![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://programming.dev/pictrs/image/170721ad-9010-470f-a4a4-ead95f51f13b.png)
I agree, but agile and scrum are not meant to be followed to the letter no matter what. So people are doing it right if they notice some part of the process should be changed to make it work for them.
he/him
I agree, but agile and scrum are not meant to be followed to the letter no matter what. So people are doing it right if they notice some part of the process should be changed to make it work for them.
there’s a base n joke somewhere in there
i just read the title and it sounds like it will freeze people to death
this is just systemds way of telling you to listen to me when i say you gotta make backups
you just think that because you don’t already have the result of your criteria sitting in a magic field
okay, but why did you use a password when the ssh/sftp key is right next to the files
lol Comapenis
they will never be as thin as Wiko Highway Pure
I doubt MS even knows what security means
if it shows hours someone likely died in there again. i think it’s okay to knock and check on them.
it’s like the opposite of a mom group 😉
Here you go Apple: 🍏I
if this is the case, it should be in your contract, you should get paid for on-call duty and get a free SIM and/or phone for those notifications, so you can mute or shutdown notifications from your private SIM/phone
lmao, i was low key looking for this trivia for several years. the irony that this was helpful 🤣
if the T-1000 hasn’t been 3D printed yet, the axe may still work
the format of the encrypted file can give the attackers an advantage. if your code reads the decrypted file, the attacker can guess the first line is a comment or the name of a setting. a savvy person can combine that with the algorithm to perform a “known plaintext attack”, for example by generating a number of possible passwords that would lead to files starting like that.
Even though that’s a good extra precaution, per person config data, such as keys, should be stored outside of the repo, eg. in the parent directory or better in the users home dir. There is zero reason to have it in the repo. Even if you use a VM/containers, you can add the config in an extra mount/share.
reminds me of the time someone said “Who is this 4chan?” on tv and it became a meme. good times
no, your eyes are hacker tools
deleted by creator