Hacker News new | past | comments | ask | show | jobs | submit | yonatan8070's comments login

I'm a native Hebrew speaker, I wouldn't even think to put Hebrew into my code, similar to how I won't use emoji or other non-ascii characters, except Hebrew in particular is even worse since it's RTL, and mixing it into LTR code would be a pain in pretty much every text editor.

I do occaisonally find code with variable names in other languages, but it's very rare, for the most part if you want to code, English is the way.

I've also seen a few devs who used Hebrew variable names but spelled in English (`shalom` instead of שלום).


Looks super cool, I've been working quite a bit with systemd recently, and typing systemctl and journalctl + their flags gets old rather fast.

Can it connect to remote hosts like you can with systemctl --host?


I have that with fstab

It will always be f-stab in my head, can’t undo.

Just this week I encountered this exact thing

On Sunday (first workday here), I needed a PoE injector that could take in 24V DC and step it up to PoE+ voltages (around 50V iirc), so I looked around, and found an industrial one that matched my requirements. On the manufacturere's website, there was only a GET QUOTE button, and when searching for the model number, I couldn't find a place where I could just buy the thing.

So I clicked on GET QUOTE and filled in my details, company, work email, etc.. I then got an automated email saying my request was received along with details of the request (just the one PoE+ Injector).

We needed this for a fairly tight deadline, so we ended up getting an industrial PoE+ switch, which also gave us some added flexibility, and had 2 units on my desk by Tuesday.

Fast forward to today (Thursday), I get a call from a local distributor who had _no idea_ which product I requested a quote for, and just asked about what my needs are. I of course told them it's no longer relevant, and they decided to send me an email with some wildly irrelevant brochures for ruggedized tablets.

All this is to say, if the manufacturer just put up a price or link to buy online, I would have likely ordered 1-3 units on the spot, either directly or via a distributor. But they decided to complicate the process, and lost the sale to someone who was willing to just sell the products instead of trying to get me on a call.

I also had a look at the distributor's website, and they seem to offer various vague "compute platforms" and "industry-specific solutions", I typed in the model number into the search box, and got no results, and when I typed in the manufacturer, it just brought me to a page saying they are a "Platform Partner", with another contact button.


...welcome to industrial sales :-(

Could one build off this to run the desktops on the local host's display? I.e. as an IoT device with a display and some custom UI?


I curious how it determines if a person is alive or not

I checked two promiment figures in my region, one who is very much alive and another who's certianly dead, for both it said "probably yes".

I checked the Wikidata entries for both, and one had no death info (as they're alive), while the other had all of the info (cause, location, etc.)


Many laptops have terrible power usage during sleep, so if you just close the laptop and throw it in your bag, you'll open it tomorow with 30% less battery


Replacing SSH with a custom protocol sounds quite scary

Is it as secure as regular SSH when configured properly?


https://news.ycombinator.com/item?id=10220080

Here's a conversation on HN about it. Mosh uses an initial SSH connection to establish a session, and I located elsewhere that the communication thereafter is handled via AES-128 encrypted UDP traffic. The server process itself seems to only live the life of the session, and doesn't require escalated permissions.

I can't imagine enterprise or government adding it to their stacks, but for connecting to personal stuff doesn't really seem like a big risk.


You still authenticate and kick off the Mosh session via SSH, so it shouldn't be any worse than plain SSH.

> Mosh doesn't listen on network ports or authenticate users. The mosh client logs in to the server via SSH, and users present the same credentials (e.g., password, public key) as before. Then Mosh runs the mosh-server remotely and connects to it over UDP.


> Mosh doesn't listen on network ports

...

> ... Then Mosh runs the mosh-server remotely and connects to it over UDP.

Are UDP sockets immune from port scanning? Regardless of the answer to that, the sentence should be rewritten because it sounds like nonsense as is


I'm running crDroid, all my photos are backed up using Immich, and the rest is handled with Seedvault [1] to my Nextcloud server.

[1] https://github.com/seedvault-app/seedvault


IMO the problem here is tht Google doesn't push backups for your codes in any capacity. They pretend that your phone is _always_ available and functioning for tapping yes, instead of using TOTP codes that can be backed up and synced to multiple device classes (phones, laptops, clouds, etc.).

The issue with supporting text as a backup, is that it isn't nearly as secure as other options, rendering every other security measure useless as an attacker can always fall back to it.

Google should ensure that if your account is 2FAed by a single device, you get a prompt to write down recovery codes or back them up, but they don't. Leading to situations like yours where you only know about this issue after you're screwed.


Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: