<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: gwu78</title><link>https://news.ycombinator.com/user?id=gwu78</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 27 Apr 2026 10:13:01 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=gwu78" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by gwu78 in "A brief history of IPv4 address space exhaustion"]]></title><description><![CDATA[
<p><a href="http://www.internetsociety.org/deploy360/blog/2017/05/google-buys-a-12-ipv4-address-block/" rel="nofollow">http://www.internetsociety.org/deploy360/blog/2017/05/google...</a></p>
]]></description><pubDate>Thu, 25 May 2017 20:15:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=14419806</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14419806</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14419806</guid></item><item><title><![CDATA[New comment by gwu78 in "Faster Command Line Tools in D"]]></title><description><![CDATA[
<p>I was using the first example with a char in the first column.<p><pre><code>   A 4
   B 5
   B 8
   C 9
   A 6
</code></pre>
How to solve with only a dict?<p>Regarding the 1gram file at <a href="https://storage.googleapis.com/books/ngrams/books/googlebooks-eng-all-1gram-20120701-0.gz" rel="nofollow">https://storage.googleapis.com/books/ngrams/books/googlebook...</a><p>This is the result I got<p><pre><code>   3| 1742563279
</code></pre>
using<p><pre><code>   q)\ts d:(!/)(" II";"\t")0:`:1gram
   q)\ts 1#desc sum each group d
   1897 134218176
   371 238872864
</code></pre>
or<p><pre><code>   k)\ts d:(!/)(" II";"\t")0:`:1gram
   k)\ts desc:{$[99h=@x;(!x)[i]!r i:>r:. x;0h>@x;'`rank;x@>x]}
   k)\ts 1#desc (sum'=:d)
   1897 134218176
   0 3152
   372 238872864
</code></pre>
No doubt I must be doing some things wrong.</p>
]]></description><pubDate>Thu, 25 May 2017 19:47:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=14419635</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14419635</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14419635</guid></item><item><title><![CDATA[New comment by gwu78 in "Faster Command Line Tools in D"]]></title><description><![CDATA[
<p>"The task is to sum the values for each key and print the key with the largest sum."<p>What is the smart way to do this in kdb+?<p>This is my naive, sloppy 15min approach.<p>Warning: Noob. May offend experienced k programmers.<p><pre><code>   k)`t insert+:`k`v!("CI";"\t")0:`:tsvfile
   k)f:{select (*:k),(sum v) from t where k=x}
   k)a:f["A"]
   k)b:f["B"]
   k)c:f["C"]
   k)select k from a,b,c where v=(max v)</code></pre></p>
]]></description><pubDate>Thu, 25 May 2017 03:34:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=14415143</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14415143</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14415143</guid></item><item><title><![CDATA[New comment by gwu78 in "Kill Google AMP before it kills the web"]]></title><description><![CDATA[
<p>Long before amp, Google began prefixing search result urls with "google.tld?url=" and adding Google parameters as suffixes such as "sa=", "ved=", etc.<p>Unless I am mistaken this parasitic cruft only serves Google, not end users.<p>Below is quick and dirty program to filter out the above.  Replace .com with .cctld as needed.<p>Requirements: 
   cc, lex<p>Usage:<p><pre><code>   curl -o 1.htm https://www.google.com/search?q=xyz
   yyg < 1.htm > 2.htm
   your-ad-supported-web-browser 2.htm
</code></pre>
To compile this I use something like<p><pre><code>   flex -Crfa -8 -i g.l;
   cc -Wall -pipe lex.yy.c -static -o yyg;
</code></pre>
Save text below as file g.l
Then compile as above.<p><pre><code>   %%
   [^\12\40-\176]
   \/url[?]q= 
   "http://www.google.com/gwt\/x?hl=en&amp;u=" 
   "&amp;"[^\"]* 
   %%
   main(){yylex();}
   yywrap(){}
</code></pre>
As for amp, I read that it needs to use iframes (and Javascript).  Yikes.  We can easily write a program to strip out iframe targets as well as links to Javascript.<p>amphtml does look great in a text-only browser that does not load iframes automatically.</p>
]]></description><pubDate>Sun, 21 May 2017 02:21:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=14385386</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14385386</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14385386</guid></item><item><title><![CDATA[New comment by gwu78 in "Qhasm: tools to help write high-speed software"]]></title><description><![CDATA[
<p>Favorite part is how he mixes the register allocator with a chain of seds.<p>I did something similar with a youtube downloader I wrote, using a long chain of seds.  It is not as beautiful as Python but it is smaller and faster.<p>When I shared it with HN the youtube-dl author called it "unmaintainable".  By who?  I have had no problems maintaining it. :)</p>
]]></description><pubDate>Sat, 20 May 2017 03:36:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=14380909</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14380909</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14380909</guid></item><item><title><![CDATA[New comment by gwu78 in "Hacker News Readers as Progressive Web Apps"]]></title><description><![CDATA[
<p>This is my "Hacker News Reader". It converts HN to csv.  (Only selected fields of interest to me.) From there it can easily be imported into kdb+.  I have more reusable generalized lex techniques for other websites but HN is so simple it can be done via a braindead one-off as below.<p>Requirements: lex, cc<p>Usage:<p><pre><code>   fetch -4o yc.htm https://news.ycombinator.com
   yc < yc.htm 
</code></pre>
To compile this I use something like<p><pre><code>    flex -Crfa -8 -i yc.l;
    cc -Wall -pipe lex.yy.c -static -o yc;
</code></pre>
Save the text below as yc.l then compile as above.<p><pre><code>    #define jmp BEGIN
    #define p printf
    #define x yytext
   %s aa bb cc dd ee ff gg hh
   %s ii jj kk ll mm nn oo 
   aa "span class=\"rank\""
   bb "a href=\""
   cc score_........
   dd \>
    /* #include <time.h> */
    /* #include <util.h> */
   %%
   [^\12\40-\176]
   , p("%2c");
    /* rank (dont care) */
   {aa} jmp aa;
    /* <aa>[1-9][^<\.]* p("\n%s,",x);jmp bb; */
   <aa>[1-9][^<\.]* p("\n");jmp bb; 
    /* url */
   <bb>{bb} jmp cc;
   <cc>http[^"]* p("%s,",x);jmp dd; 
    /* title */
   <dd>{dd} jmp ee;
    /* <ee>[^><]* p("%s,",x);jmp ff; */
   <ee>[^><]* p("%s",x);jmp ff;
    /* host (omit) */
    /* points (dont care) */
   <ff>{cc} jmp gg;
   <gg>{dd} jmp hh;
    /* <hh>[1-9][^<> p]* p("%s,",x);jmp ii; */
   <hh>[1-9][^<> p]* p(",");jmp ii; 
    /* user */
   <ii>{bb} jmp jj;
   <jj>http[^"]* p("%s,",x);jmp kk;
    /* time (dont care) */
   <kk>{bb} jmp ll;
    /* <ll>http[^"]* ; */
   <ll>http[^"]* jmp mm;
    /* unix time (dont care) */
    /* <ll>[1-9][^<]* { 
    time_t t0; time_t t1; time_t t2;
    t1=time(&t0);
    t2=parsedate(x,&t1,0);
    p("%d,",t2); 
    jmp mm;
    } */
    /* item */
   <mm>{bb} jmp nn;
    /* <nn>http[^"]* p("%s,",x);jmp oo; */
   <nn>http[^"]* p("%s",x);jmp oo;
    /* comments (dont care) */
   <oo>{dd} jmp oo;
    /* <oo>[1-9d][^ <]* p("%s",x);jmp 0; */
   <oo>[1-9d][^ <]* jmp 0;
   .
   \n
   %%
   main(){ yylex();}
   yywrap(){ p("\n");}</code></pre></p>
]]></description><pubDate>Sat, 20 May 2017 03:11:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=14380858</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14380858</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14380858</guid></item><item><title><![CDATA[New comment by gwu78 in "Does a free swap turn a stack into a traditional register set? (2005)"]]></title><description><![CDATA[
<p>"I suggest compiler writers stop viewing the x86 stack as a twisted version of a traditional 8-register set."<p>What if compiler writers will not fix the problem?<p>Write own register allocator: <a href="http://cr.yp.to/qhasm.html" rel="nofollow">http://cr.yp.to/qhasm.html</a><p>Bonus: allow use of a "portable assembly language" to generate assembly, being respectful of the fact that <i>users might not all be using computers with the same CPU architecture.</i><p>This could be like assembler with C-like operators and structure.<p>In addtion to facilitating portability it might also make writing in assembler a little easier.<p>Reminds me of Bell Labs' LIL: <a href="http://www.ultimate.com/phil/lil/tut.html" rel="nofollow">http://www.ultimate.com/phil/lil/tut.html</a></p>
]]></description><pubDate>Sat, 20 May 2017 02:39:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=14380771</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14380771</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14380771</guid></item><item><title><![CDATA[New comment by gwu78 in "WanaCrypt0r Ransomworm"]]></title><description><![CDATA[
<p>Yes, this sounds right.  It has been a while since I looked at it.  Is it just one name?  I have a faint recollection it tried more than one.<p>Anyway, how is the difference significant?<p>A localhost cache can point at a custom root.zone.  The user can make her own authoritative nameserver assignments for any given zone or domain.  Zone files can contain wildcards.<p>Responses can also be rewritten on the fly.<p>The end user can exercise full control over what is and is not a "valid" domain name.  She can prevent her applications from ever receiving an "NXDOMAIN" response.<p>Maybe I am missing something but this "test" seems brittle; it only tests ICANN DNS.</p>
]]></description><pubDate>Fri, 19 May 2017 05:21:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=14373214</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14373214</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14373214</guid></item><item><title><![CDATA[New comment by gwu78 in "WanaCrypt0r Ransomworm"]]></title><description><![CDATA[
<p>Notable that he calls the "kill-switch" a "mistake".  For example, Chrome does the same thing.  When it starts it checks for some presumably non-existant domain name.</p>
]]></description><pubDate>Thu, 18 May 2017 15:35:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=14368114</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14368114</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14368114</guid></item><item><title><![CDATA[New comment by gwu78 in "JSON Feed"]]></title><description><![CDATA[
<p>Is this a "JSON Feed" from NYTimes?<p>Example below filters out all URLs for a specific section of the paper.<p><pre><code>   test $# = 1 ||exec echo usage: $0 section

   curl -o 1.json https://static01.nyt.com/services/json/sectionfronts/$1/index.jsonp
   exec sed '/\"guid\" :/!d;s/\",//;s/.*\"//' 1.json
</code></pre>
I guess SpiderBytes could be used for older articles?<p>Personally, I think a protocol like netstrings/bencode is better than JSON because it better respects the memory resources of the user's computer.<p>Every proposed protocol will have tradeoffs.<p>To me, RAM is sacred. I can "parse" netstrings in one pass but I have been unable to do this with a state machine for JSON.  I have to arbitrarily limit the number of states or risk a crash.  As easy as it is to exhaust a user's available RAM with Javascript so too can this be done with JSON.  Indeed they go well together.</p>
]]></description><pubDate>Thu, 18 May 2017 14:58:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=14367760</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14367760</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14367760</guid></item><item><title><![CDATA[New comment by gwu78 in "Accidentally Stopping a Global Cyber Attack"]]></title><description><![CDATA[
<p>"Lessons learnt by ransomware developers..."<p>If you are suggesting that developers, regardless whether they develop mobile apps or ransomware, will start relying less on DNS, I respectfully disagree.<p>Someone else in this thread commented how reliance on DNS makes systems "fragile".  With that I strongly agree.<p>The same old assumptions will continue to be made, such as the one that DNS, specifcally, ICANN DNS, is always going to be used.<p>How to break unwanted software?  Do not follow the assumptions.<p>For example, to break a very large quantity of shellcode change the name or location of the shell to something other than "/bin/sh".[1]<p>Will shellcoders switch to a "robust statistical model" instead of hard coding "/bin/sh"?<p>Someone once said that programmers are lazy.  Was he joking?<p>1.  Yes, I know it may also break wanted third party software.  When I first edited init.c, renamed and moved sh I was seeking to learn about dependencies.  I expected things to break.  That was the point: an experiment.  I wanted to see what would break and what would not.</p>
]]></description><pubDate>Sat, 13 May 2017 22:09:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=14333261</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14333261</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14333261</guid></item><item><title><![CDATA[New comment by gwu78 in "Generating all permutations, combinations, and power set of a string (2012)"]]></title><description><![CDATA[
<p>Here is a spitbol/snobol4 solution.  Assumes the number of items in the set is not greater than the alphabet.<p><pre><code>   * routine stolen from gimpel
   * algorithm from peck and schrack 

    define('p(s)t,n,c,k','p_init') :(p_end)
   p_init n = size(s)
    r = array('2:' n, 0)
    &alphabet len(n) . y
    x = array('2:' n, y)
    k = n + 1
   p_0 k = k - 1
    x[k] len(1) . s1 tab(k) . s2 = s2 s1  :s(p_0) 
    define('p(s)i,k') 
    p = s :(return)
   p k = size(s)
   p_1 s = replace(x[k],y,s) :f(p_2)
    r[k] = r[k] + 1
    k = eq(remdr(r[k], k),0) k - 1 :s(p_1)
    p = s :(return)
   p_2 define('p(s)t,n,s1,s2','p_init') :(freturn)
   p_end

   * example: all permutations of string abcdefgh
    s = 'abcdefgh'
   abc output = p(s) :s(abc)f(end)
   end
</code></pre>
Here is another solution that only returns the <i>unique</i> permutations.  The items of the set must first be sorted or grouped, e.g, a string like "cabcd" could be given as "ccabd", "adbcc", "abccd", etc.  Duplicate items must be adjacent.<p><pre><code>    define('r(s,ors)c,f,s1,a,d,os') 
    :(r_end)
   r ors rtab(1) len(1) . c :f(freturn)
    s (span(c) | null) . f =
    s arb . s1 len(1) . d c = :f(r_1)
    r = s1 f c d s :(return)
   r_1 ors break(c) . os
    r = r(s,os) f :s(return)f(freturn)
   r_end

    s = 'abcdefgh' 
    output = s
   x01 output = r(output,s) :s(x01)
   end</code></pre></p>
]]></description><pubDate>Sat, 06 May 2017 02:35:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=14278371</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14278371</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14278371</guid></item><item><title><![CDATA[New comment by gwu78 in "Truly Seamless Reloads with HAProxy"]]></title><description><![CDATA[
<p>"... is silly, there are better ways."<p>I see this usage often where it seems like<p><pre><code>  grep pattern1 | grep -v pattern2 
</code></pre>
can be replaced by<p><pre><code>  sed -n '/pattern1/d;/pattern2/p'
</code></pre>
or at least<p><pre><code>  sed '/pattern1/!d' | sed '/pattern2/d'
</code></pre>
or<p><pre><code>  sed -n 's/pattern1pattern2//g;/pattern2/p'
</code></pre>
But I must be missing something obvious.<p>For example look at the "grep -v" usage here:<p><a href="https://github.com/thomwiggers/qhasm/raw/master/qhasm-arm" rel="nofollow">https://github.com/thomwiggers/qhasm/raw/master/qhasm-arm</a><p>Is there something wrong with using<p><pre><code>   sed '/^op:livefloat80:/d'
</code></pre>
Moreover, in the last line, why not use<p><pre><code>  sed 's/\$/#/g'
</code></pre>
instead of<p><pre><code>  tr '$' '#'
</code></pre>
Apologies if I am missing the obvious.</p>
]]></description><pubDate>Fri, 05 May 2017 02:54:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=14270804</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14270804</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14270804</guid></item><item><title><![CDATA[New comment by gwu78 in "Truly Seamless Reloads with HAProxy"]]></title><description><![CDATA[
<p>Example line from the Openshift reload-haproxy script:<p><pre><code>  old_pids=$(ps -A -opid,args | grep haproxy | egrep -v -e 'grep|reload-haproxy' | awk '{print $1}' | tr '\n' ' ')
</code></pre>
Can we do this without grep, egrep and awk?
Would this work?<p><pre><code>  old_pids=$(exec ps -A -opid,args |sed -n '/sed/d;/reload-haproxy/d;/haproxy/{s/ .*//;p};'|tr '\n' ' ')</code></pre></p>
]]></description><pubDate>Fri, 05 May 2017 00:42:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=14270264</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14270264</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14270264</guid></item><item><title><![CDATA[New comment by gwu78 in "Intel's Remote AMT Vulnerability"]]></title><description><![CDATA[
<p>Is it true these packets are HTTP requests full of XML, i.e., SOAP?  Do they use HTTPS on ports 16994 and 16995?<p>To avoid a crash, users can mount potentially malicious filesystems in userspace, i.e. users can run kernel drivers like ffs outside of the kernel.  This feature comes from a non-Linux kernel. I have read this may be able to work on Linux too but I have never tried it.</p>
]]></description><pubDate>Tue, 02 May 2017 07:25:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=14244579</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14244579</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14244579</guid></item><item><title><![CDATA[New comment by gwu78 in "What about cartesian programming?"]]></title><description><![CDATA[
<p>First time I learned about SETL at NYU was when I was learning about Spitbol.<p>Here is a fizzbuzz in Spitbol.  Probably not the best way to do it.<p><pre><code>      var a = 0;
      start
      +a = a + 1;
      break
      +lt(a,101) :f(end);
      x01
      +x = (remdr(a,3) + remdr(a,5)); eq(x,0) :s(x06);
      x02
      +y = remdr(a,3); eq(y,0) :s(x04);
      x03
      +z = remdr(a,5); eq(z,0) :s(x05)f(x07);
      x04
      +output = 'fizz' :(start);
      x05
      +output = 'buzz' :(start);
      x06
      +output = 'fizzbuzz' :(start);
      x07
      +output = a :(start);
      end
      </code></pre>
More: <a href="http://www.hakank.org/setl/fizzbuzz.setl" rel="nofollow">http://www.hakank.org/setl/fizzbuzz.setl</a><p>He also has pages on APL and k.</p>
]]></description><pubDate>Mon, 01 May 2017 07:42:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=14236144</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14236144</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14236144</guid></item><item><title><![CDATA[New comment by gwu78 in "How Many X86-64 Instructions Are There Anyway?"]]></title><description><![CDATA[
<p>The knee-jerk answer upon seeing the title was: "Too many".<p>So many of these instructions I never see anyone use, ever.<p>No doubt there are some folks using them, but as mere mortals, do the rest of us really need all these features to control our small amount of commodity hardware?  As a user, I have modest goals.  Is it not true that Torvalds wrote his kernel with a similarly modest goal in mind: control over his own commodity computer?<p>The situation resembles that of an overcomplex software program where a majority of the features are unused by an even larger majority of its users.  In other words the depth of features benefit only the very few people who use them.<p>Given the choice between several alternatives with differing levels of features I tend to opt for software that is less featureful and hence more simple.  Call me simple-minded if you wish.  The same goes for processors, although when it comes to hardware how much choice to we really have as end users?  (Hobbyist boards excluded.)<p>For a taste of some non-x86 assmbler, I enjoyed experimenting with a MIPS simulator still found at spimsimulator.sourceforge.net.  I can report that the non-GUI portion at least still compiles relatively cleanly on BSD.  This simulator has been mentioned on HN several times.<p>I have a no problem with using a processor with fewer instructions even if I have to sacrafice something by making that choice -- I leave it to the experts to detail those sacrafices and why I would be a fool to make them.  NB: I am already a fool so it may not be worth the effort.<p>How many HN readers have tried RISC-V?  A poll for those who have not: will RISC-V inspire you to purchase a new computer?</p>
]]></description><pubDate>Sun, 30 Apr 2017 21:05:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=14233828</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14233828</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14233828</guid></item><item><title><![CDATA[New comment by gwu78 in "Hackers exploited Word flaw for months while Microsoft investigated"]]></title><description><![CDATA[
<p><a href="https://mobile.twitter.com/hashbreaker/status/853224169412206593?p=p" rel="nofollow">https://mobile.twitter.com/hashbreaker/status/85322416941220...</a><p>The strange "counterargument" I commonly see on HN to any suggestion that Microsoft closed source software could potentially be unsafe for use on an internet-connected computer is that the company has "improved" since some earlier 1990's/2000's time period.<p>Are these commenters suggesting that other, open source operating system choices have not also improved since that time period?  Should one consider how much did each respective system <i>need</i> to improve?<p>(By "other, open source operating system choices", I mean the ones that were able to connect to the internet for years before Gates decided the www was something his company should be interested in and to copy the TCP/IP stack from an open source kernel into the Windows kernel).<p>Are there convincing arguments why Microsoft deserves special treatment compared to the open source alternatives, i.e., why their users should not be permitted to freely evaluate the Windows kernel or Office source code via the public web?  Are there compelling reasons why MS users should not be allowed i.e. given the <i>option</i> to edit/remove source code they are uncomfortable with and recompile?  Consider the effects of limiting the number of people who can find and fix defects in a product.<p>Does closed source status of Windows make Microsoft's software superior to the longstanding open source operating system alternatives?</p>
]]></description><pubDate>Thu, 27 Apr 2017 05:16:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=14209334</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14209334</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14209334</guid></item><item><title><![CDATA[New comment by gwu78 in "Symantec CA Response to Google Proposal and Community Feedback"]]></title><description><![CDATA[
<p><a href="https://www.symantec.com/connect/tr/blogs/symantec-ca-proposal" rel="nofollow">https://www.symantec.com/connect/tr/blogs/symantec-ca-propos...</a><p>Works for me without Javascript.</p>
]]></description><pubDate>Thu, 27 Apr 2017 04:17:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=14209137</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14209137</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14209137</guid></item><item><title><![CDATA[New comment by gwu78 in "NNCP: utilities simplifying secure store-and-forward files and mail exchanging"]]></title><description><![CDATA[
<p>"UUCP can be setup rather easily with few configuration files and few lines in each of them. But you have to <i>add some encryption and authentication overlay</i> for securing you data transmission."<p>Any projects that attempted to do this sort of overlay for UUCP?<p>Incidentally, I like the way the author presents this project.  Usage examples, thoughtful use cases, comparisons, protocol description and <i>packet formats</i>.<p>No hype.</p>
]]></description><pubDate>Mon, 24 Apr 2017 18:59:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=14186993</link><dc:creator>gwu78</dc:creator><comments>https://news.ycombinator.com/item?id=14186993</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14186993</guid></item></channel></rss>