Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "predator"
-
Never worked for this guy, just saw it someone else's feed and thought it would be appropriate here. This is not leadership. This is bullying and stomping on people in a vulnerable situation which most likely has very little to do with their work ethic and more to do with company health. Yea, definitely elevate yourself and be that A+ person for you. Not for assholes like this. A good leader would empathize and provide resources for advancement and transformation to roles that are more aligned to the current environment.24
-
If you had to use one laptop for programming on a daily basis and nothing else, which one would you choose? And I'm talking about to work and back home, and you can't use another monitor either.
The GPD pocket windows or the Acer Predator?
Obviously I'm not getting any of those. I'm just curious.
Someone as scrawny as me probably won't be able to carry the Acer Predator, and it discriminates against lefties. The pocket windows is too small for anything, but it is adorable.11 -
I started recently working for a big company, and when I say big, I mean really BIG.
Well, my colleagues are from different parts of the world, of course some names are harder to pronounce, so, let's say your name is 'Yagarishmakeshin', well, sometimes is easier(and I used to think friendly) to call you by a shorter name, for this example let's say 'Yag', you know, like Apu form the Simpsons, which is normal I think, people use to call me always by shorter names too and is fine.
Well, yesterday I received a complain from HR saying some people complain about this, it turns out this is offensive or degradating; I was also warned about not calling a girl 'girl', example:
- random girl at my team - So, I created this routine which is very effective and provides good performance
- me - Awesome girl, very cool
Well, Someone complain I call them 'girl' and is not fine.
I cannot tell you how frustrated I feel about this, is like, if you feel uncomfortable with a short name, just say it to me, something like 'Hey I prefer you call me by my full name' or something like that, but nah, you prefer to raise a complain like if I were a fucking predator or something; Also, I cannot retaliate or mention the topic, I need to change and pretend nothing happened.
Fuck you big corporations, and fuck you skinny stupid bitch15 -
!dev
I'm always torn at the gym:
As a former rower, it gives me almost physical pain to see people on the rowing machines, flailing around and almost falling off sideways (rowing is an elegant, albeit masochistic sport).
However, as a swiss person, strangers are my natural predator and might eat me alive if I dare speak to them...3 -
The Predator Thronos by Acer... 3-monitor gaming rig that reclines and tilts backwards electronically. It is made for "serious gamers."
OR... I finally found my Arch Linux workstation and I'll never have to get up again!
My code cocoon! It's like I'm back in the womb with a 10 gigabit umbilical cord 🤤🤤🤤3 -
Install Instagram, Facebook.
Utter words like "Gaming Laptop" "Predator" "MSI" while screen being locked.
Voila, you get an ad.
PS: I swear I didn't search for any MSI or gaming laptops in google or even typed those words in recent past.5 -
I love cats more than dogs.
Despite being domesticated, cats remain true predators with true predator skills and the pedigree that comes with them. The evidence is your local government mandating house cats should wear bell collars to warn birds, as they threaten their extinction otherwise.
Modern dogs are mere scavengers that live off people and eat trash. They evolved to be cute by tilting their heads. Dogs aren't useless, mind you, I just like cats more.
But both dogs and cats are dwarfed by YE MIGHTY FROGGE. Frogs are the most fascinating and magnificent creatures to ever roam this troubled planet, maybe rivaled only by orcas. Frogs are the best. They're also the cutest, especially when touching a small yellow one can kill an elephant.11 -
A thing that I am annoyed that people are getting wrong is security by obscurity.
You have heard of it and being told it is bad. It is so bad that it alone is a counter argument. Let me set you straight:
>>>Security by obscurity is the best security you will ever have<<<
There is an asterisk: It is probably not right for your business. But that is for the end.
Security by obscurity means to hide something away. Most security is based on hiding. You hide your private key or your password or whatever other secret there is. If you had a 2048 long sequence of port knocking, that would be fine, too.. Or it would be fine if it wasn't observable. You could write this down in your documentation and it wouldn't be security by obscurity. It would just be security. Weird, but fine.
The real meat of obscurity is: No one knows that there is someone. The server you port knock looks like a harmless server, but suddenly has an open port to a bad application for an IP, but only if that IP went to 25 other ports first.
In the animal kingdom, there are different survival strategies. One of them is being an apex predator or at least so big and lumbering that no predator wants a piece of you. That's our security. It is upstream security. It is the state.
But what is the rest of the animal kingdom going to do? Well, run away. That works. Not being caught. And those not fast enough? Hide! Just be invisible to the predators. They cannot triple check every leaf and expect to be done with the tree before starving. That's security by obscurity. Or hide in the group. Zebras. Easy to see, hard to track in the group. Look like everyone else.
There is a reason why drug smugglers don't have vaults in the carry-on. Arrive at the customs and just refuse to open the vault. If the vault is good enough. Nope, they lack the upstream security by the state. The state is there enemy, so they need obscurity rather than cryptographic safety.
And so, for a private person, having a port knocking solution or disguising a service as another service is a great idea.
Every cryptography course happily admits that the moment they can catch you physically, cryptography is useless. They also teach you about steganography. But they omit to tell you that obscurity is the second best solution to having a stronger army when you cannot rely on your state as upstream security.
Why did I say, not a good idea for companies?
1. It is self-defeating, since you have to tell it to all employees using it. A shared secret is no secret. And therefore it cannot be documented.
2. It makes working with different servers so much harder if there is a special procedure for all of them to access them. Even if it were documented. (See 1.)
3. You're a company, you are advertising your services. How to hide that you run them?
Do you see how those are not security relevant questions? Those are implementation relevant questions.
Here is an example:
Should you have your admins log into servers as normal users before elevating to root or is that just obscurity? Well, not for security purposes. Because that foothold is so bad, if compromised, it makes little difference. It is for logging purposes, so we have a better server log who logged in. Not only always root. But if our log could differentiate by the used private key, there is no issue with that.
If it is your private stuff, be creative. Hide it. Important skill. And it is not either, or. Encrypt it your backup, then hide it. Port knock, then required an elliptic curve private key to authenticate.
It is a lot of fun, if nothing else. Don't do it with your company. Downsides are too big. Cheaper to hire lawyers if needed.2 -
Swallowing a pufferfish is a terrible way to go out if you're a marine predator. The damn thing immediately inflates, blocking your throat. Its spikes dig into your flesh, preventing you from spitting the damn thing out. As you struggle, spikes inject venom, and you die.3
-
I have Manjaro KDE on my Acer Predator Helios 300 (dual boot with W10, unfortunately, because games/some programs needed).
I want to try another distro.
Is Fedora a good choice ? Is there any potential issue or things I should look out for ?
Do you know a good distro that runs fine on that hardware ? I'm just curious here.
Any tip before I backup my home ?
I put the / on my SSD and the /home on my HDD. Any reason why I shouldn't keep it that way ?
Thank you :-) !6 -
What’s up with all the “To Catch a Predator” and Chris Hansen videos showing up on my YouTube recommendations. Apparently, too many people have been binging on them in this lockdown.2