Hacker News new | past | comments | ask | show | jobs | submit | pedro84's comments login

RE: #2, would "wait $(jobs -rp)" work for you?


You learn something new every day. I had a quick look [1], seems quite usable!

[1] https://www.linuxjournal.com/content/job-control-bash-featur...


$ ls -l /usr/bin | awk '$5 > 50000000'

-rwxr-xr-x 1 root root 51859776 Jan 26 2018 pandoc


can you do that with netstat? :) (ls was one of the more simple parsers to write, aside from some corner cases)


http://www.openssh.com/txt/release-8.3

To check whether a server is using the weak ssh-rsa public key algorithm, for host authentication, try to connect to it after removing the ssh-rsa algorithm from ssh(1)'s allowed list:

ssh -oHostKeyAlgorithms=-ssh-rsa user@host

If the host key verification fails and no other supported host key types are available, the server software on that host should be upgraded.


This is a little more awk-ish:

awk -F, '$2 == "F" {$0=(($1-32)*5/9)",C"} {print}'


I love awk too but most people don't know much of awk. Better use regular things and keep awk for whenever you absolutely need it.


Qualys re-posted their writeup and included the details that had previously been left out:

https://www.openwall.com/lists/oss-security/2019/06/06/1


> We then tell git bisect to run the command lein test on each commit until the command exits with a 0 exit code, indicating that we’ve found the first broken commit.

According to git-bisect(1), "the script should exit with code 0 if the current source code is good, and exit with a code between 1 and 127 (inclusive), except 125, if the current source code is bad."


I learned from The AWK Programming Language:

https://news.ycombinator.com/item?id=13451454



https://twitter.com/i41nbeer/status/1004130737174515712

""" The trigger is here: https://bugs.chromium.org/p/project-zero/issues/detail?id=15... … If you're in to iOS exploit dev take a go at it and blog about it! I'll publish what I have soon, hopefully this week. """


Wow, the thread seems to have attracted a bunch of people that think all that needs to happen is for someone to sneeze the right way on the exploit and it'll promptly turn into a perfectly-polished jailbreak app.

Kind of depressing :(



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: