Profile avatar
the-angry-dev.bsky.social
Software developer fueled by rage, caffeine, and alcohol. I'll finish these side projects one of these days.
73 posts 2 followers 3 following
Getting Started
Active Commenter
comment in response to post
Why is everyone hating on ASCII anyway
comment in response to post
Or, bear with me here, use it as an assistant instead of trying to have it do all your work for you. Why are you letting a tool control you or your code?
comment in response to post
Takes all of 5 minutes of searching to realize the only things claiming that crystals do anything special for people are random unsourced blogs and random YouTube videos
comment in response to post
This isn't anything to do with perfect.. this has everything to do with magic crystals and rehashing that the earth is a fucking globe and not flat....
comment in response to post
I don't think you're familiar with the typical types of "requirements" that are handed down. And to use an AI to write code you still need to know something about how to code to even ask it to solve a problem in a logical way. There's precisely 0 chance of ai as it stands to be a remote threat to me
comment in response to post
Ha I guess define okay. They can't steal your WhatsApp messages if you don't have WhatsApp, but they can potentially steal other messages it seems. Biden ended the use by executive order so I can only assume Trump allowed it again already
comment in response to post
Pretty sure Black Mirror has an episode on this...
comment in response to post
Posts like this make me wonder if the Internet wasn't a giant mistake..
comment in response to post
That means close to fuck all and shouldn't be shocking that it can regurgitate half decent code for a well defined problem with clear bounds and conditions. That doesn't extend itself to being able to solve vague real world problems that aren't well defined and have edge cases etc
comment in response to post
Well if your device is compromised with that malware it could. Theoretically if the device is compromised it may just be able to steal your WhatsApp encryption keys directly too. It seems to be malware which means it infects the device itself
comment in response to post
I can't find much info on it besides the claim that it can gain access to WhatsApp messages, but the primary information seems to be that it goes after cloud backups for things. And that's likely the same way it would access WhatsApp messages, is if you have cloud backups turned on
comment in response to post
I'm particularly salty about this one as it wasted more of my time than I care to admit tracking it down...
comment in response to post
That is a good point...
comment in response to post
Zip bomb is also an acceptable answer
comment in response to post
I keep a jug of holy water next to my work computer just in case of the singularity occurring because if the AI trying to figure out what the hell I just coded and why it works
comment in response to post
I swear css is just getting worse. I mean it was never pretty, but my god
comment in response to post
Haha saw that, probably a good idea especially on one that size
comment in response to post
"how to review this PR: type 'looks good to me', hit approve, plan a sick day for when it merges and deploys"
comment in response to post
Now hook it up so it turns on when there is an outage or other P1 issue!
comment in response to post
I think some of them are actual humans which is honestly scarier
comment in response to post
Yeah I maybe didn't state it initially as clearly, but I was meaning more to just clarify that this problem doesn't necessarily require Wireshark but can be used as an example to walk through how Wireshark can be used to troubleshoot an issue. Not that it was a bad walkthrough or anything
comment in response to post
I leave threatening comments about how stupid you would have to be to try and refactor this. Generally gets my code left alone
comment in response to post
Security through no one being able to comprehend what the fuck your code is supposed to actually do
comment in response to post
Don't use whatever you are talking about but I always love a good post mortem!
comment in response to post
I feel like you read nothing of what I said but cool. This thread appears to be trying to highlight the thought process of solving an unknown technical issue. It does not *require* Wireshark to diagnose or solve in the real world.
comment in response to post
Trust me I've used Wireshark plenty, but if I'm pulling it out at work something has gone completely off the rails and I'm having a real bad day.
comment in response to post
They are a woman? Okay, I didn't know, doesn't change anything. I'm stating my opinion that it doesn't come off to me like they are probably wanting it to and makes it seem gate keep-y. The only thing I'm suggesting to change is just state Wireshark is overkill but this is an example.
comment in response to post
Otherwise it comes off as preachy "see how hard tech is" instead of "here's a thought experiment with how I might use Wireshark" This is of course my own opinion. And therefore completely correct
comment in response to post
Running Wireshark* This is silly. Wireshark provided no new information that you didn't have from just observing win scp either. Like I stated in the start, I can see what they are trying to show, but it comes off in a gate keeping, over complicating way that could stand to clarify things
comment in response to post
Sure, absolutely. But that's not the scenario laid out here and my point. It's drawn up making it sound and seem like you need to know Wireshark to do basic troubleshooting lol. A simple "this could be figured out with basic troubleshooting but here's how you can use Wireshark" would make it clear
comment in response to post
Bruh if you don't have access to the firewall how the hell you running Wireshark on it. Sure Wireshark verifies the connections are being dropped, but that should be pretty safely assumed as your first step based on the behavior. Like I'm saying in this thread, Wireshark is overkill as laid out here
comment in response to post
That's kinda my point.. what was the point of Wireshark in this? It wasn't necessary to come to a conclusion about the issue. You can mess with the win scp setting to determine the exact limit, and know something kills connections after that limit is hit. AKA firewall.
comment in response to post
I was referring to the win scp max file transfer setting that they originally changed to 6 which caused the issues
comment in response to post
WHAT is you artificial constraint. That's the problem. What part of your artificial constraint makes it so you can't change the max connections property until it works to learn the threshold and go look at the firewall?
comment in response to post
I got in an argument on stack overflow once with Stephen Cleary or Jon Skeet, can't remember which, when they were arguing with some poor kid that they just needed to use a library for some date time function when the question and issue was clearly homework related and a library wasn't the answer
comment in response to post
If your first reaction in a priority incident is to start sifting through Wireshark you are not going to be getting things done quick. "While this could be solved with basic troubleshooting, here's an example of what it might look like if forced to dive into it deeper with Wireshark"
comment in response to post
... You think Wireshark is less limited information collecting abilities than, checks notes, trying different settings in the application you are using?
comment in response to post
There's no reason to over complicate your troubleshooting until you need to. If there were no firewall rules or other obvious things blocking it then you open Wireshark to see where it's dying.
comment in response to post
While I get what you might be going for here, I think you are doing a bit of a disservice by jumping straight to Wireshark and making this seem more intimidating than most issues really are. 6 connections doesn't work? How about 5? No? 4. Okay that works. What blocks multiple connections? Ok go.
comment in response to post
Visual studio has those settings which is nice, including not putting up code suggestions unless you hit a hotkey. Makes it more bearable, cause man is it jarring when you are typing along and suddenly it suggests a 20 line chunk of code O_o
comment in response to post
Level headed doesn't drive "engagement". Currently I have a deep seated hatred for the "99% of developers can't solve this puzzle" in various flavors of click bait bullshit that has been invading
comment in response to post
Some certainly did. There was a lot of over hiring during COVID (and honestly before). There was a weird management phase where they didn't realize you couldn't just throw developers at a problem to make it go faster.
comment in response to post
I think the best part is it inspired Vuejs
comment in response to post
FAANG was kind of a fad I think. Much like Blockchain, micro services, and now AI (let's see how many dev cults I can piss off in one comment). It feels like regression, but I think it's more just the passing of the FAANG fad. There are plenty of tech jobs out there and plenty of decent companies