Banned elements @lemmy.world from the community Veganism@lemmy.ca reason: unknown new user signal group link spam
- 5 Posts
- 1.8K Comments
refalo@programming.devto Hardware@programming.dev•Rationale behind GPU heatsink fin design1·3 days agoceramic heat plates (or ceramic PCBs) can be used for very hot applications
refalo@programming.devto Hardware@programming.dev•Rationale behind GPU heatsink fin design3·4 days agoIf you want to get technical, the heatsink/fins helping to move heat away from the chip (regardless of any fans) can also be considered “cooling”.
refalo@programming.devto Qt Framework@programming.dev•Qt Bridges: Modernizing Software Design and Development1·4 days agoI still have no idea what this thing is. They claim it’s not really just additional language bindings, but that’s exactly what it looks like to me.
refalo@programming.devto Programming@programming.dev•Faster coding isn't enough - AI's untapped power in software development3·9 days agoThey probably used AI to help write it.
refalo@programming.devto Linux@programming.dev•macOS 26 introduces the Containerization Framework: "enables developers to create, download, or run Linux container images directly on Mac"13·12 days agomacOS 26? I thought the last version was 15…
refalo@programming.devto Nix / NixOS@programming.dev•Patch interpreter path in embedded binary?English1·26 days agoYou could just change the path in the binary to a string that’s smaller than what’s in there now (or the same length), and pad any unused bytes with
\0
, then symlink that path to your real binary.
refalo@programming.devto Web Development@programming.dev•Forget IPs: using cryptography to verify bot and agent traffic1·27 days agoI wonder how long it will be until they start requiring signatures for individual people.
refalo@programming.devto Linux@programming.dev•Installing a VPN on Linux? Here are the Easiest Methods21·27 days agoTo me, any binary I do not have the source code for is random. I have no idea what’s in it and it could be doing any number of malicious things.
refalo@programming.devto Linux@programming.dev•Installing a VPN on Linux? Here are the Easiest Methods131·27 days agosudo curl
sudo random binary
Umm
refalo@programming.devto Web Development@programming.dev•Forget IPs: using cryptography to verify bot and agent traffic1·27 days agoOk so effectively then this basically shifts the work from blocking IPs to blocking domains. It might slow down some smaller players, but I imagine anyone with a decent amount of money can afford an insane number of domains.
refalo@programming.devto Technology@programming.dev•Trump calls US program helping boost internet access 'racist'English2·27 days agoClearly this is one of those programs that was unwittingly caught in their DEI keyword searches.
refalo@programming.devto Opensource@programming.dev•[Open question] Why are so many ~~rust~~ opensource projects MIT licensed?22·28 days agoUnfortunately
Depends on how you look at it.
I think some would argue that the competition and rapid innovation garnered by companies who are more freely able to leverage existing software in capitalist society, and the products and services they bring because of it, might be a net positive for the world, in comparison to the alternative.
I think if you were to go down the path of what many FOSS zealots seem to want (not capitalism), you end up with a system that does not promote competition, and people get tired of nothing happening, and society as a whole may not progress much.
refalo@programming.devto Web Development@programming.dev•Forget IPs: using cryptography to verify bot and agent traffic1·28 days agoSo when that gets blocked, they can just generate a new key. I don’t see how this really stops anyone that wants to keep going.
refalo@programming.devto Django@programming.dev•Why, in 2025, do we still need a 3rd party app to write a REST API with Django?1·28 days agoyou don’t…
I also feel like the amount of code they had to write with the CBVs was ridiculous, and it’s not the easiest thing to read.
To me, this could have been done much simpler and more readable with a plain function view.
refalo@programming.devto Web Development@programming.dev•Forget IPs: using cryptography to verify bot and agent traffic3·1 month agoThe article starts out talking about malicious bots that DoS your site, but how would a crypto signature fix that? Couldn’t the client just change the signature whenever it gets blocked?
refalo@programming.devto Technology@programming.dev•MATRIX: A Murdered Journalist and the Mafia's Crypto-Phones. Cracking the app’s code and the investigation into organized crime in Athens.English1·1 month agotl;dr OPSEC failure as always
lol.