What was the name of the eink computer that was on here last week? I can't find it back for the life of me. I desperately want a flat white display for work. Reading technical grant proposals on a regular screen is killing my eyes.
It's not clear how datetime was used and why that became a weakness? Doesn't it improve the password security by taking some bytes from /dev/random and salting it with <timestamp>?
The roboform password manager used datetime value as the seed of the pseudorandom generator, meaning that it would always generate the same password if the system clock time was the same. They managed to crack the wallet by reverse engineering the password manager and feeding its pseudonumber generator all datetime values between certain dates that were thought to be near the time when the original wallet owner had generated the password.
The OP says he "persuaded them to be better people" but only offers up one example of urging a landlord to offer a tenant money to move which he calls a "radical approach".
OP calls it radical because he knows nothing about being a landlord or probably even owning a house.
It's actually an extremely common approach, not radical it all. It's called "cash for keys" and every landlord knows about it and many of them are forced to use it, and there was probably going to be 2 or 3 people suggesting it below OPs comment.
He also says incorrectly "spare you the $3k" lawsuit. What lawsuit? Filing eviction with the sheriff isn't a lawsuit. Just FUD.
Just people lying on the internet and then writing a "please clap" blog post.
If you want to get involved and help tenants then volunteer at a tenant's advocacy group in your state or city. These places do a lot to actually help tenants from predatory landlords.
Regardless of what side you are on the "warfighting software good" or "warfighting software bad" spectrum, what we really need as an industry is more individual software engineers questioning and judging the ethics of the use cases they are supporting with their software. Too many techies just want a "challenging problem" to work on, and as long as the technical problems are complex and challenging, that's where their judgment ends. We should be more willing to look at the end uses of our creations and refuse to work on things that go against our own ethics.
I have quit a job where I knew that my software was going to be used by the military and law enforcement in order to target people, among other reasons. Yes, I am lucky and privileged to be in a financial position where I am free to up and quit a company, but I'd like to think that even if I weren't I'd do the right thing and refuse.
I would wager that Liz is the female author's younger sister. In the calendar period, the author turns 32 and has an 8th wedding anniversary, meanwhile Liz graduates with a 4.0 GPA.
Second guess: Liz is female author's father's second wife. Ailing, but finishing college as an older student.
Absolutely nothing about the content, lettering, or drawing suggests a male author to me. FWIW!
Maybe Liz is her younger half-sister from a temporarily estranged parent. :)
I realize I'm plumbing the depths of statistical likelihood to support my intuition of a female author.
Two other things occur to me. In the 1980s, there was a wider variety of what was considered "ordinary" in the expression of stereotypical male traits within gendered males. It was much less expected for any in the gamut to follow a non-stereotypical path, of course, and for better or worse.
But more directly relevant, the author is "anonymous" but certainly not "unknown", so it probably makes sense to assume that the auction house / article writer got it right in the first place!
So the author was introduced to Liz on 1978-01-21, and married someone on 1979-05-05. It's possible that's Liz, but that's fairly quick, even for the 70s.
reply