[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

/dpt/ - Daily Programming Thread

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 325
Thread images: 28

File: prog.jpg (105KB, 473x496px) Image search: [Google]
prog.jpg
105KB, 473x496px
What are you working on, /g/?

Old thread: >>61211816
>>
first for C++!
>>
>>61218633
Don't use CMAKE you FOOL.
>>
playing with C#, ASP.NET MVC and Entity Framework, also Unity now
lots of fun, microsoft got it right this time
>>
File: 123939.jpg (52KB, 931x218px) Image search: [Google]
123939.jpg
52KB, 931x218px
third for /g/entooman goes to college
>>
File: old_hag_langs.png (173KB, 600x355px) Image search: [Google]
old_hag_langs.png
173KB, 600x355px
>>61218641
Second to C.
>>
File: 1481768064000.jpg (714KB, 2774x1993px) Image search: [Google]
1481768064000.jpg
714KB, 2774x1993px
>>61218623
I am making a new encryption application, what hash function should I use for the encryption? :3
>>
>>61218653
sounds like insecure teacher who hates being challenged and having his inadequacy exposed
>>
>>61218649
This
>>
>>61218655
You should support all of them and let the user decide, default to the most secure one.
>>
>>61218649
What's wrong with CMake?
>>
>>61218684
Thanks but what hash function exactly should be the default one?
>>
>>61218686
introducing unnecessary complexity to very simple tasks.
>>
>>61218707
It's a hell of a lot less complicated than autotools
>>
>>61218699
the most secure one you dumb fuck.
>>
>>61218738
And which one is that? You dumb fuck.
>>
>>61218727
>because shit tool is shit, I justify this other shit tool
>>
>>61218744
Call Scheineder and ask, dumb fuck.
>>
>>61218749
What's better and has the same wide level of functionality, then? Oh, that's right, nothing.
>>
>>61218768
He will shill his own though.
>>
File: you.jpg (11KB, 238x212px) Image search: [Google]
you.jpg
11KB, 238x212px
>>61218771
>cmake
>functionality
>>
>>61218787
Either you trust him or you can only trust youself in which case you shoudn't be on /g/ but researching some serious math.
>>
File: netrunner s.png (91KB, 1356x300px) Image search: [Google]
netrunner s.png
91KB, 1356x300px
>>61218623
We are making a web browser!
>>61218741

Come and join the devs in the IRC.
>>
G code. Random stuff
>>
given up and writing everything in javascript
>>
javascript maps and sets are useless
>>
given up and writing eveything in C.
>>
>>61218981
Javascript is garbage from top to bottom.
>>
considering implementing a useful hashmap in javascript to replace the default map object
>>
File: as3_is_best_language.jpg (162KB, 899x942px) Image search: [Google]
as3_is_best_language.jpg
162KB, 899x942px
>>61218623
>What are you working on, /g/?
Proving that AS3 is best language
Pic related: Proof
>>
>>61218671
Not him but to be fair if I were that professor I'd be concerned too.
A classroom isn't a forum, it's a place of informational service. If you want to argue about semantics until you really understand something in your own way that might even be superior to the way your educator understood it, the kind of educator you need is a tutor, not a teacher. Teaching is just glorified, somewhat digestible info-dumping. That's what they pay us for, that's what we do, and if you try to get more than that out of us, you're cheating the rest of the class. You're here to learn, not to understand. You wanna understand? See me after class, or better yet go to fucking Google.
>>
>>61219067
nothing implemented in javascript is useful
>>
>>61219082
>public class
all i see is Java trash
>>
>>61219082
this is the proof of the negation
>>
>>61219082
>Using 4 conditionals for combinations of string/num instead of just converting conditionally and returning the add
You're only showing you write inefficiently
>>
>>61219090
classes that arent interactive in the traditional sense are trash.
And teachers that cant handle autists shouldnt be teachers.
>>
>>61219139
>he dosent consider how the flash bytecode works
Using several conditionals improved performance
Dont ask me how, it just did
>>
>>61219148
Stop being disruptive in class or leave.
>>
>>61219162
Probably because the way you wrote it the first time was bad too
>>
>>61219181
Okay Rust-sama, gomen.
>>
>>61219148
>classes that arent interactive in the traditional sense are trash.
I'm inclined to agree, but that's what you get when you go to a cheap ass school and share a class with a few hundred other people. Any good stuff is trash if you spread it thinly enough.
>>
>>61218671
>>61219148
This
Also
>head of the department makes the opening speech
>1 gorillion mistakes
Keeping myself from exploding was painful.
>>
>>61219207
>Keeping myself from exploding was painful.
See a doctor, that's not normal.
>>
>>61219184
Probably.
But show me an example of quality actionscript code. I dare you. The language fights back, man, nothing makes sense.
>>
>>61219198
Classes are a starting point. Want to know more? Hit the books.
>>
>>61219184
Also, since you're easily triggered:
public class Vec3 
{
public var x:Number = 0;
public var y:Number = 0;
public var z:Number = 0;
private var vec:Vector.<Number>;

public function setX(f:Number):void { x = f; vec = new Vector.<Number>; vec.push(x, y, z) ;}
public function setY(f:Number):void { y = f; vec = new Vector.<Number>; vec.push(x, y, z) ;}
public function setZ(f:Number):void { z = f; vec = new Vector.<Number>; vec.push(x, y, z) ;}

public function getVector():Vector.<Number>{return vec;}
public function overwriteValues(x:Number, y:Number, z:Number):void
{ vec = new Vec3(x, y, z).getVector(); }
public function Vec3(x:Number, y:Number, z:Number)
{ this.x = x; this.y = y; this.z = z; vec = new Vector.<Number>; vec.push(x, y, z); }

}
>>
>>61219223
>caring about quality is unhealthy
No pajeet
>>
>>61219224
>show me an example of quality actionscript code
I can't. I need to just drag down other people to feel better about myself. I'm sorry this is just how it has to be.
>>
>>61219262
Can you really not do:
public var,y,z:Number = 0;
>>
>>61219268
>caring
>getting so upset that you feel physical pain
They're not the same thing.
>>
>>61219287
A lot of languages dont allow same-line assignments like that. Most allow shit like
public var y,z,:Number
but not assignment as well
>>
>>61219285
Gotcha, like the rest of us then
>>61219287
You can, but the example was meant to be bad
>>
>>61219305
Do you not understand the concept of an expression?
>>
>>61219322
>but not assignment as well
then its a shit language.
>>
if your language cannot handle infinitely long lists, it is a shit lang
>>
>>61219334
No. I don't know what an expression is.
>>
>>61219382
var list:List = new List();
while(1) list.append(0);
>>
>>61219382
you mean lazily evaluated infinite sets?
>>
>>61218655
An encryption of what ?
And what it has to do with hash function ?
>>
>>61219382
Your language also cant come to a halt and hang when working with said list either :^)
>>
>>61219434
>An encryption of what ?
Data

>And what it has to do with hash function ?
I will use the hash function to encrypt the data.
>>
>>61219382
Any languages can given infinite memory.
>>
>>61219436
https://www.idris-lang.org/
>>
>>61219491
way ahead of you lad.
idris is love.
>>
>>61219447
By definition, a hash function (!= encryption function) gives you a fingerprint of your data. md5 and sha1 are examples of hash functions.

So, you need an encryption algorithm. The next question is: symmetric, or not ?
Do you want to use the same key both at encryption and decryption ? (Adapted for storing personal files)
Or do you want to send data to other persons ?
>>
>>61219382
>infinitely long lists
???
(define (infinitely-long-list-of-n+1 x) (+ x 1))
>>
>>61219491
havent seen a single useful idirs program on here, ever
>>
imagine using a language in which non-empty lists are not simply
Cofree Maybe
>>
File: 1481209717627.jpg (223KB, 350x447px) Image search: [Google]
1481209717627.jpg
223KB, 350x447px
>>61219521
Are you saying that you can't use a hash function to encrypt your data anon? Because if so this is wrong as it makes no sense.

>The next question is: symmetric, or not ?
Symmetric

>Do you want to use the same key both at encryption and decryption ?
Yes
>>
>>61219382
>>61219594
I made a mistake, it should be

case class List[A](head: A, tail: => List[A]) {
def ::(that: A): List[A] = List(that, this)
def ++(that: List[A]): List[A] = this
}
>>
>>61219554
>Are you saying that you can't use a hash function to encrypt your data anon?
That's exactly what I say.
A hash function gives you a hash. Its purpose is to have a checksum value with a fixed length.

> Symmetric

AES 256 is the industry standard today.
>>
>>61219661
>That's exactly what I say.
This makes absolutely no sense though. Hash functions are used all the time for encryption.

>AES 256 is the industry standard today.
It's an old algorithm with all kinds of bad design decisions.
>>
>>61219554
>Let me encryot my data by doing a one-way operation
>Now lets just get that back real qui... oh
>>
>>61219683
>>Let me encryot my data by doing a one-way operation
It's not one-way though. If it was one-way it would not be called encryption.
>>
>>61219615
>I made a mistake
Your life was a mistake
>>
>>61219694
>Hurr durr im gonna encrypt my shit with hashes
>Dosent look up what hashes are
https://en.wikipedia.org/wiki/Hash_function
>>
>>61219712
I know what hashes are though, no need to link the wiki.
>>
>>61219719
Apparently not
>>
>>61219719
Then you should know they are specifically one way
Any function that is not one way is by definition not a hash function
>>
>>61219728
Nice trolling, asshole.

>hashes are used for encryption all the freaking time
>haha, they are not lol --you

>>61219733
Hashes are one way, encryption with them isn't however.
>>
>>61219741
>Hashes are one way, encryption with them doesn't happen however.
ftfy
>>
>>61219741
>Hashes are one way, encryption with them isn't however

Your logic just evaporated.
Function A has property B, therefore doing action C with function A must adhere to property B
>>
>>61219752
Encryption with cryptographic hashes happens all the time, why are you lying?
>>
>>61219741
Then, how do you encrypt data with hash encryption ?
Try encrypting a file with sha256, and gives us the result
>>
>>61219741
>A hash function is any function that can be used to map data of arbitrary size to data of fixed size

>Hashes are one way, encryption with them isn't however.

You're a moron.
>>
>>61219759
>cryptographic hashes
Do not exist
>>
File: dumbo.jpg (28KB, 407x119px) Image search: [Google]
dumbo.jpg
28KB, 407x119px
>>61219759
>Encryption with cryptographic hashes happens all the time, why are you lying?
kek
>>
>>61219767
https://en.wikipedia.org/wiki/Cryptographic_hash_function
>>
y'all need to learn what an HMAC is
>>
>>61219780
That still adheres to general hash principles you fucking moron
>>
>>61219758
>Function A has property B, therefore doing action C with function A must adhere to property B
This is wrong in the real world.

>>61219764
>>A hash function is any function that can be used to map data of arbitrary size to data of fixed size
And we use that property to encrypt with them.

>>61219762
Sure, assuming ascii and the key "key" it will be 0xe2

>>61219764
How am I wrong?

>>61219767
What is sha1 then?

>>61219778
Hashes can still be used for encryption.
>>
>>61219767

cryptographic hashes != encryption
They are used to prove a specific data is correct (not corrupted nor modified by an attacker). What makes them "cryptographic" is the fact that they can't be falsified.
>>
File: retard.jpg (46KB, 1405x116px) Image search: [Google]
retard.jpg
46KB, 1405x116px
>>61219829
Oy vey
>>
>>61219818
https://en.wikipedia.org/wiki/K%C3%BCbler-Ross_model
>>
>>61219829
>Sure, assuming ascii and the key "key" it will be 0xe2
*to encrypt "a"
>>
>>61218655
What is the purpose of the hash function in your program? In general, SHA-256 is more than enough, but if you are paranoid, use SHA-512. For key derivation, use scrypt.
>>
>>61219832
Cryptographic hashes can still be used for encryption.

>>61219839
Yes? What are you trying to prove?

>>61219844
>What is the purpose of the hash function in your program?
To encrypt the data.
>>
>>61219853
>Yes? What are you trying to prove?
Are you blind?
You litteraly linked a page calling even cryptographic hashes for one-way functions
Are you actually mentally challenged?
>>
>>61219829
>And we use that property to encrypt with them.
You can't encrypt with a function that maps to data of fixed size. An encryption function must be injective.
>>
File: CS5iZFFVAAAi_Mz.jpg (66KB, 590x772px) Image search: [Google]
CS5iZFFVAAAi_Mz.jpg
66KB, 590x772px
>>61219868
disagree
pic related
>>
>>61219868
>You litteraly linked
I linked nothing to nobody/

>cryptographic hashes for one-way functions
Cryptographic hashes are one-way functions, I don't disagree. This does not stop them from being used for encryption.
>>
>>61219877
The real world disagrees with you.
>>
>>61219886
Do you not know what a one-way function is?

Do you get stopped while driving a lot?
>>
my mentor for my senior honors project just gave me the dataset for classifying lung cancer tissues as cancerous or not. it's 90 images. i messaged him about it and he sent me a fucking kaggle link to a completely unrelated type of lung cancer identification with completely different types of images and said to "study what these people did" and try to replicate it. i know more than this fuckhead knows and 90 images is shit. i can't believe this, genuinely i can't believe this is real life
>>
File: irefuse.png (206KB, 321x423px) Image search: [Google]
irefuse.png
206KB, 321x423px
>>61219881
You're either living breathing bait.
Or retarded.
But im autistic so i have to keep arguing with you, cause you seem to have hit your head on something.

Your links explain that hashes need to be one-way to be secure, which makes sense, as they literaly just take an input and produce an output, and the output for any given input will always be the same for that input.

You cannot, however, use that shit for encryption. You may use it to validate data, but not encryot data. Unless your plan is using the hash of the data as the key or seed for some encryption algorithm
>>
How do I impress accounting qt gals? I feel like they don't take us programmers seriously, my older peers settled with ugly females from academia and I don't want that
>>
Since all of you are dumb fucks that have no idea how hash functions work, read up on Salsa20, CTR mode as well as sponge functions.

CTR: Ciphertext_{counter} = H(key \| nonce \| counter) \oplus Plaintext_{counter}
Salsa20: https://cr.yp.to/snuffle/design.pdf
Sponge: http://sponge.noekeon.org/

As you can see, hash functions can and are used all the time for encryption.

>>61219916
>Do you not know what a one-way function is?
Yes, I do. It seems however that you are too dumb to understand how hash functions can be used however.
>>
>>61219946
>look! I used a hash to generate a nonce! therefore hashing is used for encryption!
>>
>>61219886
Either you're a troll, you wrongly use the word "hash" when you shouldn't, or you have a misunderstanding of how encryption works
>>
>>61219946
One of those is a mix between a cipher and a hash
Another is just straight-up a hash

your point?
>>
>>61219886
Even though it's possible, I wouldn't recommend it but if you insist, SHA-512 is a good choice. Hash functions aren't designed for data encryption, therefore they aren't really tested in that way.

>>61219908
Not him, but he is right, you can encrypt data with hash functions. For example, you choose a randomly generated key, and concat it with a counter, and compute the hash, then xor the values with the plaintext.
>>
>>61219962
>I used a hash to generate a nonce
Nobody did that in any of the things that I linked. That would be the case if I had linked poly1305, but I haven't. In all of these algorithms hashes are used for encryption.

>>61219963
It seems that you are talking about something that you have no idea about, see >>61219946 and try to avoid doing it in the future.
>>
>>61219946
dumb european

this is why all major CS research is done by americans and brits
>>
>>61219946
OK, hash functions are used during encryption.

