to localhost:3307, and who knows how many more ports.<p>Documentation never manages to stay up-to-date, so perhaps you could use some sort of Service Discovery Protocol to map these semi-arbitrary numbers to more memorable names.<p>Then, as long as you know what port the service-discovery-service runs on, you could simply query it for the address to reach your databases.<p>Maybe that's too much work, though. We could just stuff everything in /etc/hosts.</p>
]]></description><pubDate>Fri, 06 Jun 2014 18:22:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=7859523</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=7859523</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7859523</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Pop: An extensible animation engine for iOS and OS X"]]></title><description><![CDATA[
<p><i>> Also a designer can tell a dev exactly what he/she wants in terms of animation values (assuming they're using origami)</i><p>Thank you for introducing me to Origami! My time on HN today was not wasted.<p>(It's at <a href="https://facebook.github.io/origami/" rel="nofollow">https://facebook.github.io/origami/</a> if somebody else reading this also did not know about it.)</p>
]]></description><pubDate>Tue, 29 Apr 2014 02:03:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=7664477</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=7664477</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7664477</guid></item><item><title><![CDATA[New comment by 286c8cb04bda in "Arq 4 is out – Mac backup to S3/Glacier"]]></title><description><![CDATA[
<p><i>> Am I the only one that would like to be able to setup a time range when it's allowed to use my bandwidth?</i><p>You can. After you setup a target open the Preferences window. Select the target therein and click the "Edit..." button.<p>The dialog that follows has an option to "Pause between [00:00] and [00:00]", where [00:00] is a drop-down which lets you pick the top of any hour of the day.</p>
]]></description><pubDate>Tue, 04 Mar 2014 04:09:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=7338403</link><dc:creator>286c8cb04bda</dc:creator><comments>https://news.ycombinator.com/item?id=7338403</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7338403</guid></item></channel></rss>