Welcome to Software Development on Codidact!
Will you help us build our independent community of developers helping developers? We're small and trying to grow. We welcome questions about all aspects of software development, from design to code to QA and more. Got questions? Got answers? Got code you'd like someone to review? Please join us.
Activity for Michaelâ€
Type | On... | Excerpt | Status | Date |
---|---|---|---|---|
Answer | — |
A: What is a reasonable minimum for making a FOSS project inviting to contributors? Matthew's list is pretty good, although I don't think one has to do all the things on it as a "minimum." I offer one minimum and a couple nice-to-haves. Some of these I have learned as a contributor; some as a maintainer. Must Don't be a jerk When people engage with your project, don't be dism... (more) |
— | 8 months ago |
Comment | Post #291125 |
> I'll definitely post them as answers instead.
Please do! Even if others answer the question later, it makes it easier for them to refer to your answer in a link if it already exists, rather than quoting text from the question that you may move to an answer later. (more) |
— | 8 months ago |
Comment | Post #289725 |
When I wanted to read the objects, I dumped a parallel file to JSON for convenience, but I haven't ever needed to update my pickles by hand. (more) |
— | 9 months ago |
Edit | Post #290995 |
Post edited: Direct page link |
— | 9 months ago |
Edit | Post #290998 | Initial revision | — | 9 months ago |
Answer | — |
A: GnuTLS config for my own root CA, for use on internal server Does GnuTLS support CA Name Constraints (RFC 5280, 4.2.1.10), so you can limit the valid domains directly in the root CA? I'm not aware of any CAs that self-limit this way,[^moz] except for when the US government tried (unsuccessfully?) to get one approved by the CA/B forum for `.gov` and `.mil`. ... (more) |
— | 9 months ago |
Suggested Edit | Post #290995 |
Suggested edit: Direct page link (more) |
helpful | 9 months ago |
Comment | Post #290992 |
Does GnuTLS support [CA Name Constraints](https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10), so you can limit the valid domains directly in the root CA? (more) |
— | 9 months ago |
Edit | Post #290818 |
Post edited: Prettyprint language that CD understands |
— | 9 months ago |
Suggested Edit | Post #290818 |
Suggested edit: Prettyprint language that CD understands (more) |
helpful | 9 months ago |
Comment | Post #290747 |
Possessing a good answer is not itself indicative of a good question. I have downvoted some questions where I upvoted the Asker's self-answer. _This_ question is too broad. (more) |
— | 9 months ago |
Comment | Post #290786 |
I don't know that you're going to get anything more helpful than the test you already did. You could trawl the Bash changelogs to see if they indicate that the behavior was ever different, but "absence of evidence is not evidence of absence." (more) |
— | 9 months ago |
Edit | Post #290587 |
Post edited: Link the Git mailing list |
— | 10 months ago |
Edit | Post #290587 |
Post edited: Move the analogs to the top of each section. Explicitly mention email. |
— | 10 months ago |
Edit | Post #290652 | Initial revision | — | 10 months ago |
Answer | — |
A: Should a salt be stored in the same database as the hash? With bcrypt, the salt is stored in the same string as the hash. This is done so that you have everything you need to get that hash identifier if you know the password.[^pepper] Wikipedia breaks down the format: > ## Description > The input to the bcrypt function is the password string (up to 72 b... (more) |
— | 10 months ago |
Edit | Post #290490 |
Post edited: Hack a second paragraph into a footnote. Stress password reuse again. Beg service operators to be good. |
— | 10 months ago |
Comment | Post #285566 |
If the criteria for your log isn't expensive in its own right, you could just ask `git log` to stop after a certain number of commits are found. `-50` or something. (more) |
— | 10 months ago |
Edit | Post #290097 |
Post edited: Change "single" to "only," lest it be interpreted as "single quoting" |
— | 10 months ago |
Edit | Post #290587 |
Post edited: Ugh. Proofreading |
— | 10 months ago |
Edit | Post #290587 |
Post edited: Some intro text. |
— | 10 months ago |
Edit | Post #290587 |
Post edited: |
— | 10 months ago |
Edit | Post #290587 |
Post edited: Mention patch creation reqs. |
— | 10 months ago |
Edit | Post #290587 | Initial revision | — | 10 months ago |
Answer | — |
A: Git apply vs git am Each of them has an analog to another Git command. But instead of objects in the repository, these take text file(s) created either by you or someone else. `git apply` Think of this as Applying a `git stash` from a text file. Applies a delta to your worktree. It's nominally a Git-flavored ve... (more) |
— | 10 months ago |
Edit | Post #290490 |
Post edited: Invert the chart, so "Anything Else" makes more sense |
— | 10 months ago |
Comment | Post #290511 |
That's crazy. I had one where the password entry screen had a _shorter_ length limit than the creation screen, so it didn't fit the password I had set. (more) |
— | 10 months ago |
Edit | Post #290490 |
Post edited: |
— | 10 months ago |
Edit | Post #290490 |
Post edited: Chart! |
— | 10 months ago |
Edit | Post #290490 |
Post edited: NIST history: NISTory? |
— | 10 months ago |
Comment | Post #290511 |
From 2003 to 2017, NIST's 800-63 pushed the bad advice they later repudiated. See [this WSJ article](https://archive.is/4xffa) (no paywall) on the history. That's why organizations that are slow to change and old systems without active development might still have the crummy old guidelines. (more) |
— | 10 months ago |
Comment | Post #289252 |
Do you want to add an explainer for `$'{status=}'`? It's nice for logging or verbose output. (more) |
— | 10 months ago |
Edit | Post #290489 |
Post edited: Text didn't match the image. (It was bugging me, sorry.) |
— | 11 months ago |
Edit | Post #290490 |
Post edited: |
— | 11 months ago |
Edit | Post #290490 |
Post edited: Have I Been Pwned? |
— | 11 months ago |
Suggested Edit | Post #290489 |
Suggested edit: Text didn't match the image. (It was bugging me, sorry.) (more) |
helpful | 11 months ago |
Edit | Post #290490 |
Post edited: Obsessive wordsmithing. |
— | 11 months ago |
Edit | Post #290490 |
Post edited: |
— | 11 months ago |
Edit | Post #290490 |
Post edited: Password expiration |
— | 11 months ago |
Edit | Post #290490 | Initial revision | — | 11 months ago |
Answer | — |
A: Are "strong passwords" at all meaningful? Passwords are annoying. Nobody really enjoys passwords, which is why "The End of Passwords" articles keep circulating. I'm looking forward to the day the prediction comes true, but in the meantime passwords are the most common way to do authentication anywhere with a computer. I made a chart to cl... (more) |
— | 11 months ago |
Edit | Post #290397 | Initial revision | — | 12 months ago |
Answer | — |
A: How to display overlapped content in an e-mail I don't understand your "Venn Diagram" explanation. Are you wanting the image behind the text? If you mean wrapping around the image, you can do this: Instead of cells of a big table, put the image into its own table and `align="right"` the table. Then text will reflow around the table (even in yu... (more) |
— | 12 months ago |
Edit | Post #290317 |
Post edited: oops |
— | 12 months ago |
Edit | Post #290323 |
Post edited: Mention workaround. |
— | 12 months ago |
Edit | Post #290323 | Initial revision | — | 12 months ago |
Answer | — |
A: Can GitHub rewrite authorship of commits? It doesn't change commit data when you push. You have to set your local email address to the `noreply` one. > ## About commit email addresses > […] > > If you'd like to keep your personal email address private, you can use a `noreply` email address from GitHub as your commit email addres... (more) |
— | 12 months ago |
Edit | Post #290317 | Initial revision | — | 12 months ago |
Question | — |
Can GitHub rewrite authorship of commits? GitHub has a setting wherein they offer to "anonymize" your user email from, say, somebody@example.com to somebody@users.noreply.github.com. I presume this is to prevent you from getting spam from a scraper that reads the metadata on commits to public repositories. How do they do this without inva... (more) |
— | 12 months ago |
Edit | Post #290188 |
Post edited: Put screenshots into the markdown list items they're related to. |
— | about 1 year ago |
- ← Previous
- 1
- 2
- 3
- 4
- Next →