But that not the hash function that encrypt the data. The hashing part is just a part of the salsa20 encryption algorithm.
>>
>>61219975
>For example, you choose a randomly generated key, and concat it with a counter, and compute the hash, then xor the values with the plaintext.
That isnt hashing it tho, that is utilizing the hash, which is fine
>>
>>61219988
>Jewmerican CS dominates
No wonder all our tech is overpriced and backdoored you fuckin crypto
>>
anyone got a good book for a compilers class? want to look at one ahead of time so i don't get fugged when i start the class.
>>
dumb retard here.
I managed to parse doubles out of strings, but hyphens keep kicking my butt and cause a numberformatexception.
What can I do to make it work anyways?
I have read about the string split(regex, int);
practically, with each line, it looks for the regex, and how often, then splits them up.
Should be easy, but then again, I need the doubles AND the locations, aka Strings.
How do I put these then into their respective arrays?
>>
>>61219971
CTR mode can take any cipher or hash
Salsa20 is a hash
The sponge construction as well as duplex the duplex construction make hashes on top of compression functions.

>>61219988
Britain is in Europe.
Also, DJB is American (you know, the creator of Salsa20)

>>61219993
>But that not the hash function that encrypt the data
And this is wrong. Also see the CTR mode, you can literally use any hash function for that.

>The hashing part is just a part of the salsa20 encryption algorithm.
Salsa20 is literally a loop of hashes.

>>61219975
>Hash functions aren't designed for data encryption, therefore they aren't really tested in that way.
A proper hash function has all the properties that a cryptographic cipher should have while the reverse is not always true.

>>61219996
You are still using the hash for encryption.

It seems that /g/ has too many people who insist on talking about things they have absolutely no idea about.
>>
>>61219946
>conflating cipher modes and encryption
Standards have really slipped
>>
>>61220038
Are you retarded? I am making a point on how easily you can plug a hash into the CTR mode to encrypt using a hash.
>>
>>61220033
>Britain is in Europe.
Not for long!
>>
>>61220055
You're not using a hash to encrypt. You're using a cipher, probably AES.
>>
/dpt/ why do stupid brainlets think the FBI has some kind of cool hi tech military projects or something?
Our nation is great. I'm legally required to believe that and I do. Bit even great nations take a shit sometimes.
And you know what we do? You know what we fucking do? We clean up the shit.
We're your national fucking janitors. That's literally it.
You wanna know what the highly sensitive government secrets are? I obviously can't tell you, but I can give you the gist of it: it's precise data on every last smelly pile of garbage we clean up off this damn country.
That's all it is. Seriously. We get calls, we hear about trash, we clean up the trash, we write about it, we lock it away and call it a secret, we wait for more trash to roll in.
Fuck my fucking life. People should watch less TV.
Sorry, just had to rant.
>>
For all of you retards out there: Encryption with hash functions with things like CTR, OFB and CFB works by using a hash function that maps something into something else and then xoring the output with the plain text.

>>61220058
The UK was always in Europe and will always be in Europe.

>>61219988
By the way, I am studying in the UK.

>>61220068
I just showed how you encrypt WITHOUT using AES and by using only a hash function, try it.
>>
>>61220055
Using a hash to encrypt a dataset, as part of an algorithm or whatever, which is fucking fine, is not the same as encrypting with hash-functions. Its utilizing hashes. Is that so fucking difficult to understand?

data = get_data();
data_hash = hash(data); // Not encrypted
enc_data = encrypt(data_hash); // Encrypted

ffs, its not hard
>>
>>61220090
*how to encrypt
>>
>>61219988
That's why AES has been designed by americans ? Ho, wait ...

>>61220033
Either the whole world is wrong and you're right, or the other way. What do you think ?
What's you call a hash function isn't it.
>>
>>61220009
https://www.cs.princeton.edu/~appel/modern/
>>
>>61220090
Your cipher is xor.
>>
>>61220098
Are you claiming that encrypting with AES-CBC is not the same as encrypting with aes? lol
Also, as I said before, Salsa20 is a hash function and same applies for the sponge constructions.

>>61220126
What is your cipher in AES-CBC? Huh?

>inb4 AES
Double standards?

In truth my mode of operation is xor/ctr/whatever you want to call it, my cipher however IS the hash function.
>>
tfw last final in data structures course tomorrow then neet till october
what can I do something fun during this time? can I make a 2d game as a 2nd year cs student or does it take more time?
>>
>>61220136
A hash function cannot be a cipher.
>>
>>61219996
Yes, technically you just utilize the hash function as a random oracle.

>>61220033
>A proper hash function has all the properties that a cryptographic cipher should have
No. Just look at an unkeyed hash function like in the SHA family. SHACAL is vulnerable to related-key attacks, which would make an encryption algorithm broken.
>>
File: 1474920059891.jpg (45KB, 640x307px) Image search: [Google]
1474920059891.jpg
45KB, 640x307px
Hey, right now I am using AES-GCM to connect to 4chan but some retards in this thread claim that my cipher is xor.
LMAO
>>
>>61220156
So you *are* using AES? Earlier you said you weren't. Try getting a clue.
>>
>>61218652

.NET is solid as fuck.

They even sorted out the fucking mess of Entity and ASP Identity, and stopped pushing their shitty MS unit tests and finally accepted NUnit (becoming Xunit).

In fact the .NET ecosystem is so good I'm convinced its a subsection of Microsoft that held out and secured strong opt-outs from managerial interference of the rest of the company, and they threw the Windows OS under the bus to distract the meddlers while they knuckled down.
>>
File: kriittinen.jpg (41KB, 614x720px) Image search: [Google]
kriittinen.jpg
41KB, 614x720px
>>61220156
>2017
>*CURRENT_YEAR*
>USING AES
HHAHHAHAHAHAHHAHAHAHHAHAHAHAHAH
>>
>>61220136
Show me a hash function that can be decrypted without the original dataset
>Oh wait, its one-way
The neat thing about encryption, is that you can decrypt the data by using the same key as was used in the encryption process.
hashes dont work like that at all

in fact, thats what makes them useful
>>
>>61220155
Related-key attacks matter only if you have attacked-controlled keys which is extremely rare, usually the key is randomly generated.
Wasn't the AES256 attack also a related key attack?

>>61220168
Right now to connect to 4chan from my laptop? Yes
On the CTR pseudocode I posted above? No
Why is this thread filled with retards?
>>
>dumb euro goes to study in the UK
>misunderstands the course content because his English isn't as good as he'd like everyone to think
>posts on 4chan and misuses basic terminology
>wonders why everyone is disagreeing with him
>>
>>61220192
>Why is this thread filled with retards?
t. the retard staring into a hall of mirrors
>>
>>61220192
Now you're shifting the goalposts and arguing in bad faith.
>>
>>61220197
why's he even posting about this stuff on dpt? it's not even a security oriented general
>>
>>61220216
Probably got btfo when he tried arguing with security professionals, figured he might have better luck trying to fool amateurs
>>
File: proof.jpg (33KB, 394x142px) Image search: [Google]
proof.jpg
33KB, 394x142px
>>61220192
*cough*
>*cough*
>>*cough*
>>>*cough*
>>*cough*
>*cough*
*cough*
>>
File: 1475398740128.png (19KB, 1124x139px) Image search: [Google]
1475398740128.png
19KB, 1124x139px
>>61220184
I enabled AES just to post this example. I actually have it disabled and connect with chacha20 (a hash function) -poly1305 - 4chan actually supports that.

>>61220185
>Show me a hash function that can be decrypted without the original dataset
It's one way

>The neat thing about encryption, is that you can decrypt the data by using the same key as was used in the encryption process.
>hashes dont work like that at all
Please see >>61219946
I literally showed there how you can encrypt with hashes.

>>61220197
>proven wrong
>butthurt about it
Also, ukers are euros too.

>>61220213
How so?
I literally proved that you are wrong and that hash functions are used all the time for encryption.
>>
>>61220249
You can encrypt by USING hashes. You cannot encryot BY hashing.

This is the fucking simple thing you cant understand
>>
>>61220249
>>proven wrong
No such thing happened.
>>
File: 1482461127001.jpg (79KB, 702x1000px) Image search: [Google]
1482461127001.jpg
79KB, 702x1000px
>>61220240
CTR is two-ways and any retard can see that.
What are you trying to prove?

>>61220235
I just linked a paper from DJB that describes encryption with hashes. Are you claiming that dumb faggots on /g/ such as yourself know better than DJB?
It seems to me that you are trying to deny your ignorance by denying the reality
>>
>>61220276
If its two-way then it is by definition encryption, and not hashing
>>
>>61220268
What do you expect? He evidently has a very poor grasp of the English language.
>>
>>61220119
many thanks anon.
>>
Help me, what I am doing wrong with parsing this splitting this string into two, where one is parsed into a double, and the other into a string and each is assigned into their respective datatype arrays.
    //in the first line
String title;
// I think they are saying telling me to put the names after the numbers into the String Array
String[] locations;
//This one is about the barcharts.
double[] charting;
int count =0;
int idx =0;

DatafileReader(String filename){
//first, let's limit the size of the arrays to 100
locations = new String[100];
charting = new double[100];

//Now open the file and indiscrimenately printthem out. works
In.open(filename);
while (In.available()!=0) {
//now let'S try to put each line inside a String arraypoint.works.
String[] stuff = In.readLine().split(" ", 2);
charting[idx] =stuff[count].parseDouble(charting[idx]);
count++;
locations[idx]= stuff[count];
count++;
idx++;


}

>>
File: 1495228935920.gif (2MB, 250x188px) Image search: [Google]
1495228935920.gif
2MB, 250x188px
>try to learn to code
>get a book
>first chapter is a "Hello world" example
>next chapter is basically creating a nuclear missile control system
>mfw stupid
>>
File: 1494485680865.jpg (29KB, 500x445px) Image search: [Google]
1494485680865.jpg
29KB, 500x445px
>>61220268
I never claimed that I can encrypt by hashing, I always used the "use" terminology.
Why are you putting words in my mouth?

>>61220272
See >>61219946
You got rekt son.

>>61220285
I never used the word hashing in any of my posts. Instead I used the word hash functions. (that being said, hashing is used in the process - you hash the key and the counter)

>>61220287
Keep circlejerking and let the butthurt flow.
>>
>>61220276
the other day a peer of mine presented a paper about black box testing with MC/DC testing. he based his project off a paper he found online. it was a garbage paper, he didn't understand basic terminology, and he argued the point with the professor until he was literally crying and the professor was screaming at him for how stubborn and incorrect he was. don't be that guy
>>
>>61220309
You showed xor encryption. Not encryption using a hash function.
>>
>>61220324
See >>61220156
Fag, lmao.

>>61220322
>don't be that guy
I am not, I literally proved in this very thread that you are wrong.
>>
>>61220033
>Salsa20 is literally a loop of hashes.
Yes. With a few xor operations added. And it's the whole operation that makes the salsa20 algo.
You can't just take the hash function and call it the encryption function, or the cipher. It's like if you take v8 engine and call it a car: it can be an incredible engine, alone, it won't go very far.
>>
>>61220346
still shifting the goalposts, I see
>>
>>61220309
Then why the fuck are you arguing? There is no goddamn conflict if you meant to use the hash. The reason i used that argument was because your general attitude seemed defensive when you were told that hashes do not encrypt. Why dispute that claim, when it is so clearly true? Are you really such an autistic virgin that you need to raise stupid and pointless arguments in my favourite anime image board?
>>
>>61220322
Don't worry, he's going to fail ignominiously
>>
>>61220192
>Related-key attacks matter only if you have attacked-controlled keys which is extremely rare, usually the key is randomly generated.
Several companies got hacked because their employees weren't cautious about using proper cryptographic standards.

