Not sure how I got into this, if you can help will be highly appreciated.

I'm trying to Boost of a toot I did in other mastodon instance, but through the clients (web and @Fedilab) , but I'm not seeing this toot on that profile:

fosstodon.org/@esparta/1044343

Is it related to this instance or the Fostodon instance?

What I see is an outdated list of toots shown in the image.

Thanks!

cc @james

From time to time developers create error messages that are curious and scary.

This is from Octopi, a GUI front-end to pacman, the package manager:

[aborted]: Suspicious execution method

the explanation is buried on their website:

tintaescura.com/projects/octop

>That’s because you need to run Octopi, Octopi-Notifier and Octopi-CacheCleaner using their full path commands: “/usr/bin/octopi”, “/usr/bin/octopi-notifier” and “/usr/bin/octopi-cachecleaner”.

👻🔥💻

Safari 13 is GA and now supports FIDO2-complaint USB security keys with the Web Authentication.

It's a great step towards a secure we everywhere! And closer to password-less services.

You can read more about FIDO2 here: fidoalliance.org/fido2/ cc. @fidoalliance

-- Ridiculous excuses I've heard (about securing systems) 3/2

Writing Secure Code is magnificent book (highly recommended) written by Michael Howard and David circa 2001/2003.

It's almost 2020 and I still hearing all of them on a frequently basis.

amazon.com/Writing-Secure-Seco

Show thread

-- Ridiculous excuses I've heard (about securing systems) 2/2

- We know it's the default, but the administrator can turn it off.
- If we don't run as administrator, stuff breaks.
- But we'll slip the schedule
- It's not exploitable
- But that's the way we've always done it
- If only we had better tools

by Michael Howard and David LeBlanc (c. 2001-2003)

Show thread

-- Ridiculous excuses I've heard (about securing systems) 1/2

- No one will do that.
- Why would anyone do that?
- We've never been attacked.
- We're secure - we use cryptography.
- We're secure - we use ACLs.
- We've reviewed the code, and there are no security bugs.

by Michael Howard and David LeBlanc (c. 2001-2003)

New Code Challenge

Implement a Symmetric Difference where...

{ 1, 2, 5 } △ { 2, 3, 5} △ { 3, 4, 5 } = { 4, 5, 1 }

The result should have no duplicates.

My solution using Enumerable#reduce & a nice twist at the end.

in
→ How to do a constant really 'private'

transcript: gist.github.com/esparta/cbe628

stack:

As usual, your feedback will be appreciated

P.S. The inspiration for this screencasrt came from this toot by @james: ruby.social/@james/10241167346

Ruby.social

A Mastodon instance for Rubyists & friends