[-] lambdabeta@lemmy.ca 0 points 4 months ago

Can someone spell this one out for me? I can't remember any of their names :/

[-] lambdabeta@lemmy.ca 1 points 6 months ago

I think self hosting the proxy with the services at hobbyist scale mitigates most of the security risks. The single point of failure risk is another matter. I once had to effectively reverse-hack my services by uploading a Jenkins test job through an existing java project to regain access. Ever since then, I maintain a separate ddns address that's just used for emergency ssh access.

[-] lambdabeta@lemmy.ca 1 points 1 year ago

Why wouldn't a Jew get in the car?

[-] lambdabeta@lemmy.ca 1 points 2 years ago* (last edited 2 years ago)

FYI: I'm starting with the outline of the left half of the leaf. I have to go to work soon, but hopefully there'll be enough outline for the rest to be filled in (just mirror it one pixel over).

[-] lambdabeta@lemmy.ca 1 points 2 years ago

Great read. Only constructive criticism I have is a pet peeve of mine that is especially prevalent in type theory articles. In particular it may be worth mentioning the more formal names of some of the types discussed. Trying to map Haskell's types to other languages can be very tricky and can hinder understanding. Mentioning more googleable names like unit, top, bottom, can be helpful in disambiguation which characteristics are intrinsic to the Haskell type, versus which are properties of the type system in general.

[-] lambdabeta@lemmy.ca 1 points 2 years ago

Wait until you learn about the shell specific /dev "files" like /dev/udp and /dev/tcp (which can send/recv IP traffic as if from a file)!

view more: ‹ prev next ›

lambdabeta

joined 2 years ago