<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: IanGabes</title><link>https://news.ycombinator.com/user?id=IanGabes</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 07:18:59 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=IanGabes" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by IanGabes in "I Went to SQL Injection Court"]]></title><description><![CDATA[
<p>This makes sense, but the the vast majority of tooling including ORMs, autocomplete SQL IDEs, and even suspect application code relies on table descriptions and listings provided by the information schema</p>
]]></description><pubDate>Wed, 26 Feb 2025 05:51:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=43181054</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=43181054</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43181054</guid></item><item><title><![CDATA[Engineering Troubleshooting 101: Possibility Spaces and Proxies]]></title><description><![CDATA[
<p>Article URL: <a href="https://loadbearingtomato.com/p/troubleshooting-101-possibility-spaces">https://loadbearingtomato.com/p/troubleshooting-101-possibility-spaces</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42657144">https://news.ycombinator.com/item?id=42657144</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Fri, 10 Jan 2025 16:32:43 +0000</pubDate><link>https://loadbearingtomato.com/p/troubleshooting-101-possibility-spaces</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=42657144</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42657144</guid></item><item><title><![CDATA[New comment by IanGabes in "Malware can turn off webcam LED and record video, demonstrated on ThinkPad X230"]]></title><description><![CDATA[
<p>I think that its easier to compare the shutter to airplane windows.<p>The windows are there just to make the humans inside more comfortable, similar to how many people would be more comfortable without a camera pointed at them.<p>Flashing firmware is a big hill to climb for bad guys in most peoples worlds.</p>
]]></description><pubDate>Thu, 28 Nov 2024 20:26:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=42268331</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=42268331</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42268331</guid></item><item><title><![CDATA[New comment by IanGabes in "Determinism in League of Legends: Implementation (2017)"]]></title><description><![CDATA[
<p>They do! Its called Chronobreak. They have used it many times in professional matches successfully, but it doesn't work in 100% of scenarios.</p>
]]></description><pubDate>Thu, 03 Oct 2024 18:52:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=41733708</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=41733708</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41733708</guid></item><item><title><![CDATA[New comment by IanGabes in "Unfork: The Inverse of Fork(2)"]]></title><description><![CDATA[
<p>You might be interested in CRIU: <a href="https://github.com/checkpoint-restore/criu" rel="nofollow">https://github.com/checkpoint-restore/criu</a></p>
]]></description><pubDate>Sat, 29 May 2021 17:19:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=27326714</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=27326714</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27326714</guid></item><item><title><![CDATA[New comment by IanGabes in "Modern C for C++ Peeps (2019)"]]></title><description><![CDATA[
<p>Huh. This is interesting, I can empathize with both sides of the argument. Are C text editors not able to take care of syntax highlighting the differences between a typedef'd scalar and a typedef'd struct? Colouring the type one way or another I figure would be sufficient.</p>
]]></description><pubDate>Wed, 26 May 2021 18:50:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=27294527</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=27294527</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27294527</guid></item><item><title><![CDATA[New comment by IanGabes in "Tell HN: Today I learned Epub is just HTML/CSS"]]></title><description><![CDATA[
<p>Most frequently used in my experience by malware: <a href="https://en.wikipedia.org/wiki/MHTML" rel="nofollow">https://en.wikipedia.org/wiki/MHTML</a></p>
]]></description><pubDate>Thu, 08 Apr 2021 17:04:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=26741202</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=26741202</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26741202</guid></item><item><title><![CDATA[New comment by IanGabes in "Elo sucks – better multiplayer rating systems for smaller games (2019)"]]></title><description><![CDATA[
<p>Creating a custom system to suit your situations needs sounds great and the thought process was fun to read, but some of the claims lobbed here are pretty questionable.<p>Specifically, the claim that Dota's matchmaking system is "probably wrong" because the model chosen doesn't match your own findings feels like a reach. Sibling commenters have pointed out how skill variance is important to allow the ELO system to function in games like chess. Additionally, someone else pointed out that the sigmoid function is similar to a linear funciton close to zero.<p>It seems <i>at least</i> as likely that Acolytefight doesn't have a high enough level of skill expression present in the game to see top players "curve out" weaker players, rather than exponential functions mapping player skill to be useless or wrong.<p>Does elo suck? Maybe, but this hasn't convinced me.</p>
]]></description><pubDate>Tue, 21 Jul 2020 21:38:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=23911283</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=23911283</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23911283</guid></item><item><title><![CDATA[New comment by IanGabes in "Strange public IPv4 address assigned behind NAT (2019)"]]></title><description><![CDATA[
<p>I'm not an expert in this field, but I did come across the carrier-grade NAT range on a very odd project:<p><a href="https://en.wikipedia.org/wiki/Carrier-grade_NAT" rel="nofollow">https://en.wikipedia.org/wiki/Carrier-grade_NAT</a></p>
]]></description><pubDate>Tue, 14 Jul 2020 14:47:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=23832585</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=23832585</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23832585</guid></item><item><title><![CDATA[New comment by IanGabes in "What do you call a startup that raises Series C, then immediately kills itself?"]]></title><description><![CDATA[
<p>I believe this was written in reply to someone that agrees with your article's general premise.<p>Q: What do you call a startup that raises Series C, then immediately kills itself?
A: Fraudulent?</p>
]]></description><pubDate>Fri, 03 Jul 2020 17:21:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=23725744</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=23725744</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23725744</guid></item><item><title><![CDATA[New comment by IanGabes in "Does saying “Fuck You AWS” constitute offensive content?"]]></title><description><![CDATA[
<p>I think the legalese should be taken seriously!<p>For instance, we can draw a comparison to recent controversy with social media platforms. Do you think that social media platforms should be able to remove any content on their platform, regardless of legality? I believe that they can! Otherwise objectionable is hopefully that catch all.<p>I view the OP as a bit of a misguided test. The blog post, in all likelihood, will remain up. The control the authour speaks of will still remain in the cloud provider's hands.</p>
]]></description><pubDate>Thu, 02 Jul 2020 20:31:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=23717677</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=23717677</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23717677</guid></item><item><title><![CDATA[New comment by IanGabes in "Running Postgres in Kubernetes [pdf]"]]></title><description><![CDATA[
<p>In my personal opinion, there are three database types.<p>'Small' Databases are the first, and are easy to dump into kubernetes. Anything DB with a total storage requirement 100GB or less (if I lick my finger and try to measure the wind), really, can be easily containerized, dumped into kubernetes and you will be a happy camper because it makes prod / dev testing easy, and you don't really need to think too much here.<p>'Large' database are too big to seriously put into a container.  You will run into storage and networking limits for cloud providers. Good luck transferring all that data off bare metal! Your tables will more than likely need to be sharded to even start thinking about gaining any benefit from kubernetes. From my own rubric, my team runs a "large" Mysql database with large sets of archived data that uses more storage that managed cloud SQL solutions can provide. It would take us months to re-design to take advantage of the Mysql Clustering mechanisms, along with following the learning curve that comes with it.<p>'Massive' databases need to be planned and designed from "the ground up" to live in multiple regions, and leverage respective clustering technologies. Your tables are sharded, replicated and backed up, and you are running in different DCs attempting to serve edge traffic. Kubernetes wins here as well, but, as the OP suggests, not without high effort. K8S give you the scaling and operational interface to manage hundreds of database nodes.<p>It seems weird to me that the Vitess and OP belabour their Monitoring, Pooling, and Backup story, when I think the #1 reason you reach for an orchestrator in these problem spaces is scaling.<p>All that being said, my main point here is that orchestration technologies are tools, and picking the right one is hard , but can be important :) Databases can go into k8s! Make it easy on yourself and choose the right databases to put there</p>
]]></description><pubDate>Mon, 29 Jun 2020 22:41:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=23684268</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=23684268</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23684268</guid></item><item><title><![CDATA[New comment by IanGabes in "Lens (The Kubernetes IDE) v3.5.0-RC.1"]]></title><description><![CDATA[
<p>I am in the middle of a k8s project, and tried out this tool briefly. I mostly love the UI! I guess I am newer to k8s, and am getting sick of typing all the same commands looking for pod descriptions, logs, and shell access. This tool is fantastic for debugging. I love being able to access pod shells instantly. I love seeing most of the k8s objects I have one click away! I have not yet tried out k9s, nor do I have prometheus installed in my cluster.<p>I have one feature request, and two gripes :)<p>Feature Request: Why is there not a big ol' search bar across the top so I can filter resources by label, or by resource name? I might hazard that caching resource names/labels across all object types, and letting users filter those would be a pretty fun feature.<p>Gripe One: I am on a flaky VPN connection into my cluster, and Lens wholesale drops the UI if the cluster is unresponsive for a second or two until I reconnect.<p>Gripe Two: Is it weird to call this an "ide" without giving me a YAML editor and file management? I could do everything in the terminal, which is alright I guess, but I figure editing/applying/inspecting all of that in the same app would be pretty chill! I currently use Pycharm to manage my yaml files, bash scripts, and some python code, but it clearly lacks all the k8s goodies Lens has.<p>I like the tool!</p>
]]></description><pubDate>Thu, 11 Jun 2020 19:39:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=23492599</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=23492599</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23492599</guid></item><item><title><![CDATA[New comment by IanGabes in "Indian nuclear power plant’s network was hacked, officials confirm"]]></title><description><![CDATA[
