Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "retrieve"
-
So I wrote a code in HTML and js that puts an alert on the screen that says "all of your info is mine now, goodbye" and then redirects you to the nyam cat site
I sent it to some of my friends to have a little laugh but they have sent it to other people and eventually the school principle called me and told me to go to her office and retrieve all the data I stole
I went there and explaind her the prank but she didn't believe me
So she called the programming teacher to check the file
She laughed as hard as I've ever seen anyone laughing and told me to go back to class
It was scary and funny but the thing I've learnt is that it's stupid to prank ignorant people.15 -
Meeting with asshole partner company CEO at restaurant.
Me: "I'm a bit worried about the bugs in your API. There are some ways to retrieve privacy sensitive info from public endpoints"
CEO: "Well, we're a rapidly growing startup!"
Me: "Uh... so?"
CEO: "So... Move Fast and Break Things! Priority is to improve our API further, and we'll fix bugs as they show up"
Me: "Maybe you should stop trying to emulate Zuckerberg in your management style. You know that even Facebook themselves admitted that their slogan was a retarded mistake"
Waiter shows up at table. CEO orders some overly expensive fish salad.
CEO: "Well, they have done something right... they're worth billions"
Waiter asks me: "And you sir, have you made your choice?"
Me: "Do you serve popcorn?"
CEO: "Popcorn for lunch?"
Me: "No, for your congressional hearing"16 -
*creates table in database*
*writes query to retrieve data*
*gets error and Google's problem for 2 hours but no luck*
*in frustration, takes a half hour break*
*checks database for set up issues*
*realizes that the database is the wrong fucking database*
*face palm & quits fucking life*
I make dumb fucking mistakes like this way too much5 -
I recalled a seemingly simple task I took on.
We were building a booking system, and I had to figure out how to retrieve bookings by a certain date range.
Upfront, the tasked seemed simple until I realised I had to both figure out the logic and the SQL statements needed to retrieve all bookings within a certain date range in one query.
I ended up drawing a model to help me visualise the various date-range criteria to be satisfied. And used unit tests to help me think through each date range criterion and make sure they were accurate. Some were obviously from paranoia, but better to be safe than sorry...
After that, I had wrote down raw SQL directly into Sequel Pro first to make sure my query logic was accurate too, before translating into something the ORM equivalent. This was when I learned how to define and use variables in SQL. The variables were throw-away code; I just didn't want to have to hard-code the test date-ranges over and over again; minimise chances of spelling errors.
Needless to say, felt my problem-solving skills went up one level after this task. Saw my coding style and unit tests improve. And also the thought processes that go into how to maintain code quality...4 -
I have been strongly considering writing a small fb app today named something along the lines of "Hack your fb friends - for realz". Then add basic oauth (You have to login to pick the friend to hack duh), retrieve their friends list and then publicly post to their own timeline and the friends they chose humorously stating they attempted to hack the persons account "for realz". You know just enough to alert people that the "hacker" is a idiot with bad intentions but with just humour enough to fall under "satire" so fb doesn't remove it.
If your bored please feel free steal and implement my idea, it's hereby open sourced and I will even fund this shit on kickstarter 😂5 -
We don't know what one-to-many is! Instead, we convert all associated IDs to a string and join the list into a string separated by commas! Only after this absolute clownery do we save this new nice clean string to the database column! Then, when we want all associated entities, we serialize this list back into an array of IDs and retrieve them! It's clown-genius!
🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡16 -
Hire a Bitcoin Recovery Expert Solution: Best Crypto Recovery services | Captain WebGenesis
CAPTAIN WEBGENESIS stands out as an ideal cryptocurrency recovery expert, renowned for his exceptional proficiency in navigating the intricate realm of digital assets. With an impressive track record of successfully retrieving lost, stolen, or inaccessible cryptocurrencies, CAPTAIN WEBGENESIS has earned the trust of numerous individuals and organizations seeking to retrieve their valuable digital possessions.
How can I recover my stolen bitcoin from an investment scam?
What is the best recovery company to help me recover my stolen Bitcoins?
How to Hire a Hacker to Recover Stolen Crypto/Bitcoin?
Can a hacked crypto be recovered?
How can I recover my lost cryptocurrency within 24 hours?75 -
One of our existing clients who used to pay for two of our products but now only pays for one just called us. The one he canceled is a loss prevention product that tracks internal theft in stores. He canceled it because he didn't feel it was worth it.
Now, he's calling us from a police station because he's trying to press charges against one of his managers because they were presumably stealing from him.
"Hey I need to know how many times this person stole from me over the last few months and I need to know it now because I'm at the police station."
With just a few clicks that would be an easy figure to retrieve for him had he not canceled our product.
My stance is he can get lost. I don't even think he sees the irony of canceling because "it isn't worth it" and then "asap" needing the data that the "worthless" product provides. Of course, he wants it without reactivating the subscription.
Unbelievable.5 -
Where I work, the password needed to retrieve your paycheck in the system is your birthday. (Like November 3rd = 0311).
Guess it's no secrete how much money everyone makes?!
Oh... it's the passcode on our keycards as well!
The company has 2000+ employees and and makes more than $35 mil a year6 -
The other day, I customer of ours asked me to try to improve the performance of an application of his in a particular method. The method in question taking more than 5 minutes.
I took a look at what it did in the profiler, and it shocked me. More than 100k selects to the database, to retrieve 116 records...
I took a look at the code... Scores of selects in nested loops inside other nested loops inside of... That seemed normal to them...
At the end after we improved it's performance it took 3 seconds...
What shocks me the most is that the customer is a developer himself, really knowledgeable and has an order of magnitude more experience than I do. Am I too anti "worthless database round-trips"? Is that normal? :S1 -
You Can't Withdraw Your Cryptocurrency Fund? Contact iBolt Cyber Hacker
Be careful of platforms that promise enormous rewards in order to entice individuals into fraudulent programs. There is no shame in speaking up, I was victim of crypto scam 4 weeks ago, While researching how to recover my assets, I came across multiple suggestions of iBolt Cyber Hacker and how they had restored so much joy to scammed victims. With their assistance i was able to retrieve all of my frozen crypto. I'm writing to convey my heartfelt gratitude to iBolt Cyber Hacker. Please contact them if you require their services or want to learn more about them.
More Info:
Email: Support @ iboltcyberhack . com
Contact/Whatsapp: +39 350 929 0318
Website: https : // iboltcyberhack . com /22 -
ABC 80.
It was a Swedish computer in the 80s.
Used basic as main shell like c64 but its editor was worse than edlin if any one remembers that.
You could not use arrow keys to go to a line to change it but had to type a command like edit 80 to retrieve the line in an editor prompt.
It also lacked a lot of common basic commands.6 -
At work, an idiot who has never worked on machine learning before and understands nothing about it: "You know what, machine learning isn't actually hard. It is just basic statistics and then you download the model online and that's it! There's nothing else you are doing!"
STFU, you moron! Do you think just any model can work for your use case? Do you fucking think it is easy to come up with new architecture for a very specific use case and test it accurately? Do you think it's easy to effectively train a model and do hyper-parameter optimization?Do you fucking think it is easy to retrieve the right data for your use case? Do you think it's easy to keep up with research papers on arXiv being released daily? Do you think this is fucking javascript and there's a framework for everything? Stfu!
Honestly, i hate ignorant morons who generalize stuff they don't clearly understand.5 -
Best Crypto / Bitcoin Recovery Company | Hire a hacker for crypto scam recovery - Hire Gaius
For individuals who have been duped by Ethereum or Bitcoin, it is strongly advised that they hire OPTIMISTIC HACKER GAIUS for recovery.
Who can assist me in getting back my misplaced Bitcoin?
How can I immediately get my lost Bitcoin back?
To retrieve Bitcoin online, hire a hacker.
Reach out to
WhatsApp …… +44 (737, 674 (05 69
Homepage: ……… h t t p s : / / optimistichackergaius .co m
Contact Email;…. support @ optimistichackergaius. co m
Telegram: Contact @ optimistichackergaiuss75 -
Not a Story about an actual hack, but a story about people being dumb and using hacks as an excuse.
A few weeks ago my little cousin would reach out to me because "his Account was hacked...". Supposedly his League of Legends account was hacked by a guy of his own age (14) and this guy was boasting about it.
So i asked the usual things: "Has the email account been hijacked? Did anyone know about details to your acvount access? Etc..."
Turns out that one if his "friends" knew his password and username, but suppsedly erased these Informationen. And that was the part i didn't buy.
This was the point where he lost. Just because i am a programmer does not mean i can retrieve an account he lost because of a dumb mistake that could have easily been avoided. And that guy who was boasting about hacking LoL Account was coincidentally freinds with the friend who had the user credentials and password.
Moral of the Story? The biggest security weakness is almost always the user or a human in between... -
While I work on my devRant client, I always end up thinking, "how would dfox do it for the backend".
Some of the functions I have include:
-fetching new rants, 250 at a time
-remembering the ones I've read and filtering those out (kinda similar to Algo)
-checking for updates from followed users and new notifications
My implementions are kinda spammy though part of it is because I need to use the existing API.
But even so, how would/does he implement these so all the users' requests don't end up bringing down the server, and efficiently store and retrieve everyone's view history?
My problems are small compared to his... How do you think and deal with problems at that scale though? -
An undetectable ML-based aimbot that visually recognizes enemies and your crosshairs in images copied from the GPU head, and produces emulated mouse movements on the OS-level to aim for you.
Undetectable because it uses the same api to retrieve images as gameplay streaming software, whereas almost all existing aimbots must somehow directly access the memory of the running game.11 -
Today I spent 25 minutes explaining to this dev that there’s no way that a http request can access directly to an ftp server and retrieve a file.
A dev with 4 years of experience...17 -
My friend: I built a 3D printer and coded it to self calibrate at startup and connect to my encrypted remote server through VPN to securely retrieve Cad files I constructed and start itself printing when everything is ready or alert if theres an issue
Me: aren't you less than a year older than me?
This was when we were underclassmen in college a few years ago 😂 turns out the dudes just a savant5 -
We did retrieve the whole list 20 lines ago, didn't we?
Well, who cares... Let's retrieve it again IN A LOOP, im EACH ITERATION.
and then for good measure lets make another query for each item, each time we retrieve the list. Why not?
I have to make an effort not to swear right now. I have been asked to optimize a particular oiece of code...
Ffs3 -
I would like to know if anyone has created a CSV file which has 10,000,000 objects ?
1) The data is received via an API call.
2) The maximum data received is 1000 objects at once. So it needs to be in some loop to retrieve and insert the data.11 -
Ranting to the wife about 3rd party API authors and how they have broken them from time to time.
On any given URI, it should give me a certain image, some give me a simple error string "Error downloading file" - nothing I can do to fix on my side, the error indicates they were not able to retrieve from their sources.
W: you should check the settings! *... series of unusual suggestions follow*.
Me: Yes, dear. Good ideas. -
At the age of 50 I have learned what FICA is.
FInancial Customer Account
It'a a SAP module but I suppose It was the name of a Penthouse department.
P.S.
FICA in Italian are female genitals, "recupero" is retrieve.
It sounds like "pussy retrieve".
This document was made by a staff of 4 men and 4 women.1 -
-- This is my first rant so sorry if it's bad--
We have a nice project that I am working on that needs to store and interact with location data. It is a .NET Core API using Entity Framework Core to interact with the database. All good and well. Until today when I started working on the implementation of storing location data we retrieve from mobile devices.
SQL has a nice data type named: "Geography" which can store a location and do calculations on it with queries. Such as proximity and distance which is what we need.
But then it turns out that EntityFramework Core does not have support for the Spatial data types. even though version 6 did have Spatial support.
Then i found the following issue on GitHub: https://github.com/aspnet/...
Turns out this feature has been requested since 2014 and is even on the "High-priority" list and is still not implemented to this day. Even though in the issue many people are asking to have this implemented.
WHY IS THIS TAKING SO LONG MICROSOFT!!
So now i have to figure out how to work around this. But that is an issue for tomorrow.1 -
I have a few questions for the people having a 3D printer and/or are interested in 3D printing.
1. Where do you retrieve your models from? Or do you make them yourself?
2. What is your thingiverse name (if you have it)
3. Personally I'm missing a single good information source where questions can be asked, models can be shared etc. Thingiverse doesn't have a mobile UI and is pretty limited in my opinion. I'm thinking of creating a "social media" platform where people can share their creations, collection of information sources about 3D printing. Would you like to help or is there a good alternative for Thingiverse that I have not found yet?21 -
It was more of "Hate story" with a guy whose mere presence would irritate me very much. He was also close to the girl I liked a bit (not very huge crush or something).
So he was very active on two of his social networks one being fb and second directly connected to fb so basically getting hold of fb would mean that I could control his other one too.
It was Oct 2016 and that time you could easily hack an account using social hacking (not asking OTP out something mere details did it for few accounts).
I hacked his account and wrote curse words and all. As I had already changed the email and password, he couldn't till date retrieve it.
However as he reported to fb, his account was held and I could no longer access it but till then everything was over.
I couldn't still spot him on FB or the other social network.
And this was one of the most evil act I have performed in my life.1 -
Using a brute force dictionary algorithm to retrieve every employees password. Access got blocked for a day because they didn't know what my algorithm did, I deleted the main file moments ago. They only saw the curl scripts.3
-
Fuck the feelings of powerlessness and helplessness. when a friend comes crying for you for help with their hacked account and you keep asking them about what they did to protect it in the first place and they reply with nothing, no recovery email, no recover phone, no secondary verification, NOTHING. and you can do nothing but stand there and watch them cry while you can literally do nothing because there literally nothing you can do to retrieve their stolen accounts. FUCK BLACK HAT HACKERS.3
-
One fucking week I was trying to solve a bug where I could save data to neo4j but not retrieve it.
I thought there has to be a bug within the library. But it turns out, I referenced the wrong class.
I need ducks...2 -
Looked up at the clock... 2 AM... Thought about giving up and going to sleep, but something kept me there...
Rewrote my encoder and decoder for my steganography program, which are used to insert and retrieve data respectively from images. Compiled, ran, and output was as expected!
Tried to write actual data, instead of just headers, to the image, and it broke... Of course it wouldn't work first try, it's me writing the code after all.
But then, after debugging for a while and changing a couple lines, the encoder looked like it had done its work properly. Then I decoded it, and voila, data completely recovered! It almost felt too magical to be true, usually I have to modify a lot more to get it working.
So now I'm in bed, after literally decimating the memory usage of the program, amongst other optimizations, and I know that the code works perfectly 😎 best part is I refactored each class down to 100 lines each, so now it's clean and dense 😇
Just had to share, feeling so good right now 😄2 -
Last year in my job, I was temporarily assigned to another team to help out in their project as they were short-staffed. It was a massive project and of course there was a lot of code review to be done. But since I was only temporarily assigned, I still have to do code reviews for my base team, this other team I was assigned to, and for some reason, code review for another team that I barely know what their project is about.
There were times where all I was doing was code reviews that took anywhere between a few minutes to upto 3 days. The amount of mistakes and bugs I kept finding was phenomenal. But I think the one thing that got to me was finding the same bugs/mistakes that I kept pointing out to people to stop doing or to fix e.g DB queries inside a loop just to retrieve data.
To this end I still have to deal with the same issue, but thankfully now it's only to one team.1 -
About 2/3 weeks ago had to deliver a college project where we were supposed to create a snake multilayer game on win32 API.
Just to discover how to create a simple dialogue box with sliders and retrieve the values it took 1 entire day. Just handle a simple dialogue box!
And I found the solution on a forum post from the last millennium. Literally!
That's the kind of job you don't wish even to your worst enemies. -
Coolest bug is less of a bug and more of a feature. I've been working on a medical app and I used an open source backend which had almost everything I needed. To be hipaa compliant you have to encrypt all sensitive data - full db encryption was not something this backend was capable of.
So my solution was to encrypt the data on the client side and create a secondary server - that can only be accessed on my app server - to store and retrieve the keys.
If anyone's thinking of working on a HIPAA project - you're welcome -
I've just spent the last hour or so banging my head against a brick wall trying to figure out why I'm unable to retrieve some data via AJAX even though I know data is being returned as I can see it in my error log.
Turns out the permission system I wrote a few days ago actually works and because I didn't specify a permission it automatically denied my user from retrieving the data. One thing I forgot to add was an error message to tell me when I don't have sufficient permission to do something. Adding a message could have just saved me a lot of time :/1 -
I'm doing work during the weekend. Just to parse this line of json.
Argh, what drive me nuts is after discovering that json response wasn't proper.
*sample - from what i seen*
{
head= {
data=value,
data=value,
}
}
This is my first time seeing json response with =. Since my assignment is to retrieve the response.
I cheated by calling replace over and over to correct the string of response to correct json format.
That is actually production stuff. Knowing that makes me sick to the stomach.7 -
I've always wanted to do something in IT Support, but I didn't know where to start. I've been helping my co-workers optimize their system and even helped retrieve photos from a tablet that had a broken screen; her service plan said along the lines of "if they weren't there they were lost," I was able to retrieve them in a matter of hours (Really guys! I'm shocked! It was just a broken touchscreen, the storage was just fine. I think I'll remember this moment).
And because my growing impopularity, I started a new business called The Webnician. The company is split into two sections, the Technician, and the Web Developer. Hence, The Web(Tech)nician. I am proud of my name choice.
Then I wanted to become a certified technician, so I did some research on how to become one and found out I need to take the CompTIA A+ 220-901 and 220-902 exam and... I couldn't be more excited!
I've always loved computers, and maybe my late father had some say into it. Nevertheless, I am excited to begin my journey, even though it took awhile to find where I needed to go. I hope you all can follow me on my journey and support my new business.
I don't have anything else to say, so I'll just leave here.1 -
I got some old piece of shit computer from my cousins, they wanted me to retrieve the old pics on it so I did and now I don't know what to do with it.
I spent the day cleaning years of nasty ass dust off of it and wiped the whole case clean + new thermal paste.
Then I was like why tf am I doing all of this effort, this piece of crap has a single core pentium cpu with a whopping 512 MB of Ram and an 80 GB HDD with the worst cpu cooler mounting systems I have ever seen.
I was thinking of installing something like antix linux with pihole on it but the logical thing to do should be to just get a raspberry pi with has a much smaller form factor, performance and is a lot quieter so idk..7 -
This fucking Integration test with h2 is driving me insane as it just doesn't work for what I need it to! 😤
The setup seems correct, the sql files are "processed" according to logs. Everything seems to be set up as supposed, as AI, colleagues or internet recommend ... yet no insert statements are shown and no data is found on retrieve. No schemas or tables exist in h2 console although log says all these millions of tables are apparently created.
WTF am I doing?9 -
Absolute best way to get a object of the current User in Symfony?
Yeah, just retrieve the current user.
Oh, we are not yet done, get the username and perform a DB query to get a user object.
Glad this answer has -34 on stack overflow...2 -
Some of our applications use a Java keystore that requires a password. The password is encrypted and stored in a database. The applications retrieve it when needed, decrypts it and uses it. The password is..... password
-
upside I guess, if your website's content is generated by JavaScript I'm too lazy to find an emulator to scrape it off you
granted I'm sure this website's business would've been much better had they made it scrapable since I'm quite literally trying to retrieve their capabilities listed in one of their help pages and give myself alerts when they gain new features
but no, I guess3 -
There were many issues that came about during my entire employment, but I woke up today with some, honestly, quite bizarre questions from my manager that made me open an account here. This is just the latest in many frustrations I have had.
For context, my manager is more of a "tech lead" who maintains a few projects, the number can probably be counted in one hand. So he does have the knowledge to make changes when needed.
A few weeks ago, I was asked to develop a utility tool to retrieve users from Active Directory and insert them into a MSSQL Database, pretty straight forward and there were no other requirements.
I developed it, tested it, pushed it to our repository, then deployed the latest build to the server that had Active Directory, told my manager that I had done so and left it at that.
A few weeks later,
Manager: "Can you update the tool to now support inserting to both MSSQL and MySQL?"
Me: "Sure." (Would've been nice to know that beforehand since I'm already working on something else but I understand that maybe it wasn't in the original scope)
I do that and redeploy it, even wrote documentation explaining what it did and how it worked. And as per his request, a technical documentation as well that explains more in depth how it works. The documents were uploaded as well.
A few days after I have done so,
Manager: "Can you send me the built program with the documentation directly?"
I said nothing and just did as he asked even though I know he could've just retrieved it himself considering I've uploaded and deployed them all.
This morning,
Manager: "When I click on this thing, I receive this error."
Me: "Where are you running the tool?"
Manager: "My own laptop."
Me: "Does your laptop have Active Directory?"
Manager: "Nope, but I am connected to the server with Active Directory."
Me: "Well the tool can only retrieve Active Directory information on a PC with it."
Manager: "Oh you mean it has to run on the PC with Active Directory?"
Me: "Yeah?"
Manager: "Alright. Also, what is the valid value for this configuration? You mentioned it is the Database connection string."
After that I just gave up and stopped responding. Not long after, he sent me a screenshot of the configuration file where he finally figured out what to put in.
A few minutes later,
Manager: "Got this error." And sends a screenshot that tells you what the error is.
Me: "The connection string you set is pointing to the wrong database schema."
Manager: "Oh whoops. Now it works. Anyway, what are these attribute values you retrieve from Active Directory? Also, what is the method you used to connect/query/retrieve the users? I need to document it down for the higher ups."
Me: "The values are the username, name and email? And as mentioned in the technical documentation, it's retrieving using this method."
The 2+ years I have been working with this company has been some of the most frustrating in my entire life. But thankfully, this is the final month I will be working with them.21 -
The last Windows 10 update (10 days ago) has fucked up my dual boot with Elementary OS (Linux distro). I tried many things to retrieve it but with no success !
So I reinstalled it ! So now I would like to know how to prevent this shit happened again. Is there a way to do that ? Maybe a /boot partition or it's unnecessary ?7 -
one of the most annoying things about our system at work is that we're constantly updating broken links because we're in the process of updating a lot of legacy code. there's this one service to retrieve links for a module, but half the links in the legacy code are hard-coded strings anyway, so the whole thing is just a huge maintainability disaster. anyone ever come up with any interesting solutions for managing links between modules?1
-
Hello, Hi! Friendly neighbourhood noob here!
What’s he stuck on today you ask? React and Firebase!
Did he try? Yes he did! Only a little hitch this time.
Really? Little?
...It’s all relative... like the truth!
Anyway PLEASE someone look at my StackOverflow question!!
https://stackoverflow.com/questions...
Firebase and react are awesome tbh. But I cant figure this out!
Thank you!! -
Hey guys (and girls (and people who dont identify as either of them)),
As some people here might know I am currently in the planning phase of an open source alternative for Thingiverse. After gathering information on multiple platforms Ive heard people really wanting it to be decentralized (a bit like Mastodon).
I really like that idea and thus want to implement it, does any of you have experience or knowledge of decentralized systems programming? I have trouble getting information on how this works. If someone is willing to help me explain a few things like "How does one instance retrieve data from other instances? How does it know a new instance is running somewhere?"
So if anyone knows a great source for information or can and wants to help me via a chat session please respond below6 -
Getting Back Lost, Hacked or Stolen Crypto - Go to OMEGA CRYPTO RECOVERY SPECIALIST / HACKER
I lost my crypto to an online investment scam, After a successful recovery procedure, OMEGA CRYPTO RECOVERY SPECIALIST was able to retrieve my $125,000 worth of lost cryptocurrency. After my recuperation, I experienced an amazing sense of relief and appreciation. OMEGA CRYPTO RECOVERY SPECIALIST's professionalism and knowledge really impressed me, and I would heartily suggest them to anyone who has been duped by cryptocurrency frauds. But I also want to caution others about investing in cryptocurrencies and advise them to conduct due diligence before making any decisions. Because the cryptocurrency market is still mostly uncontrolled.
Visit; (omegarecoveryspecialist. co m
(Mail; omegaCryptos @ consultant. co m
WhatsAp; +1 (701, 660 (04 759 -
Once I found out an unprotected folder in my school which is used to store sensitive data.
It was open to any administrator there.
We copied the Question Papers, Edited the attendance, and Even changed the Marks.
We were able to extract photos of students from the database and retrieve stored passwords -
eBay's APIs make me want to cry.
Take the sandbox for example:
- Every time you log into a session, it logs you out.
- When you create an order (eventually!) and want to retrieve it, tough shit it doesn't feel like doing that today.
- Functionality both exists and doesn't exist at the same time on both the LIVE and Sandbox APIs. I don't know how they've managed to get quantum computers in their server room, but their GOD DAMN API LIBRARIES ARE NOT THE BEST USE CASE FOR QUANTUM COMPUTING!!
I don't know if I despise eBay or Magento more...undefined shit apis quantum computing i would like to poke my eyes out with a spoon wtf am i doing with my life ebay -
// new Rant("help")
I am currently writing my first 'real' Ruby project. I want people to be able to contribute through a module class by extending it and implementing the needed methods. This can (if done correctly) provide new commands for the terminal and new features.
But is this a good idea? I would download the code then by using git and keep it that way updated (similar brew does). At the start of the terminal app I would add all files recursively from the folder where I clone the modules into and lookup each class that extends module and then load the new content.
Is there another way of creating such a 'modular' application in Ruby?
They way I load the modules is through the inherited method, I just add the classes (not a concrete object created with new) to a list and retrieve it at runtime.
Would be nice to get some feedback going on here, not sure if my idea is good/bad. -
I want to do some kind of simple note-taking web-app, with a Golang-Backend.
I need to choose a database, but don't have any clue about DBs.
Every note will consist of 3 strings, let's call them content, pubkey and privkey and I want to retrieve a saved note by searching for pubkey.
Can you recommend me any particular DB or at least an all-round solution ?3 -
Check this out: the company that times its Web searches in milliseconds can't retrieve a bunch of rows from their internal database... GTFO.
"Accused of underpaying women, Google says it's too expensive to get wage data."
https://theguardian.com/technology/...1 -
Wonderful experience today
I'm scraping data from an old system, saving that data as json and my next step is transforming the data and pushing it to an api (thank god the new system has an api)
Now I stumbled upon an issue, I found it a bit hard to retrieve a file with the scraper library I'm using, it was also quite difficult to set specific headers to download the file I was looking for instead of navigating to the index of the website. Then I tried a built-in language function to retrieve the files that I needed during the scrape, no luck 'cause I had to login to the website first.
I didn't want to use a different library since I worked so hard and got so far.
My quick solution: Perform a get request to the website, borrow the session ID cookie and then use the built-in function's http headers functionality to retrieve the file.
Luckily this is a throwaway script so being dirty for this once is OK, it works now :) -
This is my frontend tip of the day.
If you have a frontend that consumes an external API:
1) Retrieve the json responses from devtools
2) Save them in your project as json files (trim the data a bit if it's too long)
3) When starting your app with a special env var like MOCK_DATA, make your app mock the data and use your saved json data instead.
You can associate each response with an url regex.
The package fetch-mock mocks fetch really well, it lets through the urls that don't match anything.
This way you can incrementally add responses.
And voila, you have a mode where you have near instant page loads to test things manually, and you also have mocked data ready for testing eg, cypress. -
Literally facepalm when seeing my company coding used Email as an identity to retrieve profile data etc. Yet the profile is allow user to interchange their email.
What is this kind sorcery is this? Why don't just plainly use the UID to retrieve profile instead, as simple as that. Is UNIQUE!!!
😒😒😒 F5 -
This is not a rant. Rather just a question or an ask for advice, as I have seen a lot of people talk about web development around here. I am planning to create a website for my search engine. I created a Rest API for my VPS so I can do http requests and retrieve some links for certain key words. But I need some good ideas to do this from a website. As I am not sure what would be the best way to do http requests. As far as I know it's possible with Js and PHP, but I am not sure what's better, more secure or convenient? So here I am to ask you guys, especially those who have experience with this, what I should consider to do.
Oh and please forgive me my limited knowledge about Js and PHP 😅😊3 -
I've just learned that our front-end application throws a simple 404 error when trying to retrieve an avatar that does not exists.
But our technicians/support use this error in the console to show the customers that there is indeed a problem with the application functionality but have unsufficient logging from the back-end to troubleshoot with their internal tools.
What a bunch of liars trying to keep the customer satisfied and it works relatively well :D2 -
Hey all,
I have a soap service delivering products from an ERP. I'm retrieving these products in a loop getting 20/req. The ERP has 5k+ products. Any advice regarding the best way to retrieve them all and quick would be most appreciated. -
Logic of my company:
Why have an auto incremental ID for the table when you can have another table where you have to retrieve the last registered id, add 1 to it, then update the register of the last ID, then retrieve the id and finally create the register you intended.
Justification: “It’s a good practice”
FML1 -
I hate when clients think they're always right.
Yesterday this client showed up saying that he had an emergency on computer, because after an update all icons turned white. When we told he the situation and that all data was lost, he begged to retrieve all the info because he needs it to work.
He was affected by ransomware, something like Fantom, and not only all the files are encrypted but also the backups.9 -
Very early on I was putting together my first database-driven web app and decided to use record IDs with leading zeroes - you know, because that would look neater. It was a long, long time before I came to know that a number with a leading zero would be evaluated as octal, which in turn meant that any number with an 8 or a 9 in it was invalid, which then meant it would be a match for any other invalid number and retrieve a seemingly random record.4
-
Genuine question
You're given a server with the latest Ubuntu. You can't install any deps, and you can't use docker. Your goal is to write a REST API backend that can store/retrieve data persistently, ideally with a SQL-like language. Bonus points if you can figure out a reverse-proxy.
What would you do?
I'm obsessed with an idea of having some kind of codebase that doesn't include binary files and that I can just ssh over to a fresh server, and it would work instantly18 -
Twitter disclosed a bug on its platform that impacted users who accessed their platform using Firefox browsers.
According to the report of ZDNet: Twitter stored private files inside the Firefox browser's cache (a folder where websites store information and files temporarily). Twitter said that once users left their platform or logged off, the files would remain in the browser cache, allowing anyone to retrieve it. The company is now warning users who share systems or used a public computer that some of their private files may still be present in the Firefox cache. Malware could be used to scrape and steal this data.2 -
Trying to find a function I swear I had created to retrieve a set of counts from a database. Couldn’t find it. What I could find is the comment I had written with the function being completely overwritten with something entirely different.
I’m a complete fucking idiot and thank fuck for version control. -
Work email conversation with a COTS app support tech:
Tech: Could you provide me the following from Sql Server? (instructions followed)
Me: I am not the DBA, but I've sent them the request.
Tech: Could you send me the following from Sql Server while we wait? (Instructions followed)
Me: As I said, I don't have permissions to access what you want.
Tech: Oh, I see now, you most likely don't have proper access to be able to retrieve the information.
Me: ..yeah. Thanks. -
After not using Intel XDK for a year. I just noticed that they dropped support for this tool in early 2018 and removed all the keystores stored in their system.
Now I'm unable to update my android app because I don't have the key anymore.
And now soon google play will remove my app due to security issue on certain module.
I should've kept the keystore myself...
Oh well mistakes were made and lessons are learned the hard way.
Does anyone have any suggestion to retrieve a keystore file? -
Just a question about a generic social app. Using mongodb , 3 entities ,like comment and post . how do I display posts in feeds with comment count and like count . since its mongodb I can't do joins . the other way is to maintain a data structure on the server side . or yet another way would be making 2 extra queries to db for retrieving like and comments count . Any other way this is possible or is it possible to form a query in mongo db to retrieve all 3 at the same time???1
-
Somewhere in out application backend we generate a simple bullet chart. But in the most complicated way possible.
We call a web service to retrieve it(yes, a simple bullet chart). The service requires some parameters, and the code that generates them is hidden behind a wall of interfaces and abstract methods (the best and apparently only way to get to the actual code is to debug it).
However, one of these parameters is very well visible and it is a string with (uncommented)javascript function that manipulates the resulting chart, adding some final touches. With hardcoded values etc..
Dear programmers, I know we should avoid reinventing the wheel, but sometimes we should stop and consider the possibility, that we are using the wrong wheel and in completely wrong/obscure way. Thank you.
Yours WhoeverWillMaintainTheCode3 -
Lost all of my progress because i checkout to other branch without push it before. Is there anything that i can do to retrieve it back ?
#NoobQuestion2 -
🚀 *iBOLT CYBER HACKER: Cryptocurrency Recovery & Advanced Hacking Solutions!* 🦊💻
🔐 *Lost access to your crypto wallet or had your funds stolen?* Don’t worry— iBOLT CYBER HACKER is here to help you recover your cryptocurrency with cutting-edge technical expertise.
💡 With years of experience in the crypto world, iBOLT CYBER HACKER employs the latest tools and ethical hacking techniques to help you recover lost assets, unlock hacked accounts, and retrieve funds from inaccessible exchanges.
⚡ Whether it’s a forgotten password, an accidental transfer, investment scam, or a major security breach, iBOLT CYBER HACKER has the expertise to help you get your crypto back.
- General phone hacking and monitoring
- Money recovery from scammers
- Bitcoin and PayPal recovery
- Mobile phone monitoring
- Hacking and modifying university grades
- Bank website hacking and fund transfers
- Database hacking with admin privileges
👉 *Contact iBOLT CYBER HACKER for professional assistance
📧 𝐄𝐦𝐚𝐢𝐥: Support @ibolt cybarhack. com
𝐨𝐫
📲 𝐖𝐡𝐚𝐭𝐬𝐀𝐩𝐩: +39, 351..105, 3619
http s:// ibolt cybarhack. com1 -
Ugh, retrieving specific data fields nested within several arrays and objects in Javascript/Json jacks me up every fucking time!!!
Anyone ever fuck with the MapQuest geolocation/geoqueries api??
I'm trying to retrieve the lat/lng values out of responses generated from submitted address strings, and it's nested about 8 json layers deep.
I feel like I'm overthinking this?
I can access the values in my web console, and can reach them after using the console to assign them to a temp var, but can't get to the values from my actual js code. Only when I run some business logic from the console.
Here's a shitty example of me explaining the tree:
[{...}]
0:
locations: Array(3)
0:
latLng:
lat: <data here>
lng: <data here)1 -
HI all.
I'm a novice in Web Development and I've made simple Web App I've just publish on Github. I just wanted to play a little to learn API manipulation and JavaScript's Fetch. So I decided to build an app based on Discogs' API for my personal use.
ShuffleBum is an app, which after providing a username in the dedicated field, retrieves all items of user's collection then randomize one of them before displaying it. That's help me to find my next listening records (I have 400+ vinyls in my collection and I always listenning too many time the same records ^^).
Because of Discogs' API construction, I must perform two fetch to retrieve all the items (Items are stacked at 50 per page). So, for my collection, there is 10 pages with 50 items. So, I used a foreach and a fetch to scan items and store them into an array.
But, this is really slow (800ms for each request), so for 10 pages, that's a lot. But I can't see how to improve those request. I can't do otherwise. Well, I guess.
Hope I will have so recommandation, hints, tricks.
Thank you.13 -
Alright so I have been trudging around in javascript land for a bit and one thing kind of bothers me (correct me if I am wrong I would love to be wrong on this). It seems like a lot of javascript, or at least frameworks, leave a lot of possibility for memory leaks. Like you can create an anonymous object with a method that just kind of hangs out and acts with no way to retrieve it and turn it off. Am I wrong here? Please tell me I am wrong. And for the record I know I can assign anonymous objects to variables in various ways, but I am not forced to.4
-
For a few days I failed to see that I need to add one string escape instead of re-writing the whole S3 file upload logic to hash file names using md5. :( Context: We were not able to retrieve some files with international letters (like German, Chinese, etc) in their names because of weirdly escaped signed URL to S3.
-
Get in touch with a professional hacker ( tech ) to help hack your cell phone. Trusted and verified with quick responds and legit services. They offer services like (Cell phone hack , GPS tracker, Delete criminal records, Retrieve wallet, Retrieve Gm ail, face book, whatsApp, photos and many more...), All these services are done remotely, distance is not a barrier. You can reach out with them on ( TECHSPYMAX @ gm ail c om ).
-
Meet The Mastermind Behind Remarkable Recovery of Lost Crypto/BTC-The Hack Angels.
Mail Box;support@thehackangels. comWeb thehackangels. com Whats AP;+1520)-200,2320
The Hack Angels has emerged as a prominent figure in the realm of Bitcoin recovery, gaining a reputation for their exceptional ability to retrieve lost Funds (BTC) and other cryptocurrencies. Their expertise and track record have made them a beacon of hope for individuals facing the distressing situation of lost or inaccessible crypto assets. -
i still dont get how you retrieve webhook payload thru localtunnel. i just took my way around by polling
-
When i took CS operating system class few years ago there was discussion on layout of memory and how to retrieve things faster. There was a point where we were asked question on locality and i was first to shoot my hand and prof looked at me : i was eager to answer locality of refrences, i knew temporal locality but i forgot the other one. That is when he told me to remeber Einstein and his space time principal. Instantly i remembered spatial locality. Till this date after so many years i remeber the concept! Woohoo to all the awesome teachers!!
-
nice read:
https://lukasa.co.uk/2016/12/...
(would love to know what happens to radar/bug report, but could not retrieve it) -
Does anyone know a good way to retrieve back the indexes of elements in the unsorted list after sorting that list in python?
Let's say for example I want to find the largest element in a list, so I sort it and find the last element(as it will be the largest), now I want to retrieve its original position in the unsorted list.9 -
BLOCKCHAIN CYBER RETRIEVE//BEST HACKER TO CLAIM BACK MY STOLEN CRYPTO FUNDS
BLOCKCHAIN CYBER RETRIEVE: The Lifeline That Helped Me Recover My Lost Crypto Funds
In March 2024, I became a victim of a cryptocurrency scam. I had invested $158,000—my entire life savings—into a crypto platform that promised sky-high returns. The advertisement seemed legitimate, and the opportunity was too tempting to pass up. But just days after my investment, when I tried to check the status of my account, I was horrified to find that it had been deleted. All attempts to contact their support team went unanswered, and that’s when the grim reality set in: I had been scammed. The loss was devastating. Not only had I lost a significant amount of money, but it also felt like I had lost my financial future. I felt helpless and didn’t know where to turn. That’s when I stumbled upon BLOCKCHAIN CYBER RETRIEVE, Initially skeptical but desperate for a solution, I decided to reach out after reading countless success stories and positive reviews. Little did I know, this would be the best decision I made. From the very first contact, I was impressed by the professionalism and expertise of the BLOCKCHAIN CYBER RETRIEVE. They immediately understood the gravity of my situation and reassured me that they had the tools, knowledge, and experience to assist in recovering my lost funds. The team explained that they employed advanced forensic techniques and specialized strategies to trace and recover stolen cryptocurrency, a crucial component in fraud cases like mine. What truly set BLOCKCHAIN CYBER RETRIEVE apart was their transparency and consistent communication. Throughout the process, they kept me informed every step of the way. They answered my questions promptly and clearly, making sure I was never left in the dark. The level of customer service was extraordinary, and I always felt like my case was being handled with the utmost care and urgency. Incredibly, within just two days, BLOCKCHAIN CYBER RETRIEVE successfully recovered my full investment of $158,000. I was stunned, relieved, and incredibly grateful. What I thought was lost forever was returned to me, thanks to their meticulous work and unwavering dedication. The entire experience was nothing short of exceptional. Not only did they recover my funds, but they also restored my belief that justice can be served in the world of cryptocurrency. Their professionalism, expertise, and commitment to their clients were truly remarkable, and I felt supported throughout the entire process. If you’ve fallen victim to crypto fraud or digital asset theft, I cannot recommend BLOCKCHAIN CYBER RETRIEVE highly enough. They are a legitimate, trustworthy, and highly skilled recovery team that genuinely cares about their clients. Thanks to them, I was able to recover what I thought was gone for good. If you’re in a similar situation, don’t hesitate to reach out to BLOCKCHAIN CYBER RETRIEVE via the following contact information.
WhatsApp:+ 1 520 564 8300
Email:blockchaincyberretrieve (@) post(.) com
It's your best chance at recovering your funds.16 -
Wizard James Recovery has continuously demonstrated a steadfast dedication to provide reliable crypto recovery services. Their dependability has really impressed me. I usually seek out their knowledge if I am in a tough spot, like a cyberattack or losing my bitcoins, and I am constantly in awe of the outcomes they provide. Wizard James Recovery's ability to quickly address problems and get my business back on track is one of the main reasons I like them. I can rest easy knowing that I am in good hands thanks to their reliable solutions. You may be confident that Wizard James Recovery will find and retrieve your stolen bitcoins from the scammers. Just get in touch with their staff, explain your predicament, and they will help you recover what is properly yours. Contact them at h t t p s : / / wizardjamesrecovery . com to begin the process of addressing your bitcoin-related issues. Their professionalism, dedication, and results will not let you down.
-
I NEED A HACKER TO RECOVER MY LOST CRYPTO /USDT Look For ULTIMATE HACKER JERRY
The top rehabilitation specialist is what you require. ULTIMATE HACKER JERRY can help you avoid cryptocurrency theft frauds. There are many scammers in the bitcoin investment market, and even if people try their hardest to make huge profits, they frequently lose money. These individuals are so intelligent that no one can foil their clever plans. In order to entice you to invest your hard-earned money, they usually provide contact agreements and place you in a group with people who have already done so. After following their advice and investing my money, I found out a few days later that it had been stolen. For helping me retrieve my Bitcoin from these online criminals, I would like to thank ULTIMATE HACKER JERRY. -
HOW CAN I HIRE A HACKER TO RECOVER MY STOLEN BITCOIN. CONNECT WITH FASTFUND RECOVERY.
Following an online cryptocurrency theft, I was repeatedly duped in my desperate search for a prompt help to recover my money. Even after paying all the fees that were consistently asked, I could not retrieve any of the $146,000 that I had invested, let alone the profits. Two weeks later, I came across a review on Fastfund Recovery, a hacker who, given the right information, could break into the scammer's account and retrieve money back. I sent him an email as soon as possible. I was shocked that he could get my money back from the swindlers. In less than 48 hours, he assisted me in getting the money I had lost. Please get in touch with him for his best-ever performance.
Email: Fastfundrecovery8 (at) gmail to com.
Web, site: fastfundrecovery dot com17 -
LEGITIMATE CRYPTOCURRENCY RECOVERY SERVICES / HIRE ULTIMATE HACKER JERRY
Working with Ultimate Hacker Jerry has made me feel so grateful and relieved that words cannot begin to describe. An internet fraud cost me a significant portion of the bitcoin savings I had amassed over the years. I spent two arduous years trying to figure out how to get my money back, believing it was lost forever. I had tried and failed to restore it all. It was difficult for me to trust another internet service until I found Ultimate Hacker Jerry. They attentively studied my situation, explained every stage of their approach. My feeling is beyond words when I saw my bitcoin back in my wallet after they were able to track it down and retrieve it. I'm at a loss for words; as promised, here is my review for these teams. I strongly suggest Ultimate Hacker Jerry to everyone.
-
When the vendor did a search page but retrieve all the records from the database and paginate them with js, and the load test crashes with 20 concurrent users!!!
-
RELIABLE AND MOST TRUSTWORTHY CRYPTOCURRENCY RECOVERY EXPERT | ULTIMATE HACKER JERRY
I lost more than $240,000 to a phony trading website after falling for a cryptocurrency scam. In a desperate attempt to find a quick fix, I began looking for assistance in getting my money back. That's how I found Ultimate Hacker Jerry Recovery Experts, who had a ton of excellent online reviews. After reaching out to them, I gave them all the information they asked for. My money was taken, and Ultimate Hacker Jerry needed roughly 72 hours to find and retrieve them. I'm very happy I was able to recover the money I misplaced. I hope this aids as many people as possible who have fallen prey to these fraudulent online investing con artists. I wholeheartedly urge victims looking for help recovering their misplaced cryptocurrency to use their expert services. -
There's no official integration (package) for JWT in Java Spring?
I am new to Java Spring and want to create a simple RESTful server with JWT auth. Checked many tutorials, all of them involved creating your own JWT middleware to retrieve JWT token from incoming request and validate it using some 3rd party JWT library like jwtk/jjwt.
I am surprised this is not as simple as including a Spring JWT package and it would work out of box. I used to write a similar site using Python/Django, and for that adding JWT support is quite simple as adding "xxx.middleware.JWTAuthMiddleware".1