Leave these fields empty (spam trap):
Name
You can leave this blank to post anonymously, or you can create a Tripcode by using the float Name#Password
A subject is required when posting a new thread
Subject
Comment
[*]Italic Text[/*]
[**]Bold Text[/**]
[~]Taimapedia Article[/~]
[%]Spoiler Text[/%]
>Highlight/Quote Text
[pre]Preformatted & Monospace text[/pre]
1. Numbered lists become ordered lists
* Bulleted lists become unordered lists
File

Sandwich


Developer at Amazon Video by Phyllis Gunderbare - Thu, 11 Jan 2018 21:01:01 EST ID:/G+nGQo2 No.37264 Ignore Report Reply Quick Reply
File: 1515722461566.jpg -(25399B / 24.80KB, 840x360) Thumbnail displayed, click image for full size. 25399
I'm a developer at Amazon Video, ask me anything
>>
Caroline Fecklecocke - Thu, 11 Jan 2018 21:46:29 EST ID:Ach3S7Tm No.37265 Ignore Report Quick Reply
I've heard nothing but bad things about Amazon as an employer. I don't have a question.
>>
Alice Hummerstut - Fri, 12 Jan 2018 01:44:28 EST ID:BW3MomrQ No.37266 Ignore Report Quick Reply
What do you specifically do on a day to day basis? What programs are you most often running and for what purposes?

How much effort do you guys put into content protection (such as HDCP) versus prioritizing working on improving customer-facing things?

Do you guys host Amazon Video out of the same datacenters that the public uses for public AWS nodes, or do you have special Amazon Video datacenters just for this?

How much hard disk space does Amazon's current video library take up?

Why is "Your Prime Video" separated from "Your Video Library" (this is always a usability thing that I run into - I'm looking for a video that I just purchased and I forget which category it shows up under, so I tend to have to look through both of them to find it...)?

It seems like the switching between HD and SD is automatic most of the time. Why did you guys choose to use this sort of a system (one that is automatic based on the empirically-measured bandwidth of the user while downloading the given video) versus something like what Youtube does where users can manually select between a bunch of different resolutions and frame rates? Is that a player limitation, a content limitation, or both?

What's the most interesting part of your day job?

What is the least interesting part of your day job?
Comment too long. Click here to view the full text.


Crypto Currency Technical Discussion Channel by Graham Docklehudging - Wed, 10 Jan 2018 22:16:05 EST ID:agmSr6q5 No.37263 Ignore Report Reply Quick Reply
File: 1515640565870.jpg -(154202B / 150.59KB, 1096x750) Thumbnail displayed, click image for full size. 154202
Thought this might interest the board! They discuss the technical merits and trading strategies a lot of different coins including ETH, BTC, and BCH. They also discuss programming methods, APIs, and workarounds for various echanges.

https://discordapp.com/invite/FcfwWpE


HOLY SHIT I'M ABOUT TO KILL MYSELF (SEGFAULT AT INDEX 0) by Lillian Puddlesture - Thu, 04 Jan 2018 10:17:51 EST ID:kvqggUwM No.37252 Ignore Report Reply Quick Reply
File: 1515079071468.png -(47908B / 46.79KB, 625x429) Thumbnail displayed, click image for full size. 47908
Has anyone ever had a segfault while accessing an array A at A[0][0]?
So, this is making me go insane. I have a good understanding of C, but I stopped doing anything with it after completing my exam about it (which was about simple client/server applications and implementing a petite GNU find).

Now I have to use it again for a BLOODY SIMPLE SHIT, WHICH IS GENERATING A FUCKING MATRIX. I've been banging my head on the wall for the past hour and nothing seemed to help.

My code segfaults at index (0,0) of the matrix. I isolated the problem by reducing it to a simple function that should print the contents of the matrix, which you can see in the image but I'm going to paste it here anyway:
[Note: not event matrix[0][0] is printed.]

#define RADIUS 7
int ** mask;

void printMatrix(int ** matrix, int size) {
for (int i = 0; i < size; i++) {
for (int j = 0; j < size; j++) {
//segfaults at i = 0, j = 0.
Comment too long. Click here to view the full text.
>>
Ian Bingerspear - Thu, 04 Jan 2018 15:09:48 EST ID:5/K3jMSW No.37253 Ignore Report Quick Reply
Obviously the matrix isn't what you think it is. Debugging with print statements like that doesn't help you much. Print more interesting information about matrix or better yet learn to use a debugger.
>>
Ernest Pimmledale - Thu, 04 Jan 2018 20:44:52 EST ID:4Jf4geC2 No.37254 Ignore Report Quick Reply
Okay so I ran your code through a debugger and figured out what happened. Also as one minor thing I think you forgot your #include's for printf and calloc (which I believe are <stdio.h> and <stdlib.h> respectively).

So you're using calloc() which allocates you cleaned memory that is set to all zeros. The NULL pointer is also represented by all zeroes. You should consider how the constructs you are invoking actually work here. What you're allocating with calloc() is a block of memory (in this case, a block of memory of size "RADIUS * RADIUS * sizeof(int)" ) and setting that memory to all zeroes. Then your code, outside of calloc, is creating an int** and pointing it to that newly formed block of zeroed memory.

If you were to access this block of memory as a regular int* array, like this:
int* memory = calloc(RADIUS * RADIUS, sizeof(int) );
for (int x = 0; x < RADIUS * RADIUS; x++) printf("%d,", memory[x]);
Then that would print out RADIUS * RADIUS zeroes, since all of the ints in your block of memory are zero.

Now what you did instead was you made a pointer-array pointing to that block of all zeroed memory. We can indeed print out the pointer values of each element in your array like this:
mask = (int**)calloc(RADIUS * RADIUS, sizeof(int) );
for (int x = 0; x < RADIUS; ++x)
{
int* thisPointer = mask[x];
printf("%p,", thisPointer);
Comment too long. Click here to view the full text.


Game Engines with open source-code by William Fanwater - Thu, 30 Nov 2017 17:54:29 EST ID:xESEUkvI No.37244 Ignore Report Reply Quick Reply
File: 1512082469156.png -(399990B / 390.62KB, 2000x1037) Thumbnail displayed, click image for full size. 399990
What are the best 3ngines to work with?
>>
Molly Fasslewane - Thu, 30 Nov 2017 19:18:04 EST ID:v79vrqu4 No.37245 Ignore Report Quick Reply
You mean FOSS or just a copy of the source with a license to use it?
>>
Henry Beblingbutch - Sat, 02 Dec 2017 02:30:33 EST ID:BW3MomrQ No.37246 Ignore Report Quick Reply
The ideal game engine is dependent upon what project you have in mind. There is no such thing as a "best" game engine.
>>
Nell Nagglefot - Sat, 02 Dec 2017 15:18:11 EST ID:9QSfnS0r No.37247 Ignore Report Quick Reply
Best as in most feature complete (level editor, asset management, rendering & events, virtual reality) and fully FOSS is Blender.


They don't want to solve this simple math by Anonymous - Thu, 16 Nov 2017 15:34:35 EST ID:/Irek0az No.37234 Ignore Report Reply Quick Reply
File: 1510864475496.jpg -(63851B / 62.35KB, 1200x599) Thumbnail displayed, click image for full size. 63851
Find out before it is taken down from the web: https://youtu.be/7GbsO-CFNMo
>>
Beatrice Banderdock - Thu, 23 Nov 2017 02:24:35 EST ID:BW3MomrQ No.37239 Ignore Report Quick Reply
>>37234
Naw dude, it's the weekend already...
>>
Angus Bluvingmork - Fri, 24 Nov 2017 20:52:29 EST ID:TMMzYIBA No.37241 Ignore Report Quick Reply
lol
>>
John Chesslepidge - Wed, 07 Feb 2018 06:19:43 EST ID:OAOU6kJR No.37351 Ignore Report Quick Reply
lmao bless you OP


TDD by Frederick Sushdock - Thu, 31 Aug 2017 10:33:41 EST ID:9cestl8h No.37169 Ignore Report Reply Quick Reply
File: 1504190021194.jpg -(324209B / 316.61KB, 503x376) Thumbnail displayed, click image for full size. 324209
Hey how often is test driven actually used in the real world.

Arrange - act - assert...
1 posts omitted. Click Reply to view.
>>
Oliver Cennerpetch - Fri, 01 Sep 2017 13:12:10 EST ID:P6PS9CBz No.37173 Ignore Report Quick Reply
I would agree with the above poster. Variants on "TDD-lite" are far more common than real full-on TDD. I think that asserts are pretty widely used (due to their low cost, low maintenance approach), though complete integration tests and even widespread use of functional testing are much less common.
>>
John Sockleson - Mon, 11 Sep 2017 19:29:18 EST ID:9QSfnS0r No.37189 Ignore Report Quick Reply
It one of the things teams wholeheartedly agree on to do for "the next project" during an intense debugging session.
After that it becomes irrelevant again.

Well sort of, this stuff is usually done for code that's intended to be shared on your github curriculum, because you want people to know you can if you must.
>>
Jack Chobblebot - Tue, 12 Sep 2017 10:50:53 EST ID:MEaLO7ku No.37190 Ignore Report Quick Reply
1505227853286.jpg -(89762B / 87.66KB, 493x396) Thumbnail displayed, click image for full size.
>>37189
> Well sort of, this stuff is usually done for code that's intended to be shared on your github curriculum

The pretty well sums up the quality of my code. "Will anyone else else ever look at this code? If yes then pretty code, if no then garbage."
>>
David Blatherbury - Fri, 15 Sep 2017 02:43:23 EST ID:P6PS9CBz No.37191 Ignore Report Quick Reply
>>37190
Yep same here.
>>
Frederick Drovingcocke - Fri, 17 Nov 2017 22:51:43 EST ID:uWLieSb9 No.37235 Ignore Report Quick Reply
tdd?

everyone wants to do it and you'll get points in an interview for familiarity with it, but I've never actually seen someone really do it. it's like agile, lot of people want to do it, they just have no idea how to actually make it really happen.


Security, FTP and MITM attacks by Samuel Grandville - Wed, 11 Oct 2017 16:15:57 EST ID:fDdwArgq No.37213 Ignore Report Reply Quick Reply
File: 1507752957499.jpg -(83736B / 81.77KB, 883x431) Thumbnail displayed, click image for full size. 83736
I'm not going to perform any attacks whatsoever, I'm more interested about securing my server and learning more about possible attack scenarios. So pardon my stupid questions.

I'm not going to explain every detail why my current system uses technology x or protocol y, because I'm writing this on my phone and I don't want to write too much with this, so please, let's just assume!

My server acts as a FTP server. FTP credentials are transfered in plaintext, what are the possible ways to steal my precious FTP login credentials? I would assume that a MITM attack would be one of them? Does the attacker need an access to my server's router or to the router I'm logging in from? If I disable WiFi, what kind of attack vectors still exists?

Please do explain! Thanks for in advance!
>>
Alice Wullerbury - Wed, 11 Oct 2017 17:11:28 EST ID:4Jf4geC2 No.37214 Ignore Report Quick Reply
If you're connecting to the server over 3G wireless, then that's a lot more easily sniffable than 4G wireless is, and someone might be able to pull the plaintext FTP packets from that.

Otherwise, your workplace could sniff the packets (if you're connecting from work). Your work's or home's ISP could sniff the packets, and your server's ISP could sniff the packets as they come into the server itself.
>>
Rebecca Fuckingham - Wed, 11 Oct 2017 17:54:26 EST ID:BBXKtFPn No.37215 Ignore Report Quick Reply
>If I disable WiFi, what kind of attack vectors still exists?

That depends. When was your Windows 98 box last patched?
>>
Caroline Blackgold - Thu, 12 Oct 2017 00:36:17 EST ID:4Jf4geC2 No.37217 Ignore Report Quick Reply
There's also the gamut of typical attack vectors that might affect any computer system, such as somebody remotely compromising your router or hacking your operating system, or you accidentally getting some malware onto the same machine that you're using for FTP hosting.
>>
Albert Saddlelock - Thu, 12 Oct 2017 16:07:56 EST ID:fDdwArgq No.37218 Ignore Report Quick Reply
>>37214
Interesting, didn't know about that at all...
>>
Cedric Brookridge - Sat, 11 Nov 2017 22:19:13 EST ID:XBm2HhG+ No.37232 Ignore Report Quick Reply
>>37213
>FTP credentials are transfered in plaintext, what are the possible ways to steal my precious FTP login credentials?

  1. As you mentioned, an MITM attack
  2. Any attack that can actively listen in on your connection (including a spliced cable)
  3. Direct password attack(bruteforce or dictionary)
  4. hacking other weak points on your server (like VNC,RDP,SSH and so forth)

>Does the attacker need an access to my server's router or to the router I'm logging in from?

not nescessarily, as long as the proper ports are opened or forwarded. As long as a given TCP/UDP port is opened to the net, it can be exploited.

> If I disable WiFi, what kind of attack vectors still exists?
All of them, except those that apply specifically for wifi...


Website by notavailableanymore - Sun, 08 Oct 2017 16:41:03 EST ID:MaIITRSI No.37212 Ignore Report Reply Quick Reply
File: 1507495263354.png -(9099B / 8.89KB, 800x800) Thumbnail displayed, click image for full size. 9099
my first website ever, www.notavailableanymore.com


C++: TRY-CATCHING for Bounds by Nicholas Blacklock - Thu, 03 Aug 2017 20:40:54 EST ID:HsZblEoz No.37132 Ignore Report Reply Quick Reply
File: 1501807254829.png -(32495B / 31.73KB, 500x386) Thumbnail displayed, click image for full size. 32495
Hay PROG!
With C++, I'm doing a lot of computation with arrays/vectors and always running into bounds/BAD_ACCESS errors. I'm here to ask if using try-catch blocks to handle these guaranteed thrown exceptions is a good idea.

You can find my code snippet at https://pastebin.com/uWM3MXxs
7 posts omitted. Click Reply to view.
>>
Phoebe Chimblewell - Mon, 07 Aug 2017 23:38:55 EST ID:JneGddQE No.37142 Ignore Report Quick Reply
>>37141
well since you told me not to think about it, I wanna think about it now. Care to explain??
>>
Rebecca Crunderned - Tue, 08 Aug 2017 02:41:20 EST ID:P6PS9CBz No.37143 Ignore Report Quick Reply
Often times try-catch semantics are more expensive than a simple if-check. The reason for this is because of all the work that modern operating systems have to set up in order to make try-catch blocks work. When an exception is thrown, what tends to happen is that the processor's hardware exception interrupt vector is triggered (which punts you over to kernel-mode to handle it). When the interrupt vector determines that this is a software-initiated exception, it hands the exception off to the OS kernel to handle. Then when the OS kernel deems that this exception isn't one the special kernel software interrupts, it hands it off to the usermode program's exception handler. After all of that, your program goes into a special mode where it gets the chance to handle the exception or get force-exited by the OS. That's *a crapton* more work that the processor has to do versus a simple if-check.
>>
Jack Heshfield - Tue, 08 Aug 2017 18:32:03 EST ID:akqfogJa No.37144 Ignore Report Quick Reply
>>37143
That's not how exceptions are always handled. It's a different story for every implementation, but in general the catch can stand around looking dumb for a long time.
>>
Charles Gallylat - Thu, 24 Aug 2017 17:54:54 EST ID:9QSfnS0r No.37166 Ignore Report Quick Reply
>>37143
That may be true, but I doubt that modern compilers won't optimize exceptions you handle yourself to the point where there's practically no difference because 99% of the time you already know exactly which exceptions you want to catch in which order at compile time.
>>
Fanny Wondleson - Sat, 07 Oct 2017 16:29:47 EST ID:JfbkjUm/ No.37211 Ignore Report Quick Reply
>>37143
Yep.
But if you know that the exception will happen infrequently, and you have a lot of if's, then it's possible that all branch mispredictions you might get add up to an even greater penalty. As you say, unless it's performance critical it's not worth thinking about.
And if it is performance critical, the only way you'll know is by measuring.


my little project by Henry Hondledock - Mon, 02 Oct 2017 10:12:55 EST ID:JLm2mO7q No.37207 Ignore Report Reply Quick Reply
File: 1506953575466.png -(119125B / 116.33KB, 407x409) Thumbnail displayed, click image for full size. 119125
is it possible to make a file automatically open after downloading (any brower)?
>>
William Hickleshit - Mon, 02 Oct 2017 19:16:15 EST ID:gezKXAce No.37208 Ignore Report Quick Reply
>>37207
Sure, in Firefox, you can go to about:preferences#applications and set up what you want to happen.
In Chrome, after you download a file, you can click the little arrow beside it and choose to always opens files of this type.


School Project by Thomas Sanningstock - Sat, 30 Sep 2017 20:59:23 EST ID:33yd9LRh No.37201 Ignore Report Reply Quick Reply
File: 1506819563741.jpg -(16329B / 15.95KB, 290x290) Thumbnail displayed, click image for full size. 16329
Soo.. I'm soon going to start working on my school project and I've decided to make DIY electric drums. I'll use piezo senzors. The problem I'm having is how should I connect 4-6 drum pads to my computer and what program to use... I'd be very glad if u could help me out with this one progs ;)
>>
Eliza Lightdock - Sun, 01 Oct 2017 04:32:59 EST ID:P6PS9CBz No.37202 Ignore Report Quick Reply
Grab some simple piezo sensors and wire 'em up to your Arduino, then wire your Arduino up to your computer. All the common Arduino boards have 6 analog inputs. Write a simple program that reads analog values from these analog inputs and detects beats, then simply send the beats (also probably with their beat amplitudes) from the Arduino to your computer and have the computer do whatever you want with the info.


C++ delete not working on (I believe) allocated pointer by Matilda Bandlechutch - Wed, 27 Sep 2017 21:44:16 EST ID:5sC0bueS No.37196 Ignore Report Reply Quick Reply
File: 1506563056371.jpg -(111717B / 109.10KB, 1920x1080) Thumbnail displayed, click image for full size. 111717
Sup my people, I come here, humbly, once again to seek your guidance of C++.

I'm trying to implement my own linked list in a search algorithm and am running in to memory leaks. I define a node struct, create a 4 element array of pointers (because of the search algorithm), use new to fill those pointers, add those pointers to a linked list, and then create 4 new elements using the same array of pointers. HOWEVER, when I go to iterate through the list later to delete everything, I get an error saying:

malloc: *** error for object 0x7fff5fbfe4f0: pointer being freed was not allocated

I don't understand why I saying it was never allocated? Here is some of the code highlights and I'll also paste a link to the full code on pastebin:

//USING NEW TO (ALLOCATE?) NEW MEMORY (THIS IS IN A LOOP)
list_node* neighbors[4]; //The FOUR neighbors
neighbors[0] = new list_node;
*neighbors[0] = {nullptr, nullptr, q, (q->x)-1 , q->y , 9999, 9999, 9999};
neighbors[1] = new list_node;
*neighbors[1] = {nullptr, nullptr, q, (q->x)+1 , q->y , 9999, 9999, 9999};
neighbors[2] = new list_node;
Comment too long. Click here to view the full text.
>>
Eugene Hillynore - Wed, 27 Sep 2017 22:29:49 EST ID:gezKXAce No.37197 Ignore Report Quick Reply
>>37196
At the start of your code

list_node temp = {nullptr, nullptr, nullptr, x1, y1, 0, 0, 0};

need to use new there
>>
Matilda Bandlechutch - Thu, 28 Sep 2017 19:36:34 EST ID:5sC0bueS No.37198 Ignore Report Quick Reply
1506641794371.png -(807B / 807bytes, 48x48) Thumbnail displayed, click image for full size.
>>37197
Holy shit, that worked! Thank you so much.

I forgot to initialize the very first node with new and delete somehow knew. Does that function check the address and it's able to tell what's on the heap or something?
>>
Thomas Brindleworth - Thu, 28 Sep 2017 23:13:20 EST ID:gezKXAce No.37199 Ignore Report Quick Reply
>>37198
I believe calling delete on something not created with new is undefined, so it depends on your compiler.
>>
George Senningstone - Fri, 29 Sep 2017 13:08:19 EST ID:P6PS9CBz No.37200 Ignore Report Quick Reply
>>37198
At least on Windows with the debug CRT there's a mechanism built in to detect you calling delete or free on a pointer that did not come from the current process heap. You can easily do this in constant-time by simply checking the address against the lower and upper address bounds of your heap region.


<<Last Pages Next>>
0 1 2 3 4 5 6 7 8 9 10 11 12 13
Report Post
Reason
Note
Please be descriptive with report notes,
this helps staff resolve issues quicker.