<p>I am not sure that getting commodity style malware onto a internet connected workstation is truly considered sophisticated, but i am on board with caution before attribution.<p>I have not seen any further confirmed details in this or any other articles, how do you determine the necessity of boots on the ground?</p>
]]></description><pubDate>Wed, 30 Oct 2019 23:37:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=21404191</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=21404191</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21404191</guid></item><item><title><![CDATA[New comment by IanGabes in "Storing 50M events per second in Elasticsearch"]]></title><description><![CDATA[
<p>Oh, yes, sorry i see your perspective now. You will get data loss in this example. My understanding of the example was that it is showing how one node can end up with all the write operations, i wasnt under the impression that it was a "real" cluster.</p>
]]></description><pubDate>Wed, 23 Oct 2019 22:13:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=21339626</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=21339626</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21339626</guid></item><item><title><![CDATA[New comment by IanGabes in "Storing 50M events per second in Elasticsearch"]]></title><description><![CDATA[
<p>Indices are composed of one or more primary shards. Each primary shard can have one replica. Three nodes, each with one primary shard as a part of that sjngle index, no replicas in play at all.</p>
]]></description><pubDate>Wed, 23 Oct 2019 01:10:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=21330113</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=21330113</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21330113</guid></item><item><title><![CDATA[New comment by IanGabes in "Cowrie: a medium-interaction SSH and Telnet honeypot"]]></title><description><![CDATA[
<p>I havent seen anything terribly relevant, most of the thesis projects i have seen are more interested in creating realistic and believable honeypots for specific protocols, eg RDP.<p>In my experience, honeypots and tarpits are not the same sort of thing, and fufill different goals. Tarpits get you more utilitarian good, honeypots get you more representative threat intel.</p>
]]></description><pubDate>Sun, 25 Aug 2019 23:34:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=20796372</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=20796372</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20796372</guid></item><item><title><![CDATA[New comment by IanGabes in "Cowrie: a medium-interaction SSH and Telnet honeypot"]]></title><description><![CDATA[
<p>Depends on your goals! If you are defending a network, increasing the cost of attack is something we actively try to optimize for. It costs me next to nothing to hold a socket open and send a keep alive every 15 seconds or so, in addition to the extra threat intel from the initial connection.<p>You might have a point, and maybe i should try to turn these subjective feelings into harder metrics in terms of cost, but we have figured at this point it has a net good. If we slow the scanning down by a magnitude, in my opinion its a good thing!</p>
]]></description><pubDate>Sun, 25 Aug 2019 22:03:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=20795895</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=20795895</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20795895</guid></item><item><title><![CDATA[New comment by IanGabes in "Cowrie: a medium-interaction SSH and Telnet honeypot"]]></title><description><![CDATA[
<p>My team and i run some different honeypot solutions, and we base a lot of them off of cowrie. As pointed out by previous comments, most interactions are not so interesting, except for the fact that many cowrie based honeypots imitating IoT devices have their attackers running a simple script that pulls down a number of second stage binaries, for a variety of cpu architectures.<p>One downside to running software like cowrie is that generally speaking crawlers like shodan will be able to figure out that you are running a honeypot, and will have you fingerprinted in a hurry.<p>A better strategy for increasing the cost of an attack is actually implementing something i read about on HN called a ssh tarpit, where one can "hang" an incoming ssh connection indefinitely. A lot of the attacks on honeypots are automated, so instead of having a 3 second attack, one can waste the attackers time for about 30s to 1m on average as these scripts have very generous timeouts (and sometimes no timeouts at all).</p>
]]></description><pubDate>Sun, 25 Aug 2019 20:54:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=20795516</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=20795516</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20795516</guid></item><item><title><![CDATA[New comment by IanGabes in "VMware Acquires Carbon Black for $2.1B and Pivotal for $2.7B"]]></title><description><![CDATA[
<p>We need to coin a new phrase then : )<p>Here i am just referring to the ease of using iaas offerings like s3 buckets but through on prem hardware. Devs build against drop in blob storage apis as if we lived in aws, and my ops guys still manage the backing vms.</p>
]]></description><pubDate>Fri, 23 Aug 2019 21:27:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=20782784</link><dc:creator>IanGabes</dc:creator><comments>https://news.ycombinator.com/item?id=20782784</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20782784</guid></item></channel></rss>