Kissaki

joined 2 years ago
MODERATOR OF
[–] Kissaki@programming.dev 5 points 1 day ago (1 children)

Sharing, because I had to look up Abstract Wikipedia

Abstract Wikipedia is an in-development project of the Wikimedia Foundation. It aims to use Wikifunctions to create a language-independent version of Wikipedia using its structured data.

[–] Kissaki@programming.dev 3 points 1 day ago

Microsoft actually cut off Israel’s access to Azure…

After months of pressure and trying to silence internal criticism.

I had to look it up to make sure "months of" is correct. Wikipedia has the infos https://en.wikipedia.org/wiki/Criticism_of_Microsoft#Israeli_military_support 2023-2025, various employees fired

“Microsoft actually cut off Israel’s access to Azure” doesn't really cover or adequately represent their behavior regarding this topic.

[–] Kissaki@programming.dev 1 points 1 day ago (1 children)

That comment doesn't say anything about what I'm asking about here.

[–] Kissaki@programming.dev 2 points 3 days ago

IMO the intro “[shared] to the respective secret scanning partner” is a bit misleading because it can be read as third parties unrelated to the secret that do secret scanning. The text later on only mentions the issuer of secrets, though.

To protect the developer community, GitHub partners with hundreds of secret scanning partners to identify leaked secrets.

GitHub works directly with industry partners like AWS, OpenAI, and Stripe to build detectors for their specific secret formats […]
GitHub notifies the secret issuer when publicly leaked secrets are found, allowing the partner to take immediate action.

[–] Kissaki@programming.dev 2 points 3 days ago

Probably in some AI training data sets. Not that those are particularly good backups.

[–] Kissaki@programming.dev 3 points 3 days ago (2 children)

maybe they also mean Israel/Gaza or the AI push

[–] Kissaki@programming.dev 2 points 3 days ago* (last edited 3 days ago)

… Gitlab though; the only difference is you see more “a large premium customer is requesting this” comments!

I love those! /s 😄 It can certainly feel like a pattern, specifically for some tickets.

 

When Zork arrived, it didn’t just ask players to win; it asked them to imagine. There were no graphics, no joystick, and no soundtrack, only words on a screen and the player’s curiosity. Yet those words built worlds more vivid than most games of their time. What made that possible wasn’t just clever writing, it was clever engineering.

Beneath that world of words was something quietly revolutionary: the Z-Machine, a custom-built engine. Z-Machine is a specification of a virtual machine, and now there are many Z-Machine interpreters that we used today that are software implementations of that VM. …

[–] Kissaki@programming.dev 2 points 5 days ago

I expect some hot Java code on that website 😏

[–] Kissaki@programming.dev 2 points 6 days ago

YouTube recently introduced UI changes. Google probably didn't optimize for Firefox besides Chrome. Whatever they're doing, it may be more performance on Chrome than on Firefox for technical reasons.

[–] Kissaki@programming.dev 1 points 6 days ago

As a quality metric, "bad company". If you can differentiate between hardware product and drivers, you can separate those metrics. But usually, and for most people, using the product also means using their drivers.

[–] Kissaki@programming.dev 1 points 6 days ago

You can just take the L and say you didn’t see that the function definition that was “added” was just “removed” at the top.

That's not what happened though.

Changing the indent of the def changes the definition. That's my whole argument.

I don't get why you say "of course", agreeing with my point, but then "it was only the indentation that was changed".

[–] Kissaki@programming.dev 5 points 6 days ago (1 children)

Do you have a comparison to other tools like Grammarly? Were you sometimes missing suggestions or linting rules?

 

During OpenAI’s GPT-5 launch event, they demoed the model’s ability to fix real bugs in production code. Live on stage. In their own repository. The kind of demo that makes CTOs reach for their credit cards and engineers nervously update their resumes. There’s just one small problem: the fix they promised to merge “right after the show” is still sitting there, unmerged, three and a half months later.

 

Wanna hear a joke about construction? I am still working on it🤣

Why did the developer go broke? Because he ran out of cache 🤣

 

A good overview of their tests and findings surrounding Flock cameras. Goes through some approaches on manipulating and monitoring the cameras themselves, but also the hosted Flock platform, police, shared data, and politics.

 

A good overview of their tests and findings surrounding Flock cameras. Goes through some approaches on manipulating and monitoring the cameras themselves, but also the hosted Flock platform, police, shared data, and politics.

3
submitted 2 weeks ago* (last edited 2 weeks ago) by Kissaki@programming.dev to c/visualstudio@programming.dev
18
Announcing .NET 10 - .NET Blog (devblogs.microsoft.com)
submitted 2 weeks ago* (last edited 2 weeks ago) by Kissaki@programming.dev to c/programming@programming.dev
 

What's new in .NET 10

.NET 10 is a LTS (long term support) release.

With C# 14, F# 10, .NET Libraries, ASP.NET Core, Blazor, .NET MAUI, Entity Framework Core 10, Visual Studio 2026, SDK releases.

 

binfmt_misc (short for Binary Format Miscellaneous) is a Linux kernel feature that allows the system to recognize and execute files based on custom binary formats. It’s part of the Binary Format (binfmt) subsystem, which determines how the kernel runs an executable file.

In 2019, SentinelOne published a two-part analysis describing a persistence technique called Shadow SUID (Part 1, Part 2): Shadow SUID is the same as a regular suid file, only it doesn’t have the setuid bit, which makes it very hard to find or notice. The way shadow SUID works is by inheriting the setuid bit from an existing setuid binary using the binfmt_misc mechanism, which is part of the Linux kernel.

Interestingly, this technique seems to have fallen into oblivion again, as neither MITRE ATT&CK nor the five-part Elastic Security “Linux Persistence Detection Engineering” series mentioned it (the last part here with links to all other parts). As of 2025, however, the technique works wonderfully and would probably be very difficult to detect (see the hunting section later).

 

Central to Copilot Studio’s innovation is its deep integration with .NET, including the use of .NET on WebAssembly (WASM).

This post explores how Copilot Studio utilizes .NET, the benefits realized from platform upgrades, and the resulting performance, cost, and productivity improvements.

Copilot Studio is a low-code experience for creating conversational and autonomous agents, but the runtime executing those agents is based on .NET.

view more: next ›