vrek

joined 2 years ago
[–] vrek@programming.dev 2 points 47 minutes ago

Actually only two "witches" were burned, about 70% were acquitted and almost the rest were hanged. That's atleast true in England, don't know about the figures for the US.

As evidence of the computers comment here's Wikipedia https://en.wikipedia.org/wiki/Computer_(occupation)

[–] vrek@programming.dev 2 points 1 hour ago

Long ago I think it was 2006, I worked in a computer store/corporate it support that used to also be a 56k dial up isp. When i first got hired it was supposed to be like a paid internship. 2 weeks in the guy "mentoring" me was fired. Only other employees was the owner was had a PhD in information technology from 1984 and never kept up and his wife who did the accounting.

Over the next year he hired and fired probably 15 people and then decided he liked me enough to make me full time. He had no idea what he was doing and neither did I. Basically I was responsible for 8 business networks(including a 150 employee credit union), any computers a customer brought in, and our own internal network.

One day it was slow so I was browsing various web comics. The owner comes on at 1030(we opened at 900) furious with me. He claimed I was "reading a page with black text on a white background" which meant I was reading how to operate a spam business. That was his proof, a page with black text and a white background which he could not find my history.

He had received a letter from his isp that we were sending 2.5 million emails a day, we had 72 hours to resolve the issue or we were to be cut off. I argued that I didn't run a spam operation, he had no proof and there were simpler explanations. It got so heated I quit, keep in mind I was only employee.

Next day the credit union was having a server issue and he had no one to fix it. He called me asking for me to return, I negotiated a $1 hour raise, an official written letter of apology, pay for time the previous day and that day and told him I would be back the following day.

I went in, solved the server issue(eventually found out cleaning crew was unplugging the power strip to plug in their vaccum over night and the server was configured not to restart when power returned). Went back to the office and talked with the owner. He showed me the letter and it identified 2 ip addresses as being the source. Neither was my computer and I didn't recognize them. There was a command you could send over the terminal to open the CD tray based on ip address. I ran the command and basically walked around looking for a computer with open CD trays.

Turns out there was 2 servers, outside of our firewall directly facing the internet and yes for the memes they were originally dns servers from the 56k isp days. They were running original nt4, completely unpatched, with no security software installed and permanent outside facing ip addresses. I ran a virus scanner on it, I stopped when it detected over 100k infected files. Disconnected the servers, waited 10 minutes, called isp and effectively all email had stopped (the boss and myself both sent 1 email to confirm it was still working).

[–] vrek@programming.dev 3 points 2 hours ago (2 children)

The first computers were mostly women so... (originally being a computer was a profession which basically meant being paid to do calculations.)

[–] vrek@programming.dev 2 points 18 hours ago

Before that we even had "the thong song"... Still trying to figure out what "she got dumps like a truck" is supposed to mean.

Actually music from the late 90s, early 2000s was filthy... What's your fantasy... Push it... It wasn't me... Back that ass up... Slow motion for me...

[–] vrek@programming.dev 3 points 19 hours ago

Depends... Wait if it involves depends that a whole other fetish.

[–] vrek@programming.dev 2 points 20 hours ago (2 children)

I asked that question a few weeks ago. My understanding is either it's claiming two things are equal when they are not (something like "BMW... Family Toyota van... And pretending to weigh them in your hands) or comparing two things that are equal but self depreciation humor that you're bad at math(like the old six on one hand half a dozen in the other but with self depreciation thrown in)

[–] vrek@programming.dev 12 points 20 hours ago (6 children)

From the times when I was younger...

68 is you do me and I owe you one. 71 was 69 with 2 fingers in the ass. I guess 70 would just be training...

[–] vrek@programming.dev 10 points 1 day ago

I got a Nobel prize... Now people have to knock on my door

[–] vrek@programming.dev 150 points 2 days ago* (last edited 2 days ago) (18 children)

Look... We don't allow liquids cause they may be explosive, so put your possible explosive with all these other potential explosives in the busiest and most congested and concentrated area of this airport....i think I may of found a flaw in this plan

[–] vrek@programming.dev 4 points 6 days ago

Personally I would prefer ham or bacon but I can deal with chicken...

[–] vrek@programming.dev 2 points 1 week ago

Well if that's what you want it's in the wrong hole

 

I'll give an example. At my previous company there was a program where you basically select a start date, select an end date, select the system and press a button and it reaches out to a database and pulls all the data following that matches those parameters. The horrors of this were 1. The queries were hard coded.

  1. They were stored in a configuration file, in xml format.

  2. The queries were not 1 entry. It was 4, a start, the part between start date and end date, the part between end date and system and then the end part. All of these were then concatenated in the program intermixed with variables.

  3. This was then sent to the server as pure sql, no orm.

  4. Here's my favorite part. You obviously don't want anyone modifying the configuration file so they encrypted it. Now I know what you're thinking at some point you probably will need to modify or add to the configuration so you store an unencrypted version in a secure location. Nope! The program had the ability to encrypt and decrypt but there were no visible buttons to access those functions. The program was written in winforms. You had to open the program in visual studio, manually expand the size of the window(locked size in regular use) and that shows the buttons. Now run the program in debug. Press the decrypt button. DO NOT EXIT THE PROGRAM! Edit the file in a text editor. Save file. Press the encrypt button. Copy the encrypted file to any other location on your computer. Close the program. Manually email the encrypted file to anybody using the file.

view more: next ›