• 0 Posts
  • 409 Comments
Joined 2 years ago
cake
Cake day: June 10th, 2023

help-circle









  • I don’t blame a girl for doing a job that lands her food on the table. I blame the guy employing her because she’s the cheapest option

    Having said that, this design was so bad that she should not have been doing any of this. If you don’t know that SQL allows you to select multiple columns then by all means, do a tutorial, it’s not that hard.

    If you don’t even know what encryption is, that passwords need hashing and what not, then you should really question what you’re doing

    OPs question was about the worst code I’ve seen, that was the worst I’ve seen








  • I said it somewhere around 2003, did it immediately, never looked back.

    I’ve been a Linux desktop user for well over 2 decades now, and anytime I see a Windows user with windows problems I just roll my eyes. My eyes by now have the ability to make 360 degree barrel rolls after all the practice.

    Yeah, sure, I’ve had problems here and there.

    Mostly self inflicted whilst trying out new shit. I’ve hada lot of help. When lvm was introduced back in whenever, I immediately switched and it fucked one of my drives. One of the developers of lvm spent hours trying to help me fix it. Talking about your tech support! Windows tech support won’t get me the main devs to help me out.

    Linux mostly has been “once it works, it works, and it remains working until you change something”. I know it’s not entirely like that, but it’s nowhere near the Microsoft “well just reinstall it every three months because after that it’ll just get so slow and bogged up that it won’t work normal anymore”

    I put my mother in law on a Kubuntu system probably about 10 years ago, and she’s used it for at least 7 years straight. Nothing crazy, browsing, solitaire, etc. but a 65+ yo had no issues with running that.

    I created a multi user linux machine some 15+ years ago in an intel Celeron with 1GB of ram and 4 video cards (plus the internal video). With USB splitters we had 5x USB Audio, keyboard, and mouse, with 5 monitors for the video. We created a setup program that allowed a teacher to easily identify what keyboard,I use, and audio went with what monitor once and them it would keep that setup forever. The desktop was skinned to look and feel like Windows XP to not scare people.

    5 people could work on that simultaneously, and one of them could run real windows in a virtualbox instance. It all worked, flawlessly. The work I did was fun, interesting, and awesome, but the real work was already done, right there, with the Linux kernel, and X. I was merely standing on the shoulders of giants, and the total development cost of the system (including research, salaries, hardware, etc) was around $30KUSD

    Try that with windows.

    Linux and Linux desktop are awesome 💯😎


  • A program that HR had built so that all employees could they their payment receipts online

    The username was the companies’ email address, the password was a government personal id code that you can lookup online, a don’t change, and you can’t update the password to something else.

    So I told the director of HR this was a bad idea. She told me I was overreacting until I showed her her own receipt, then she finally understood that this is a really fucking bad idea.

    Okay, so now she out me in charge of debugging that program.

    So I setup a meeting with the director of the company they hired, he came by with the developer: a 21 yo girl who I think hadn’t finished college yet. Great start! Apparently it was her idea to do the authentication like that so that explains a few things.

    So we dive in to the code.

    First of all, the “passwords” were stored in blank, no hashing, no encryption, nothing. That wasn’t the worst.

    For the authentication she made a single query to check if the user email existed. Of that was true, then step two was a second query to see if the password existed. If that were true, the email had been authenticated.

    So let’s say, hypothetically, that they had actual passwords that people could change… I could still login with the email from anyone, and then use MY OWN password to authenticate.

    This just blew my mind so hard that I don’t think I ever fully recovered, I still need treatment. The stupidity hurts