Hacker Newsnew | comments | show | ask | jobs | submit | X-Istence's comments login

YouTube sends VP8 or VP9 videos to Chrome, whereas on Safari it uses h264, which can be decoded in hardware. That alone will have a huge difference in power associated with it.

Would be interesting to see the YT tests redone with add ons that force h264 for Firefox and Chrome.

If traffic class is corrupted it will simply be QoS'ed wrong. No biggie.

I clicked on the kid as soon as he kicked off from the wall, as he was already panicking while trying to hold on to the rope and it didn't give me points.

The next one in the tidal wave pool I clicked and all it did was pause the video, and when I continued the video the kid was being rescued.

I like this though, good training, for everyone.


There are a number of videos. Mine was a kid that fell off their float out towards the middle of the top third of the screen and panicked. Refreshing and force refreshing hasn't gotten me a new one (or I'm just getting similar ones and don't notice) but there's ~30 on youtube.

I actually spotted that kid as the first possible point of trouble... but you have to wait until the "moments later" card to see him start doing something risky, and then like you said, even when he's tangled in the rope it won't let you click him.

For that guy I waited until he started actually showing IDR signs - no lateral movement, dipping up and down. Even though he's struggling in the rope he's still managing to move around using a bad freestyle.

That thrashing around doesn't look like he's still managing. That's full on panic. As someone that has been on life guard duty, that would be enough for me to dive in and get him out.

Good point.

http://spotthedrowningchild.com/creator.html#T5mDQeDkca0

How would you set this scenario up?


In a configuration file that is not version controlled, or even environment variables, so that your application starts with the right variables, but they are not in some config file.

How do you communicate that data amongst team members then?

I think at one point, if you have a shared password for a development DB, production DB, etc. then just keeping those on a pen and paper notebook is your best solution. Usually, for shared environments such as that (although I hope the team can set-up their own DB's for development!), the number of shared "secrets" is relatively small. Some secrets are best not stored electronically, especially if they can give away user data.

As I detailed in my other response to your original question, use an example config file that is version controlled. It includes all the necessary config keys, but example-only values. All team members would then be able to easily create a local config file based on the example that works. You can even document the config with comments in the example file so devs know what is needed and what it's for.

There is a bug in the kernel that returns the wrong error message when Chrome/Chromium attempts to get a variable. This will be fixed in 10.2.

See: https://twitter.com/cperciva/status/619969753566744576


Supposedly the downtime was due to a routing issue:

https://www.reddit.com/r/networking/comments/3cme3b/a_route_...

-----


The psychedelic colours are from the different light forms that are represented, such as UV/infra-red and others.

-----


Yes.

For those readers who are interested, they assign the primary colors to various important parts of the spectrum representing various elements.

Watched a wonderful set of lectures from The Great Courses that explains this. Highly recommended for laymen who are interested in astronomy.

http://www.thegreatcourses.com/courses/understanding-the-uni...

-----


Impractical or not, this is still showing a possible attack.

Let's say the client leaves their computer on at work over a long weekend ...

The collision attacks against MD5 were at first also claimed to be impractical...

-----


rc4 has been cryptographically broken before its specification has been public. Its first reference on usenet was a discussion of how to break it. Which OP's attack is fundamentally the same.

It really shouldn't have been considered a proper cryptographic cypher ever.

-----


Yea, I like to mention how it was considered a trade secret of RSA Security.

-----


They don't do this, it follows the route tables for the appropriate protocol. If you are v4 VPN connected the VPN overwrites the route table, but v6 will be unencumbered.

-----


Apple continues to route IPv6 over the default route when connected to a VPN that is v4 only (at least for OpenVPN that is the case, I don't have any experience with others).

So that means if you have a v4 only VPN provider all IPv6 happily goes over the default route.

This is not surprising to me at all, traffic should follow the default route that is given. If you are privacy conscious you should already know how to disable IPv6... Honestly if it is a bug anywhere it is a bug in the VPN providers that they are not providing IPv6 services for their customers.

Thankfully with OpenVPN IPv6 setup is simple, and while it doesn't provide the privacy extensions like SLAAC (you can only get a single static IPv6 address on the other end of the tunnel), it does allow you to easily tunnel IPv6 traffic as well. I personally do this by pushing 2000::/3 across from my OpenVPN server.

-----


On OS X 10.9 I don't have a way to disable IPv6 that I can find. In Network > Advanced > TCP/IP > Configure IPv6, there are only three choices: automatic, manual, link local. And as soon as I configure it with either manual or link local, the wifi connection changes from green to yellow and I no longer have even IPv4 Internet, although it remains identically configured as before. A while ago this popup had an Off option just like the Configure IPv4 menu does.

-----


Doesn't work that way for me. On 10.9.5 setting the wifi connection's IPv6 setting to "Link-local only" causes me to be unable to ping6 other machines but IPv4 is unaffected.

-----


On OS X 10.10.4 if you set IPv6 to link-local this doesn't change IPv4 at all. And link-local disables IPv6 for all intents and purposes.

-----

More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: