Details
-
Abouthello world ! I'm Piramanayagam **Crazy name right ?** I'm a final year Student coming out (**not as gay**) but as a Computer Science Engineer! I love coding !! I love the idea of creating new software and technology!! I'm hoping on learning more!
-
SkillsC C++ JavaScript HTML CSS Python 3.0 Ruby Go
-
LocationBangalore
Joined devRant on 12/14/2017
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
By looking at our source code, I see what makes a bad programmer. I see "invalid data" in error logs, guess which of the following 3 conditions caused this:
function somefunc() {
if(condition_1) {
throw "invalid data"
}
if(condition_2) {
throw "invalid data"
}
if(condition_3) {
throw "invalid data"
}
return some_response;
}3 -
"My think isn't working!"
"Let me see."
*starts program, error message appears, clicks X*
"What was that?"
"Don't know, appears every time, I never read it."7 -
WTF?!? Why do I have to sign in to your app, but can only uns „Sign in with Google“ and „Sign in with Facebook“? Well fuck you and your app, not gone use it than!!!14
-
My software has been attacked by internal hacker to test my software for safe holes, they found none and did not get through 😁4
-
Today I uninstalled WhatsApp, I mean I haven't had a look at it in over a month and nobody texts me anways.
Writing this makes me realize how sad this is
I don't want to support Facebook or any data mining company, instead I want to support (free) / open source software like Signal33 -
Okay, this is a rather technical rant and I am sure some of you are working on the patches already, if you are then lets connect cause, I am an ardent researcher for the same as of now.
So here it goes:
As soon as kernel page table isolation(KPTI) bug will be out of embargo, Whatsapp and FB will be flooded with over-night kernel "shikhuritee" experts who will share shitty advices non-stop.
1. The bug under embargo is a side channel attack, which exploits the fact that Intel chips come with speculative execution without proper isolation between user pages and kernel pages. Therefore, with careful scheduling and timing attack will reveal some information from kernel pages, while the code is running in user mode.
In easy terms, if you have a VPS, another person with VPS on same physical server may read memory being used by your VPS, which will result in unwanted data leakage. To make the matter worse, a malicious JS from innocent looking webpage might be (might be, because JS does not provide language constructs for such fine grained control; atleast none that I know as of now) able to read kernel pages, and pawn you real hard, real bad.
2. The bug comes from too much reliance on Tomasulo's algorithm for out-of-order instruction scheduling. It is not yet clear whether the bug can be fixed with a microcode update (and if not, Intel has to fix this in silicon itself). As far as I can dig, there is nothing that hints that this bug is fixable in microcode, which makes the matter much worse. Also according to my understanding a microcode update will be too trivial to fix this kind of a hardware bug.
3. A software-only remedy is possible, and that is being implemented by all major OSs (including our lovely Linux) in kernel space. The patch forces Translation Lookaside Buffer to flush if a context switch happens during a syscall (this is what I understand as of now). The benchmarks are suggesting that slowdown will be somewhere between 5%(best case)-30%(worst case).
4. Regarding point 3, syscalls don't matter much. Only thing that matters is how many times syscalls are called. For example, if you are using read() or write() on 8MB buffers, you won't have too much slowdown; but if you are calling same syscalls once per byte, a heavy performance penalty is guaranteed. All processes are which are I/O heavy are going to suffer (hostings and databases are two common examples).
5. The patch can be disabled in Linux by passing argument to kernel during boot; however it is not advised for pretty much obvious reasons.
6. For gamers: this is not going to affect games (because those are not I/O heavy)
Meltdown: "Meltdown" targeted on desktop chips can read kernel memory from L1D cache, Intel is only affected with this variant. Works on only Intel.
Spectre: Spectre is a hardware vulnerability with implementations of branch prediction that affects modern microprocessors with speculative execution, by allowing malicious processes access to the contents of other programs mapped memory. Works on all chips including Intel/ARM/AMD.
For updates refer the kernel tree: https://git.kernel.org/…/ke…/...
For further details and more chit-chats refer: https://lwn.net/SubscriberLink/...
~Cheers~
(Originally written by Adhokshaj Mishra, edited by me. )23 -
It's hard to motivate developers when the tech stack is a career dead end, the business is fundamentally boring and you're never getting promoted.
So you offer job security.3 -
Python seems so ... simple, yet beautiful.
(It's just ... a feeling, I only did the codecademy course and doodled on the command line by now.)
But this whitespace/tab thing and the fact that missing semicolons don't result in errors is just fucking confusing.15 -
Bought my older boys (5 & 6) each one of these for Christmas. It’s based on the raspberry pi with a custom Linux OS.
Not only do they put it together themselves, but it teaches them Linux and how to code. Tbh I want to play with it 😯10 -
Apparently they didn't want to hear about my vulnerabilities I found because they blocked my IP address.
Seriously? I just wanted to do a disclosure of potential exploits / security issues10 -
I find it so amazing to see when my colleagues (or even me) are irritated/annoyed to the fucking point, swearing around and so on but then the phone rings and they are completely calm/sound nice/happy when they pick it up one second later. (we're Linux support engineers)
This job is the best fucking self control training I've ever had!10