Hacker Newsnew | past | comments | ask | show | jobs | submit | chirayuk's commentslogin

The Goldtouch split keyboards worked wonders for me.


I have "Shift space" remapped to underscore as that was my biggest annoyance. The rest I've made peace with (though not ergonomic).


It's Option Shift "-" for the em-dash. Option "-" is the en-dash.


Fun comments for re-writing sudo in Zig:

> Zig doesn't have traits. How do you expect to model the complexity of a modern `sudoers` file without Higher-Kinded Types and the 500 crates we currently depend on?

> Also, `unsafe` in Rust is better than "trust me bro" in Zig. If you switch, the borrow checker gods will be angry.

from https://sw.vtom.net/hn35/pages/90100066.html


This got me a chuckle.

> Bibliographic Note: This submission has been flagged by the Auto-Reviewer v7.0 due to high similarity with "Running DOOM on a Mitochondria" (2034).

for the article on "Running LLaMA-12 7B on a contact lens with WASM"

https://sw.vtom.net/hn35/pages/90100123.html


I had these same concerns for a while. Earlier this year, I turned on IPv6 and run a dual stack on my home network (my mac is browsing HN via IPv6.)

Do you remember what sites didn't load for you?


I run `stty -ixon -ixoff` once and that fixes the issue for me.


That's a different flow control than what I'm talking about. tmux is just overwhelmed and cannot keep up with the output from tar whereas screen takes care of it and still responds to user input. Frankly I'm amazed there's only one or two posts about this on the internet as there's more than the pathological linux tarball extract where this problem will lock up tmux.


yes, this sucks but i have never myself been able to find a reliable case where screen reacts any better than tmux (for example, both behave similarly with yes(1))

the c0-* stuff is poor (i'm tempted to remove it) but it is not an easy problem to solve, people want tmux to be fast, except when they don't. it's also tricky remotely where ssh and the network stack are buffering too


Some thoughts: VMs are an interesting case. Someone with the motive and means would have exploits to get out of the VM. This is probably easier if the guest is running something to accelerate (e.g. VMWare Tools / VirtualBox Guest Additions.) Once you get out, you have to account for the host OS. Assuming you could do it, how does one determine if the VM is part of a honeypot or the target?


Not really. Consider how many hypervisors are there really to exploit from a virtual OS?

Maybe four.

HyperV, KVM, ESX, what you mentioned, etc...

But really, 3 vendors - Oracle, Microsoft, and VMWare covers the majority.

Way fewer virtualization technologies (mainstream) than hard drive firmwares.


Would love to see the code and test it against a rebuilt a patched nginx.


Filippo has hosted it with github.

https://github.com/FiloSottile/Heartbleed


Just run it against it?


Well, I was interested in actually testing it out in code. I got it working with the pyOpenSSL bindings (I had to expose struct ssl_method_st, SSL_get_ssl_method, ssl_write_bytes and rebuild cryptography for pyOpenSSL.) Fun times.


I know what you mean. I translated that to a python script a while ago for myself so I could stick it on other boxes without having to compile it. It's now a gist – https://gist.github.com/chirayuk/5377283


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: