fubo

joined 1 year ago
[–] [email protected] 31 points 5 days ago

"What the user needed" / "What management demanded"

[–] [email protected] 19 points 2 weeks ago (1 children)

Do you remember the beginning of Trump's previous term? His very first priority was to harm Muslims.

[–] [email protected] 3 points 2 weeks ago* (last edited 2 weeks ago)

Good catch! Typo. Fixed.

[–] [email protected] 12 points 2 weeks ago (1 children)

Regex is good for a few very specific things, and sysadmins used to use it for goddamn everything. If all your server logs are in lightly-structured text files on a small number of servers, being able to improvise regex is damn useful for tracking down server problems. Just write a shell loop that spawns an ssh logging into each server and running grep over the log files, to look for that weird error.

These days, if you need to crunch production server logs you probably need to improvise in SQL and jq and protobufs or systemd assmonkery or something.

But if you actually need a parser, for goodness sake use a parser combinator toolkit, don't roll your own, especially not with regex. Describing your input language in plain Haskell is much nicer than kludging it.

(This is the "totally serious software engineering advice" forum, right?)

[–] [email protected] 27 points 2 weeks ago (3 children)

Yep. This is why online recipe sites put a whole goddamn personal essay before the actual recipe: if someone scrapes the page and copies it, they'll scrape the (copyrightable) essay as well as the (non-copyrightable) recipe.

[–] [email protected] 18 points 2 weeks ago* (last edited 2 weeks ago) (2 children)

Whatever you do, don't get in a time machine back to 1998 and become a Unix sysadmin.

(Though we didn't have CL-PPCRE then. It's really the best thing that ever happened to regex.)

[–] [email protected] 136 points 2 weeks ago* (last edited 2 weeks ago) (17 children)

The answer given in the spoiler tag is not quite correct!

Test caseAccording to the spoiler, this shouldn't match "abab", but it does.

Corrected regexThis will match what the spoiler says: ^.?$|^((.)\2+?)\1+$

Full workupAny Perl-compatible regex can be parsed into a syntax tree using the Common Lisp package CL-PPCRE. So if you already know Common Lisp, you don't need to learn regex syntax too!

So let's put the original regex into CL-PPCRE's parser. (Note, we have to add a backslash to escape the backslash in the string.) The parser will turn the regex notation into a nice pretty S-expression.

> (cl-ppcre:parse-string "^.?$|^(..+?)\\1+$")
(:ALTERNATION
 (:SEQUENCE :START-ANCHOR (:GREEDY-REPETITION 0 1 :EVERYTHING) :END-ANCHOR)
 (:SEQUENCE :START-ANCHOR
  (:REGISTER
   (:SEQUENCE :EVERYTHING (:NON-GREEDY-REPETITION 1 NIL :EVERYTHING)))
  (:GREEDY-REPETITION 1 NIL (:BACK-REFERENCE 1)) :END-ANCHOR))

At which point we can tell it's tricky because there's a capturing register using a non-greedy repetition. (That's the \1 and the +? in the original.)

The top level is an alternation (the | in the original) and the first branch is pretty simple: it's just zero or one of any character.

The second branch is the fun one. It's looking for two or more repetitions of the captured group, which is itself two or more characters. So, for instance, "aaaa", or "abcabc", or "abbaabba", but not "aaaaa" or "abba".

So strings that this matches will be of non-prime length: zero, one, or a multiple of two numbers 2 or greater.

But it is not true that it matches only "any character repeated a non-prime number of times" because it also matches composite-length sequences formed by repeating a string of different characters, like "abcabc".

If we actually want what the spoiler says — only non-prime repetitions of a single character — then we need to use a second capturing register inside the first. This gives us:

^.?$|^((.)\2+?)\1+$.

Specifically, this replaces (..+?) with ((.)\2+?). The \2 matches the character captured by (.), so the whole regex now needs to see the same character throughout.

[–] [email protected] 27 points 2 weeks ago (8 children)
[–] [email protected] 19 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

Even in a home poker game, it is not possible for all the players to go home having made a profit, whereas that is very possible in the stock market due to growth, labor, and natural resources.

(The coal miner who gets a wage and black lung is not a player in the stock market. Neither is the sun, which provides free energy to agribusiness.)

[–] [email protected] 76 points 2 weeks ago* (last edited 2 weeks ago) (14 children)

In gambling, the house always wins, by extracting value from the players. In stock trading, the players (capitalists) collectively always win, by extracting value from labor, technological growth, and natural resources. These are not the same picture.

Sure, you can take on as much risk as you like using derivatives, and emulate a gambler using the stock market as a source of randomness (volatility). But that's not how most traders behave, and it's not how most traders' payoffs work.

[–] [email protected] 64 points 2 weeks ago (2 children)

As the article mentions, Red Hat is IBM.

[–] [email protected] 26 points 2 weeks ago (1 children)

For what it's worth, getting in the habit of making excuses for one's use is part of alcoholism.

 

Similar to the previous campaign TAG reported on, North Korean threat actors used social media sites like X (formerly Twitter) to build rapport with their targets. In one case, they carried on a months-long conversation, attempting to collaborate with a security researcher on topics of mutual interest. After initial contact via X, they moved to an encrypted messaging app such as Signal, WhatsApp or Wire. Once a relationship was developed with a targeted researcher, the threat actors sent a malicious file that contained at least one 0-day in a popular software package.

[...]

In addition to targeting researchers with 0-day exploits, the threat actors also developed a standalone Windows tool that has the stated goal of 'download debugging symbols from Microsoft, Google, Mozilla and Citrix symbol servers for reverse engineers.' The source code for this tool was first published on GitHub on September 30, 2022, with several updates being released since. On the surface, this tool appears to be a useful utility for quickly and easily downloading symbol information from a number of different sources. Symbols provide additional information about a binary that can be helpful when debugging software issues or while conducting vulnerability research.

But the tool also has the ability to download and execute arbitrary code from an attacker-controlled domain. If you have downloaded or run this tool, TAG recommends taking precautions to ensure your system is in a known clean state, likely requiring a reinstall of the operating system.

[...]

As part of our efforts to combat serious threat actors, TAG uses the results of our research to improve the safety and security of Google’s products. Upon discovery, all identified websites and domains are added to Safe Browsing to protect users from further exploitation. TAG also sends all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity and encourages potential targets to enable Enhanced Safe Browsing for Chrome and ensure that all devices are updated.

 

spoilerBecause they're ear-ier.

view more: next ›