[Wayback/Archive] Jason Levin on X: “Jira marketing team was like “what infrastructure is as inefficient and frustrating as us?” and then puts ads on the New York City subway”
Picture via [Wayback/Archive] Tweet JSON:
Posted by jpluimers on 2024/10/22
[Wayback/Archive] Jason Levin on X: “Jira marketing team was like “what infrastructure is as inefficient and frustrating as us?” and then puts ads on the New York City subway”
Picture via [Wayback/Archive] Tweet JSON:
Posted in Conference Topics, Conferences, Development, Event, Fun, Issue/Bug tracking, JIRA, Software Development | Leave a Comment »
Posted by jpluimers on 2024/10/22
[Wayback/Archive] Joost Schellevis on Twitter: “het blijkt geen algemeen gangbare kennis dat dit de uiterste verkoopdatum is. in dit geval: c = woensdag, 31 = week 31. (a = maandag, g = zondag. dus e40: de vrijdag van week 40). staat op veel voorverpakt fruit en groente. weet je dat ook weer.”.
Oh ja:
Posted in Algorithms, Conference Topics, Conferences, Development, Event, LifeHacker, Power User, Software Development | Leave a Comment »
Posted by jpluimers on 2024/10/17
LLM are just statistic text generators which depend on the texts they have been trained which and alleviating this usually makes things worse: [Wayback/Archive] AI generates covertly racist decisions about people based on their dialect | Nature
Related:
Of course these issues are not limited to natural language LLM: artificial computer language LLM are also full of training issues that are likely very hard to resolve. What if covert organisations succeed poisoning LLM platforms with malicious code?
Via
Posted in AI and ML; Artificial Intelligence & Machine Learning, Conference Topics, Conferences, Development, Event, LLM, Software Development | Leave a Comment »
Posted by jpluimers on 2024/10/17
Interesting series of tweets about what to harden your application for in a reply to [Wayback/Archive] Kris on Twitter: “On a scale of 1-8, how pessimistic is your code? “Write code to provision a Google Chrome Extension for an end users Mac.”” which I saved to [Wayback/Archive] Thread by @isotopp on Thread Reader App (actually the scale is 1-9):
Extensions are stored in a 32 letter directory in the user profile in the Extensions directory.
i.e.
/Users/kris/Library/Application Support/Google/Chrome/Default/Extensions/<32letters>
- The User has set up their Mac so that their home directory is not in /Users.
- The User has set up their Mac so that the home directory name is different from their login user name.
- The User has multiple user profiles in Chrome, so that the path is not
$HOME/Library/Application Support/Google/Chrome/Default, but some other profile directory.- The target profile is not “
Default“.- The target name is not a directory, but a symlink to some interesting system config file or directory instead.
- The target name already exists, and is a file, not a directory.
- The target name is a file, and has permissions set to
000(chmod a-rwx).- The file has an ACL that denies deletion to the user.
$ chmod +a "$USER deny delete" <32chars>- The file has been
chflags‘ed toschg(immutable; irrevocable, unless the machine is rebooted to single user mode).
The above idea was for Chrome Extensions, so the below links are relevant, but it could be extended to any installer use case.
–jeroen
Posted in Development, Software Development | Leave a Comment »
Posted by jpluimers on 2024/10/16
On my list of things to look at via [Wayback/Archive] “AutoLogonSID” – Google Search:
Posted in Conference Topics, Conferences, Development, Event, Power User, Security, Software Development, Windows, Windows 10, Windows 11, Windows 7, Windows 8, Windows 8.1, Windows Development | Leave a Comment »
Posted by jpluimers on 2024/10/15
[Wayback/Archive] Accessibility Myths has great debunks.
Quite a few of them are phrased with a web perspective in mind. That’s just because of prevalence. These myths are there on native platforms (mobile, Windows, MacOS and Linux) as well and can be debunked in the same way.
Similar myths are even there for real life: accessibility of buildings, signage, streets, you name it are just that and can be debunked with common sense.
An inclusive society actually is cheaper than a exclusive one, as it benefits everyone. The same holds for your software.
Related: [Wayback/Archive] Learn Accessibility | web.dev
Via:
--jeroen
Posted in accessibility (a11y), Awareness, Development, Hardware Development, Inclusion / inclusive society, Power User, Software Development | Leave a Comment »
Posted by jpluimers on 2024/10/15
A while ago I downloaded some internal tooling that required vcredist140.dll (and related DLLs).
From the name you cannot see if that is a 32-bit (x86) or 64-bit (x64) dependency so you often have to trial and error to figure out which one you need.
I adopted some winget package install command-lines with package IDs current at the time of writing this blog post; similar should be available at the time of publication:
Posted in .NET, C++, Development, Software Development, Visual Studio 2015, Visual Studio 2017, Visual Studio 2019, Visual Studio 2022, Visual Studio and tools, Visual Studio C++ | Leave a Comment »
Posted by jpluimers on 2024/10/10
A very interesting read, where it keeps me wondering how batch files like these are being generated (making them by hand feels very surreal): [Wayback/Archive] From Highly Obfuscated Batch File to XWorm and Redline – SANS Internet Storm Center
VirusTotal entry: [Wayback/Archive] VirusTotal – File – 453c017e02e6ce747d605081ad78bf210b3d0004a056d1f65dd1f21c9bf13a9a
The day after the article was written, only Kaspersky and ZoneAlarm detected it; in the past ZoneAlarm used the Kaspersky engine, but that stopped a while ago: [Wayback/Archive] ZoneAlarm Free Antivirus Review | PCMag.
The malware uses at least these technologies:
Posted in Antivirus, Batch-Files, Development, Power User, PowerShell, Python, Scripting, Security, Software Development, Windows Development | Leave a Comment »
Posted by jpluimers on 2024/10/10
Nowadays software development documentation is usually sparse and distributed, which means it should be well searchable.
Posted in Conference Topics, Conferences, Development, documentation, Event, Software Development | Leave a Comment »
Posted by jpluimers on 2024/10/09
Note that the below methods likely will cause security warnings if a Windows machine has been properly configured, but in most cases at least one of them works.
curl --url https://speed.hetzner.de/100MB.bin --output %TEMP%\100MB.bin
certutil | Microsoft Docs (at least Windows 7 and up; needs UAC elevation)certutil.exe -urlcache -split -f https://speed.hetzner.de/100MB.bin %TEMP%\100MB.bin
powershell.exe -Command (New-Object System.Net.WebClient).DownloadFile('https://speed.hetzner.de/100MB.bin','%TEMP%\100MB.bin')
I think it works for all versions of curl, certutil, and PowerShell though I did not have anything older than up-to-date Windows 7 (having PowerShell version 3) and recent to test on.
Posted in *nix, *nix-tools, .NET, Batch-Files, CommandLine, cURL, Development, Power User, PowerShell, PowerShell, Scripting, Software Development, Windows, Windows 10, Windows 11, Windows 7, Windows 8, Windows 8.1, Windows Development, Windows Vista | Leave a Comment »