That is confusing! Thanks for the clarification and link. I guess I’ve seen kJ more than I thought, just not by a name that makes any sense lol. Never knew I’d learn so much by posting this lol
That is confusing! Thanks for the clarification and link. I guess I’ve seen kJ more than I thought, just not by a name that makes any sense lol. Never knew I’d learn so much by posting this lol
I was entirely unaware how common and mundane this is basically everywhere outside the United States. This is the first food item I’ve seen ever list kJ here, which is why I found it interesting, but I guess it’s quite standard elsewhere!
It doesn’t seem to be the case in the U.S. Basically everything I can find that has a nutritional information label exclusively lists “Calories” and I have never seen kJ here
Yeah! Here’s their GitHub
SuperTuxKart and Mindustry are so much fun!
Almost everything was web based. Being in computer science i did have to write code and compile executables that my TAs running Windows could run; so it wasn’t perfectly smooth. There was also Respondus Lockdown, but I could borrow a laptop from the library to use it.
From what I understand you always want to keep accidentals as close to their note as you can to decrease chances to misread the notation.
I’m not saying incomprehensible build scripts are good here, my mistake for making it seem that way. I’m not confident that hiding it elsewhere would have been strictly more obvious but it absolutely could have been.
I’ve done some pretty complex C projects and haven’t had build scripts nearly that large. This one seems particularly unwieldy and certainly helped the attacker.
I’m going to be honest, I’m getting a little tired of hearing everyone’s thoughts on the xz backdoor. It’s discouraging and sucks when every detail of the project which, keep in mind, was maintained by one person who fell victim to a social engineering attack, is scrutinized. It makes me concerned about anyone depending on any of my projects.
Especially the comments on things such as the build scripts, which this kind of article seems to gravitate towards. If the build scripts were tiny and checked then the attack vector would have just been different, I’m not even too sure the language mattered. The attack was social engineering, after that it was pretty much project agnostic. xz was targeted cause the maintainer was done working on it and it was heavily depended on.
There’s a project I could have written in Rust. Maybe some of the headache wouldn’t have ever happened using Rust.
I also didn’t know Rust at the time and it was a large project with unkind deadlines. I think the right tool for the job can also depend on available resources. So while the more unsafe, older tool I used caused a few small issues that Rust would not have; the project wouldn’t have been finished if I’d used Rust.
Not as easy of a choice when I’m struggling to get a job :/
I’d use Desktop if it worked, unfortunately recently it decided that I don’t have read/write access to a repo I’m working on. Works fine in git CLI so idk what the problem there is.
You want to remove the string concatenation operator? Cause that’ll do it
Cathode Ray Dude is amazing for weird old tech stuff!
I tried for about a week: reading documentation, viewing and modifying example programs, using a Rust IDE with warnings for all my silly mistakes, the works. I couldn’t manage to wrap my head around it. It’s so different from what I’m used to. If I could dedicate like a month to learn it I would, but I don’t have the time :/