Hacker Newsnew | past | comments | ask | show | jobs | submit | nemoniac's commentslogin

Here's a tidied up version of the Python code to generate the MRZ from the passport data. It also corrects a padding error.

    https://pastebin.com/k0Tty22a
My Dutch driver's licence has a single MRZ-like line across the bottom. It seems to encode the country and licence number but I can't make any sense of the rest of the line. Anyone have any leads?


I haven't found the docs for the Dutch version but this article shows the content of the MRZ of a French drivers license. They seem to match the Dutch ones as well.

https://trustdochub.com/en/mrz-strip-french-driving-licence/...


Only partially. At least for my Dutch licence. It contains neither holder's last name nor end date.

It does start with D1NLD. Then a single digit which is not the checksum of the foregoing (using the passport checksum algorithm). Then the document number. Then some letters and numbers I can't make any sense of. It ends with a correct global checksum for all of the foregoing.


See the spec I mentioned. But here's an excerpt. https://upload.disroot.org/r/Y_vdT16A#cW4coNxPvTJN6b8InO5cHW...


Drivers licenses aren't ICAO 9303 compliant. For EU documents a separate spec is being used (NEN-ISO-IEC 18013-3). Small pointer: https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CEL...

Context: Made an implementation for reading these when Dutch drivers license model with NFC first came available (model 2014 if I remember correctly)


Direct TLS can speed up your postgreSQL connection


True, it can help Microsoft SQL Server as well. In SQL Server 2022, they finally added Strict Encryption. I'm glad to see more databases are removing these strange STARTTLS like features.


And mostly if you are behind CISCO firewall during TLS Server Identity Discovery or some equivalent setup. 3 seconds mentioned in the article were coming mostly from that. From the text itself it's not clear how much gains come from sslnegotiation=direct itself (if we assume no other factors like those present in this case).


For those interested - I've checked and observed a difference of 0.2ms on average across 1000 connection attempts on localhost.


Localhost is the least interesting place to measure a roundtrip delay.


Fair point, but it's a place with some useful properties.

All the rest of the effect will depend on the specifics of your network. Observing the impact on localhost shows scale of the effect that does not come from the network (more or less) and puts a lower bound on its size one can expect in more realistic conditions.


Even without Cisco meddling, sslnegotiation=direct saves a roundtrip.


Why does a browser have to be in the loop?


Because the browser knows the internet domain that the login/registration is for. And the browser also provides the JavaScript API to talk to the authenticator (navigator.credentials.create and navigator.credentials.get).




"until recently, Jupyter notebooks were the only programming environment that let you see your data while you worked on it."

This is false. Org-mode has had this functionality for over two decades.

https://orgmode.org/


And since in Lisp code is data and data is code you could go even farther back. A tad sensationalist claim from the article authors.


That's quite a time investment; about 3 months on a full-time basis.

One detail intrigued me. The author has a PhD in Informatics but "had never used any programmers’ editor other than Notepad++". He credits being able to touch-type for some of his efficiency and went about learning a swathe of tools including Emacs and several diagramming languages. These diagram files and the OrgMode file are a valuable reference in themselves.


Tsja, zekerheid is a cognate for security. "Zeker" from Latin "Sēcūrus".


I've never heard anyone use the word "zekerheid" when talking about security. Verzekering, zekering, zekeren. Sure, but those are all pretty domain specific. No one hires a "zekerheidsagent" to secure their building, or an expert in "cyber zekerheid".

Ik ben daar ... vrij zeker van.


> This is a common question :)

It'd be really great if you could put your answer in the readme. It was the first question that came to my mind when looking at your project.

I'm looking forward to trying out schemesh!


There already exists a tool called nping. It comes with nmap.

https://nmap.org/nping/


thanks ~ I named it because of the pun in Chinese at the time, so maybe in the future I'll consider using a binary like pping.


How about "pingui"? :)


this really needs to be thought about.


pping already exists too. It’s a bit of a crowded market…


There’s:

• 2ping <https://www.finnie.org/software/2ping/>

• fping <https://www.fping.org/>

• hping <http://www.hping.org/>

• nping <https://nmap.org/>

• oping <https://noping.cc/documentation/oping/>

There’s also qping, tping and rping, but they are not implementing ping functionality, but are tools for checking the status of specific remote services.


Nice overview. I see there's space for some more networking tools since there's plenty of letters to go. Is there a hash table to pick the next letter?


Is there an awesome-{}-tools list of these somewhere by chance?


I just used

  apt-file search --regexp 'bin/.ping'
If I extend it to

  apt-file search --regexp 'bin/[^/]*ping$'
I also find:

• smokeping <https://smokeping.org/>


smokeping is one of the best of these bunch, if not significantly more effort to setup.


Oh, my God. ~


Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: