Here's a fascinating look at the first IBM PC 5150, from my friend David who wrote the training documentation.
I had missed that AWS discussed how they use #eBPF to implement network policies, optimize TCP performance, and reduce Lambda function cold starts.
Recording: https://youtu.be/pVJHljuz1F0
Microsoft breaking a bunch of dual-boot systems by revoking insecure versions of grub during a standard Windows update is, uh, not great and was not supposed to happen, but it's worth mentioning that systems broken by this were running known insecure bootloaders and anyone running a distro that's actually on top of security updates was unaffected
(Edit to add: I wasn't terribly clear here. It's not the user's fault if their distro fails to deal with this, it's the distro's)
permissions
Permalink: https://wizardzines.com/comics/permissions/
Since https://github.com/RustScan/RustScan claims to be fast I tried first a trivial SYN scan to my file server:
sudo nmap -sS -p- haaparousku
I got the list of ports in about one second (bit more or less). Then I tried rustscan and got bored enough to finally SIGINT it:
rustscan --addresses haaparousku
Not sure I get the improvement here… Also command-line is not “tactile :-)
Something definitely to improve in Rust command-line apps is not to think arguments as an object tree that you feed into clap crate. That’s just lazy.
Instead a better metaphor for a great command-line interface is something like a game pad that you can “play” easily. That’s why nmap has been relevant for decades.