Editing Talk:2347: Dependency

Jump to: navigation, search
Ambox notice.png Please sign your posts with ~~~~

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 70: Line 70:
 
:Based on [https://www.reddit.com/r/programming/comments/8iyqk9/the_thirty_million_line_problem/ related discussion], that's a VERY bad video: he may have a point, but it takes VERY long time before he gets to it. I'm not going to watch it that long myself. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 00:03, 19 August 2020 (UTC)
 
:Based on [https://www.reddit.com/r/programming/comments/8iyqk9/the_thirty_million_line_problem/ related discussion], that's a VERY bad video: he may have a point, but it takes VERY long time before he gets to it. I'm not going to watch it that long myself. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 00:03, 19 August 2020 (UTC)
  
:This reminds me of that old joke: If carpenters built buildings the same way programmers made programs, the first woodpecker that came along would destroy civilization. {{unsigned ip|162.158.106.160|14:29, 19 August 2020}}
+
:This reminds me of that old joke: If carpenters built buildings the same way programmers made programs, the first woodpecker that came along would destroy civilization.
::(Known as "Weinberg's Law" from 1971 "Psychology of Computer Programming", G.M. Weinberg [https://quoteinvestigator.com/2019/09/19/woodpecker/] ) {{unsigned ip|172.68.126.139|23:37, 20 January 2024}}
 
  
 
: I thought the drawing looks more like the [[w:Jenga|Jenga]] game, except the components are not simple rectangles. [[User:Barmar|Barmar]] ([[User talk:Barmar|talk]]) 16:31, 20 August 2020 (UTC)
 
: I thought the drawing looks more like the [[w:Jenga|Jenga]] game, except the components are not simple rectangles. [[User:Barmar|Barmar]] ([[User talk:Barmar|talk]]) 16:31, 20 August 2020 (UTC)
Line 77: Line 76:
 
== "Famous" Left Pad Incident ==
 
== "Famous" Left Pad Incident ==
 
The "famous" left-pad incident in JavaScript's package manager could use some elaboration for those of us for which it isn't. [[Special:Contributions/162.158.107.89|162.158.107.89]] 02:42, 19 August 2020 (UTC)
 
The "famous" left-pad incident in JavaScript's package manager could use some elaboration for those of us for which it isn't. [[Special:Contributions/162.158.107.89|162.158.107.89]] 02:42, 19 August 2020 (UTC)
 
 
* Aaaaand that's why i'll never use kik [[Special:Contributions/172.70.251.108|172.70.251.108]] 09:47, 17 June 2022 (UTC)
 
  
 
== Log4j Zero-Day Vulnerability (CVE-2021-44228) Incident==
 
== Log4j Zero-Day Vulnerability (CVE-2021-44228) Incident==
On December 9, 2021, security researchers discovered a flaw in the code of a software library used for logging. The software library, Log4j, is built on a popular coding language, Java, that has widespread use in other software and applications used worldwide. This flaw in Log4j is estimated to be present in over 100 million instances globally. If exploited, could permit a remote attacker to execute arbitrary code on vulnerable systems. This library had one maintainer who lived in the outback.
+
On December 9, 2021, security researchers discovered a flaw in the code of a software library used for logging. The software library, Log4j, is built on a popular coding language, Java, that has widespread use in other software and applications used worldwide. This flaw in Log4j is estimated to be present in over 100 million instances globally. If exploited, could permit a remote attacker to execute arbitrary code on vulnerable systems.
  
 
== Loadsharers ==
 
== Loadsharers ==
Line 92: Line 88:
 
==NTP==
 
==NTP==
 
The [https://www.informationweek.com/it-life/ntp-harlan-stenn-and-an-uncertain-future-readers-react/d/d-id/1319521 Network Time Protocol] is also a great example. --[[User:Slashme|Slashme]] ([[User talk:Slashme|talk]]) 21:50, 19 August 2020 (UTC)
 
The [https://www.informationweek.com/it-life/ntp-harlan-stenn-and-an-uncertain-future-readers-react/d/d-id/1319521 Network Time Protocol] is also a great example. --[[User:Slashme|Slashme]] ([[User talk:Slashme|talk]]) 21:50, 19 August 2020 (UTC)
 
 
== Explain “maintenance” ==
 
What this article does a poor job of is explaining what software “maintenance” is. Software doesn’t usually disappear (despite the several cases mentioned in the article which are kind of beside the point). It also doesn’t rust or wear out  like a car. But software usually needs to be continuously updated to fix security vulnerabilities or to keep it compatible with other software. Also it can get new features or bug fixes. And if the guy in Nebraska doesn’t do a good job of it, everyone has a problem.
 
 
Also worth mentioning is how the comic highlights the absurdity of this anarchic communism. Neither users (capitalism) nor the government (socialism) is paying these people. And somehow it works 95% of the time. Except when it doesn’t.
 
 
== Duplicity ==
 
Saw this cartoon and immediately thought of the backup software Duplicity, which comes with Ubuntu (using Deja-Dup interface). Big shout-out to Kenneth Loafman for keeping it running! [[Special:Contributions/108.162.238.124|108.162.238.124]] 16:06, 7 February 2024 (UTC)
 
 
== xz Backdoor ==
 
The xz backdoor has brought up an even more disturbing ramification of this situation, which is that a malicious entity (e.g. a nation-state) can create a persona (or multiple), build trust with the random guy maintaining the library since 2003, eventually take over the project, then implant a backdoor that targets core software like OpenSSH.  '''The only reason we just avoided one of the largest cyber incidents in history is because one guy running Debian Sid noticed sshd using a ''bit'' more CPU than normal while he was benchmarking something completely unrelated.'''  The implications here are '''terrifying'''.
 
[[Special:Contributions/172.70.210.131|172.70.210.131]] 20:02, 30 March 2024 (UTC)
 
 
:I wonder how many times that has already happened. Not *if*, but how many times. See also the title text of  [[2057:_Internal Monologues|xkcd 2057 (Internal Monologues)]]. [[Special:Contributions/172.70.46.34|172.70.46.34]] 14:24, 8 May 2024 (UTC)
 

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)

Templates used on this page: