Hacker Newsnew | past | comments | ask | show | jobs | submit | more doubled112's commentslogin

It took me a long time to get the allow lists dialed in, but I think it was still worth it. My wife may disagree since she was the most common victim.

It amazes me that every link the kid's school sends is a tracking link, and not always the same tracker.


Does it?

Half of the IT team I am on is seemingly incapable of understanding using a public/private keypair for SSH logins.

Can I use yours? How to copy them? Should they be unique per user? Should I email the private key? Etc?


I believe grandparent post was referring to Umbrel as easier than SSH


"This" was a little ambiguous but after another read I believe you're likely correct.


> Ect?

My favorite is when someone posts their private key to a Slack or Teams channel, then says "I'll just delete it after it is received..."

No. Just no. That key is forever unclean.


Hey, I accidentally created this instance with your key, will you send it to me?

No…


I've heard that last part put as "we're further from the PS2 than the PS2 was from the Atari 2600." The statement really stuck with me.


I’ve heard of people running “rm -Rf” incorrectly and deleting their backups too since the NAS was mounted.

I could certainly see it happening in a VM or container with an overlooked mount.


Some of my vehicles have only had a glow in the dark plastic handle on a wire. It didn't even really glow. I'm not even convinced it wouldn't have broken off if ever pulled on.

I don't know if there are newer standards to this, though.


In college I had a 90GB OCZ Vertex, or maybe it was a Vertex 2.

It would suddenly become blank. You have an OS and some data today, and tomorrow you wake up and everything claims it is empty. It would still work, though. You could still install a new OS and keep going, and it would work until next time.

What a friendly surprise on exam week.

Sold it to a friend for really cheap with a warning about what had been happening. It surprise wiped itself for him too.


There’s an API (Actually People Implemented) for that.


Last summer traveling down a rural road in southwestern Ontario, Apple maps told me to return to the route. We hadn't turned in 10 kilometers, but it was showing that we were 200 meters into a cornfield.

I don't think I could have ended up there if I tried in the Golf we were in. Nice try.

My kids thought it was the funniest thing, but it's a good technology lesson.


I’m not sure the last time I’ve handwritten anything longer than a signature and my cursive skills show it.

On a white board or diagram, block letters seem like the most legible choice.

Everything else is typed.


That last paragraph sums up the ZFS defrag procedure at one shop I worked at. Buy new disks and send/receive the pool.

At our size and use case the timing was usually close to perfect. The pools were getting close to full and fragmented as larger disks became inexpensive.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: