Hacker Newsnew | past | comments | ask | show | jobs | submit | more neur0mancer's commentslogin

In certain CTF, for example SQL injection challenges, the target webpage returns 418 to make more difficult the success of blind injection scripts (they will fail randomly, so you have to check that the return code is weird and retry)


Still, game updates are working (i.e., L4D2)


Fortunately, you are wrong: http://itch.io/browse/platform-linux


Its very easy to be wrong on this one, since there are 2 buttons for "win" and "mac", and none for linux


The linux button is not visible on the top if your resolution is too narrow, It's the least clicked button so I chop it off first. As for whether this is a good idea probably not.


Great work leafo!

I just "reposted" this here, because i didn't know this cool website.


I'm happy to see another DRM-free game marketplace/store.


scribd link seems to be broken




Good catch, thank you! I've just deployed a fix for this.


Great idea! I hope others will follow your example.

Btw, could you clarify exactly which type of licence you are using (https://github.com/paf31/initialround/blob/master/LICENSE). Is it something like BSD?


Yes, I finally decided to go with the BSD license, since I'd like to enable people to benefit from this, which might mean being able to add new tests without revealing the model answer :)


"Distributed under the terms of the BSD 3-clause License."

It was clarified in the README. My bad.


Magazines are crap. Why we should care?


I tried it. Unfortunately, it is very slow.


It is. But that one time when you will be dealing with a Heisenbug, you will be thankful for it.


The thing with Heisenbugs is that they usually don't happen when you attach a debugger.


That kind of depends. They can also happen not because you attached a debugger but because you set a break point in a particularly unfortunate location.


Oh man. I spent a couple of days tracking one of those down. When the light went on in my head I felt like such an idiot.


This.


GDB reverse debugger is very slow as it is saving the execution state after every instruction executed. There is a commercial plugin for GDB reverse debugger: UndoDB. It is much faster than just GDB (they claim only 1.7x slowdown), but unfortunately not very stable for the product I'm working on.


I'm a co-founder of the company. Lots of stability improvements over the past year or so: I'd urge you to try it again. Particularly v4 beta. Send email to beta@undo-software.com to get a beta license.

I'd never claim it's perfect: it's software after all, and the fact most software has bugs is why we have a business in the first place ;) But we're used by some pretty hardcore folk these days, including Cadence, NASA, and some of the biggest banks in the world. And the PyPy guys seem pretty happy :) Oh, and of course, if you do find issues, please do report them to support@undo-software.com -- then we can fix them.


The paper with some explanation about the proof is here: http://arxiv.org/pdf/1308.4526v4.pdf


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: