Hacker News new | past | comments | ask | show | jobs | submit | mfashby's comments login

Related, you can get this as a nice printed zine https://jvns.ca/blog/2018/10/27/new-zine--oh-shit--git-/

You can actually still use infinity for Reddit it's just a pain to get it.


Beeper seems to be working ok for me for the moment


Thanks for plainoldrecipe! Such a handy tool.


It's not what you're aiming for with this comment, but I bet git would actually make a pretty good storage tool/format for archival of mostly static sites.

horrible simple hack: use `wget` with `--mirror` option, and commit the result to a git repository. Repeat with a `cron` job to keep an archive with change history.


I assume this is what wayback machine uses?


Of course not. They have their own crawler (Heritrix, an open source Java crawler) and archive in WARC format. It‘s serious archiving, they want to preserve reply codes, HTTP headers etc.


Does anyone know of a service where I can feed in my Spotify playlists, and it tells me where I can buy those tracks?



> there isn't and hasn't been for a long time a direct connection to the physical brakes.

I don't think this is true for most vehicles. Skoda Octavia 2020 for example still has hydraulic brakes. I was going to suggest that no mass-production vehicles use a brake-by-wire system but I would have been wrong, according to wikipedia: https://en.wikipedia.org/wiki/Brake-by-wire


Updates as the other commenter says. Also isolation technology like docker containers, chroots, bsd jails, protections that systemd offers, or virtual machines. While not perfect, it means that the attackers must have the ability to chain exploits in order to break out of the compromised application to the rest of the host system.


Docker is great but it is easy to shoot yourself on the foot if you use it conveniently but don't actually understand it.

A common mistake is to publish the Docker ports unknowingly to all interfaces (e.g `5432:5432`), which makes your Docker container available to everyone. It is common to see this in Docker tutorials or pre-made Docker Compose files. Coupled with UFW, it may give you a false sense of security because Docker manages its own iptables rules.


I do make the habit of not expose ports and just use reverse proxy for the container. Of course, you will need a bridged network between the reverse proxy container and the target container, but that's fine. I'm sure there is more clever ways around that.


I prefer to run the webserver using systemd on the host so publishing the container port to 127.0.0.1 is enough for me.


Yes I've made this mistake with docker and UFW before :( Such a footgun.


A more recently updated, and definitely working library : https://github.com/tulir/whatsmeow


Sidenote: it is not developed in C, but with Go


It varies, I guess. For a normal end-user account on a system where no interaction between users is possible, it pretty much just affects you.

For some kind of admin account with privileged access to other users' data, then it definitely affects others.

One might expect increasing mandatory security measures correlating with increased potential damage of a breach. Similar to safety measures on mass transit vs. personal vehicles.


Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: