relatedly, I've been wondering if "use the command line as the primary way to manage your files" is a thing anyone is *starting* to do in 2022, or whether the only people who do it now started like 10+ years ago
also I guess this breaks your SOA records which are used for some things? I'm very unclear on what the actual practical consequences of breaking your domain's SOA records are though.
I've always heard that you can't create CNAME records at the root of the domain.
But apparently you can? It seems to work fine as far as I can tell but I'm curious about the possible consequences.
(yes, I registered http://cnameroot.com just to make this tweet)
I love thinking about computer stuff in terms of
1. how does it work?
2. if we had a time machine would we still design it that way?
like this null terminated string thing
oh absolutely. i should've answered this to the "what would you change with a time machine?" question earlier. i'd make strings an implicit struct carrying a pointer and a length. nul-termination has caused so much damage, just to save a register
Moving from Kaggle to "real world ML" I'd say the biggest challenge I face is how not to trust the ground truth labels. For example, I'm dealing with abuse data and since abusive events are rare, just because it doesn't have positive label doesn't mean it's negative.
when I started writing this DNS zine I thought it would be easy to write a clear explanation of how DNS works
I was very wrong but after many weeks of editing, we're getting there!!
i always find it a bit weird to publish my hacky side projects because
a) I love writing hacky code that does questionable things
b) I don't want to suggest that those questionable things are a _good idea_ in real life
c) but I have learned a lot by writing sketchy code :)
Sure thing!
First is to just support one of everything: don’t do negotiation. This means you can ignore what’s called “hello retry request” and now your state machine only moves forward or hits an error.
Second is to not verify certs or validate the signature in […]
i know it's possible to implement working toy versions of TCP/UDP/HTTP/DNS from scratch in less than 200 lines of python ("working" in the sense of "can successfully talk to 1 real server")
curious if the same is true of TLS, maybe with some crypto libraries
wondering how hard it would be to write a tiny TLS 1.3 implementation, with as many features as possible left out (no session resumption etc)
just for learning, NOT for production use obviously :)
random poll: have you ever learned a computer topic primarily by reading a book? (for example something like Rust or React or OpenGL)
I'm curious because I struggle a lot with tech books, I almost always read 1 chapter and then give up immediately.
here it is! a tour of advanced features in chrome dev tools & how i spent hours trying to get tswift concert tickets https://medium.com/@amyngyn/look-what-you-made-me-do-chrome-b85eb2a90540…
one problem with running out of IPv4 addresses I hadn't considered is that now a lot of people have to share IPs, so you can get your IP blocked from a service even if you did nothing wrong.
So maybe one reason for sites to support IPv6 is to reduce spam/fraud false positives?
a bunch of companies have been buying corporate licenses to give zines to their employees recently (thank you!!), so it seems like a good time to help out teachers & nonprofits :)