… was he ok?
… was he ok?
If the earth stopped rotating, days would be about 365x longer.
I wanted to figure out a more exact answer, but I’m hung up on the fact that the length of a day is influenced by rotation and revolution together.
I have a feeling this requires calculus. If Sir Isaac Newton were here, I think he’d know what to do.
Yeah, there really should be some expectation of stewardship in exchange for absurd post-Disney copyright durations.
Actually I would like to read that. Might be worth the risk?
You’re coming dangerously close to setting Rufus free. I have a feeling you’re about to be visited by a time traveler with a dire warning if you keep trying this.
___________________
< No no no no no no >
-------------------
\ ^__^
\ (oo)\_______
(__)\ )\/\
||----w |
|| ||
What does “maintain a lower profile” mean specifically? I think the point of a private tracker is that you don’t need to enable DHT, which effectively broadcasts to the internet that your IP address is trying to download content identified by a specific hash.
Isn’t that the whole point of a private tracker?
I choose to believe it’s made of small atoms, the kind you get from firing a shrink ray at something.
This is like comparing paintings to the Mona Lisa. Shrek is the crowning achievement of our civilization.
For practical purposes, it’s probably good enough. You could write a program to check whether it’s non-repeating up to N digits, so just set N high enough that it will last you for a few thousand releases…
I have a similar story. I started a new job and inherited a ball of mud written in Python while the creator was out for a few weeks. When he got back, he was grumpy about my changes. I guess he preferred it with more bugs 🤷♂️
Aha, I didn’t realize compromising availability was sufficient for the CVE definition of security vulnerability. Projects I’ve worked on have typically excluded availability, though that may not be the norm.
And I see your point about some exploits being highly asymmetric in the attacker’s favor, compared to classic [D]DoS.
The chances of the coin flip yielding heads are roughly 50%, if coins don’t not exist.
Maybe I’m misunderstanding you, but DoS is exactly the same thing as “denial of service”.
My point is that memory leaks can only degrade availability; they are categorically distinct from security vulnerabilities.
I had to look it up to check my memory. Yup! https://about.gitlab.com/blog/2015/06/05/how-gitlab-uses-unicorn-and-unicorn-worker-killer/
I don’t think memory leaks could ever amount to a security vulnerability, but it just feels yucky. I guess I shouldn’t cast stones, I write C++ at work.
Git kinda has it? Have you seen git notes? https://git-scm.com/docs/git-notes
I used to host a Gitlab instance at work. It was dog slow so I started digging into it and discovered they had a serious memory leak in some of their “unicorns,” aka Ruby tasks. Instead of fixing the source of the leak they tacked on a “unicorn killer” that periodically killed tasks. The tasks were supposed to be atomic anyway, so this is technically fine (and maybe a good thing in the long run for correctness a la Netflix’s Chaos Monkey) but I found myself kind of disgusted by the solution. I dropped it and went for a much sparser Git repo web server.
I wonder whether there was an infantarchal society where they took direction from toddlers. I suppose they wouldn’t have lasted very long if they did exist…