>Wasn't the AES256 attack also a related key attack?
There is an impossible differential attack on AES-256, but winning 2 bits from the complexity doesn't really matter. However, hash functions have practical attacks against related keys, therefore they don't have all the properties that a secure encryption algorithm must have.
>>
haskell!
>>
>>61220359
Would be glad if you proved how this was the case. I moved no goalpost to my knowledge.

>>61220347
Even in that case, the CTR case working with any function that behaves like a random oracle still stands (can use any cryptographic hash function in CTR mode)

That being said, just read the first few paragraph of the Salsa20 design, DJB explains it very well.

>>61220369
>Then why the fuck are you arguing?
Because some faggots here insist that you can't encrypt by using hashes.

>when it is so clearly true?
I just proved that hashes can be used for encryption.

>Are you really such an autistic virgin that you need to raise stupid and pointless arguments in my favourite anime image board?
Why are you wining to me? Whine to the people who try to argue while they have absolutely no idea about the topic.

>>61220370
Are you trying to feel better by circlejerking and closing your eyes? Is it working?

>>61220393
>Several companies got hacked because their employees weren't cautious about using proper cryptographic standards.
I think that modern hash functions like BLAKE, SHA3, etc are proper cryptographic standards.
In fact the Keyak cipher is based on Keccak + the duplex construction.
>>
>>61220307
Most books go
hello wold
variables
More IO.
if else
loops
switches
etc though
What are you having issues with, lad?
>>
>>61220430
>encrypt by using hashes
This is logically inconsistent. Hope that helps.
>>
I haven't coded in a couple years. Got any project ideas preferably using c++ or ruby.
>>
>>61220430
>I just proved that hashes can be used for encryption.
Yeah, but you've been arguing as if you meant that hashes ARE encryption you spastic, read the post instead of assuming arguments. I agree with you then. Using a hash in encryption is a viable method.
>>
>>61220451
Are you claiming that you can't use hashes in CTR mode?
This is logically inconsistent when considering that hashes are supposed to behave like CSPRNG.
>>
File: 1358817644485.gif (3MB, 400x225px) Image search: [Google]
1358817644485.gif
3MB, 400x225px
>>61218623
Anon, anon! I thought Vim was gonna be hard to learn but it's not hard at all! I really like it too, it's neat. I can configure it any way I want so it's super duper fast! Using it to learn LaTeX now so I can do my homework assignments and next up is Python 3!
>>
>>61220463
ruby to javascript compiler
>>
>>61220486
before you save and quit, remember to indent your files automatically!
gg=G
>>
>>61220486
trying to get my debian jessie vim install to use python3 gave me aids of the ass. kind of sick of jessie but it'd be more of a pain to upgrade
>>
File: 1478407655162.gif (102KB, 758x696px) Image search: [Google]
1478407655162.gif
102KB, 758x696px
>>61220466
Glad we agree then.
Here, have an animeme.
>>
>>61220487
thats a good one, thanks
>>
Why do so many programmers and companies love Ruby? Looks like a bad to mediocre language to me
>>
>>61220509
I use Debian 9. Should I be worried? What was the problem? The Debian wiki says it comes with the latest version of Python 3 automatically.
>>
>>61220532
Because they are ignorant hipsters, the kind of people who think that you can't encrypt by using hash functions.
>>
>>61220532
Check out crystal:
https://crystal-lang.org/

http-server:
require "http/server"

server = HTTP::Server.new(8080) do |context|
context.response.content_type = "text/plain"
context.response.print "Hello world, got #{context.request.path}!"
end

server.listen
>>
>>61220555
i'd imagine it'd be fine if they say it comes with it. jessie basically says: "use python 2, it's what we decided you will use. you want to use 3? fuck you"
>>
>>61220570
>that syntax
I already have a bad feeling about it
>>
>>61220509
what do you mean? vim is a text editor not a python interpreter
>>
>>61220576
But using python3 is as easy as installing 1 package.
>>
>>61220600
you have to have language support to use plugins for those languages. for example if you wanted vim to include a python interpreter, it'd have to support python3 if you wanted to write with that
>>
>>61220612
why don't you go install debian jessie and configure vim to use python3 plugins instead of talking out your ass dickhead. never fucking reply to me again or i'm going to track you down and execute you. i'm not joking.
>>
>>61220532
watch uncle bob's keynote named something like "smalltalk died...but reborn as ruby"
>>
>>61220625
I had Debian Jessie installed for ages

>Vim
Blame Vim for sucking dicks. I am fine here with my Emacs.
Also, enjoy your shitty language, faglord.
>>
>>61220593
Take a look at Elm too.
>>
>>61220532
i dont know but its not type checked so its automatically trash
>>
>>61220562
Dude, you "won" an argument because every others stopped arguing when they've understood it was a pointless semantic details.
An argument that you started yourself, by using poor word phrasing letting everyone here think you were trying to encrypt data using *only* a hash function.

Don't be so proud of you
>>
>>61220631
>uncle bob
No thanks
>>
>The first rule of C is don't write C if you can avoid it. If you must write in C, you should follow modern rules.
Are these 2 sentences true?
>>
You nerds know Stretch is out, right?
>>
>>61220703
yes
>>
>>61220664
>An argument that you started yourself
Nope, the people who claimed that you can't encrypt with hashes were the ones who started this bullshit.
Sadly people want to get into arguments without having any clue about the topic.

>by using poor word phrasing letting everyone here think you were trying to encrypt data using *only* a hash function.
I was clear from the very start.

>when they've understood it was a pointless semantic details.
Nah, some faggots continued insisting even after they understood exactly what I said, such as >>61220451
>>
>>61220714
What?
>>
>>61220562
>encrypt by using hash functions.


See: Pigeon Hole Principle
>>
>>61220703
void main(argc, argv)
int argc;
char **argv;
{
return 0;
}

Nah, always write K&R, dont even worry about it
>>
>>61220734
Debian 9
>>
>>61220745
Yes, what with it?
>>
>>61220748
correction: int main(argc, argv)
>>
>>61220714
I'm using Stretch now, although, for some reason Vim 8.0 in the debian repos doesn't come with python support out of the box. You have to compile vim from source for that, and you have to choose between python2 and python3 - you can't have both. It's stupid. Arch has the same problem apparently.
>>
>>61220745
>>61220732
You're wasting your time, he's not actually enrypting using hash functions. He has a very poor command of English.
>>
>>61220748
what the fuck is this
>>
>>61220748
>>61220763
>>61220776
Its K&R Style C :D The correct way to write C
>>
>>61220776
old style C argument declarations
>>
>>61220794
No, D is not the correct way to write C.

D is dead. C is still alive.
>>
>>61220770
>It's stupid.
Makes sense though, Python is the one who need to get their shit together and stop making everyone elses life slightly more annoying with fragmentation.
>>
>>61220774
>You're wasting your time, he's not actually enrypting using hash functions
But I am, how foolish can you be? I even showed you how.

>He has a very poor command of English.
Sure, this is me, not the person that says "enrypting".
>>
>>61220802
>No, D is not the correct way to write C.
>D is dead. C is still alive.
The fuck does this have to do with anything?
Its not even vaguely related to what i said
>>
>>61220802
>No, D is not the correct way to write C.
>no arbitrary return
> no headless casting
>modules
>UFCS
D is literally a proper C2.
>>
>>61220808
>thinks a typo is comparable to a fundamental misapprehension
You miss the forest for the trees.
>>
>>61220829
>>Sure, this is me, not the person that says "enrypting".
>You just proved him right. If you knew English you would know encrypting is a valid word here.
He reacted to the spelling, not the word.
Atleast come up with some arguments before you make a fool of yourself on the internet
>>
javascript must be eliminated from this earth
>>
>>61220808
>>61220843

>thinks typos make an argument wrong

yeah you're a retard, back to community college kiddo
>>
>>61220828
>GC
Yeah, no.

C never had a GC to get rid of.
>>
>>61220830
>fundamental misapprehension
I would be interested in hearing why you think that this applies to me.
>>
>>61220858
Most of your posts in this thread. The numerous instances of you being corrected and informed of your errors.
>>
>>61220857
>GC.disable
>printf
>call and use only C.
>But now you can use modules and even templates if you want
>no silly (extern) either
>>
>>61220802
>enters a conversation about C where D has not been mentioned
>shills against D
what
>>
>>61220856
Spelling does not make an argument wrong. That being said, I did not use the spelling against any argument, that was him trying.
Nice double-standard though.

>>61220877
>The numerous instances of you being corrected and informed of your errors.
Such as? I am not aware of any such instance.
>>
>>61220856
I never said that, I'd just prefer if arguments existed, and were created, from valid points, not calling out stupid irrelevant shit

Like what you're doing now, for example

>4chan, the only place where ad hominem attacks are the standard, and only gay furries who masturbate to clop use well-founded arguments, you faggot
>>
>>61220877
>>61220894
you can tell he is a retard from the start

>>61218655


weeb trash and buzzwords that he doesnt understand
>>
>>61220891
>>no silly (extern) either
excuse you but in C extern is necessary and expressive and I honestly don't see why you'd want to get rid of it
>>
/dpt/ what do you think of my encryption scheme?

>encrypt user password at signup with SHA-256 and a salt
>store encrypted password in database
>user logs in
>encrypt supplied password with SHA-256 and the same salt as before
>compare it to the encrypted password in the database
>>
>>61220650
that's it you're dead.
>>
>>61220899
saying youre a retard is not ad hominem, just stop you are embarrassing yourself. it's very obvious you don't understand anything
>>
>>61220907
I meant you can use C in D without the need of extern.
>>
>>61220808
"encrypting using hash functions" is understood by everyone (except you, apparently) by "encrypting by using a hash function as the main operation".

When I go to the store by car, I don't say "I'll drive using my 4 wheels". Although the wheels are indirectly used during the drive, nobody would understand me.
>>
>>61220892
See >>61220794, he said
>D The correct way to write C
>>
>>61220915
Good, but not an encryption scheme.
>>
>>61220915
if you're the yuro guy then stop. if not, that's not encryption because encryption requires you to be able to encode a message and then retrieve it later whereas hashing is one way like what you described
>>
>>61220943
It was an emoticon you autist
>It's K&R (big smile) the correct way to write C
>>
>>61220923
>saying youre a retard is not ad hominem
https://en.wikipedia.org/wiki/Ad_hominem

>just stop you are embarrassing yourself.
read: Im out of arguments, please shut up so that my internet friends dont see how stupid my points were, even though this is anonymous

>it's very obvious you don't understand anything
>>saying youre a retard is not ad hominem
>https://en.wikipedia.org/wiki/Ad_hominem
>>
>>61220962
No, it was a colon followed by a capital D
>>
>>61220794
that doesn't appear in K&R second edition though?
>>
>>61220962
This is why redditors should keep to reddit.
>>
>>>/int/76814864
>>
>>61220943
You were so eager to shill against D that you saw that before recognizing the obvious emoticon
>>
>>61220944
>>61220945
It is an encryption scheme, you can encrypt using hash functions, and SHA-256 is a cryptographic hash function
>>
>>61220972
>https://en.wikipedia.org/wiki/Ad_hominem

Maybe you should actually read the article retard.

https://en.wikipedia.org/wiki/Ad_hominem#Non-fallacious_reasoning
>>
>>61218671
No, the autist is making everyone waste time. If he doesn't like the professor he should file a complaint or something and shut the fuck up.
>>
File: 1485286631031.jpg (560KB, 1575x1665px) Image search: [Google]
1485286631031.jpg
560KB, 1575x1665px
>>61220902
>weeb trash
Anime site

>and buzzwords that he doesnt understand
Since when are hash functions buzzwords?

>>61220932
>"encrypting using hash functions" is understood by everyone (except you, apparently) by "encrypting by using a hash function as the main operation".
By every retard on this shitty thread maybe. This is probably due to the amount of ignorant people that this site attracts.

>>61220915
What's the point of doing that exactly? I would understand if you hashed the password but why would you encrypt it? The only case that I can think of for encrypting a password is when you are making a password manager.

>>61220945
>yuro
If you are not an European then you either live in the US or in the 3rd world.
Which one holds true in your case?
>>
>>61220989
D is dead, there's no need to shill against it.
>>
>>61220990
>It is an encryption scheme,
this is where you're wrong. i'm not replying to you again, but the only one you're going to embarrass in real life one day by thinking this is yourself. you'll make a thesis about something like this and you will have to rewrite it
>>
>>61220993
That is wholly irrelevant considering intent you spastic
>>
>>61220977
Yes and in being such it expressed a big smiley face
Here's how it should have been written if it meant what you keep insisting it means:
>It's K&R style C: D, the correct way to write C
Notice the lack of space between C and the colon, the space between the colon and D, and the comma after D
Also notice how that makes no sense, because D is not K&R style C
>>
>>>/int/76815019
>>
>>61221011
>you'll make a thesis about something like this and you will have to rewrite it
This is common knowledge, why would anyone make a thesis on that?
>>
>>61221013
Nope, it's only a fallacy if I construct an arument such as "you are wrong because you are a retard" me stating you are a retard is just testimony not an argument (and therefore not a fallacy because logical fallacies can only take place in the construct of an argument). I can tell you haven't actually ever been in a formal logic class.
>>
Think I need to start asking interviewees this, weed out the morons who think you can use a hash function as a cipher
>>
>>61220999
>The only case that I can think of for encrypting a password is when you are making a password manager.
*or key exchange
>>
>>61221032
Encryption refers strictly to reencoding information in such a way that you can convert it back to its original form
Your algorithm can't convert the password back to its original form and you can't write an algorithm that could
Therefore it's not encryption
>>
>>61221061
See >>61219946
>>
>>>/int/76815100
the yuro is defending himself lmao
>>
>>61221040
>I can tell you haven't actually ever been in a formal logic class.
I can physically feel your autism exploding outwards, might envelop your ego soon

This argument is still fucking irrelevant, as a side-comment not directed to your previous statements holds no meaning in this context.

But if you feel the need to swing your logic-cock around some more, then do keep insulting me. I can take it anon.
>>
>>61220915
Assuming you're not >>61220999

Yes, it's the good pattern to store password.
However, you could replace sha256, by another hash algorithm designed especially to deal with passwords, such as bcrypt or scrypt.


BTW, you should use the term "hash" instead of "encrypt"
>>
>>61221079
That's irrelevant to the fact that your project does not do encryption
>>
>>61221087
Be careful not to hash your replies to him, he might try to decrypt them
>>
>>61221087
Look at all that back peddling.

I expected an expert on encryption and hashing to know basic logic is all. But clearly you haven't even gone through the most basic CS curriculum yet which explains why you can't understand encryption and hashing.
>>
>>61221080
Not me
Please stop shitposting, it's summer and thus the university is closed. I am not in the UK right now.
/int/bullshitte is not welcome here either.

>>61221088
>>>61220915
>Assuming you're not >>61220999(You)
He is not.
>>
>>61220804
tru
>>
>>61221109
>decrypting the output of a compression function
Are you retarded anon?
>>
>>61221112
I never said anything related to encryption or hashing, so i dont see the relevance of this at all.

You do seem to have alot of pent-up anger and frustration tho, considering that you're still just blatantly insulting me in an argument you started for absolutely no reason
>>
>>61221140
You can encrypt using hash functions, therefore you can decrypt the output of a hash function.
>>
>>61220915
It would be more secure to hash the password instead
That way an attacker can't retrieve the original password
>>
>>61221153
im assuming youre this retard

>>61220999

who i was arguing with in the first place. if you didn't want a response then you shouldnt have inserted yourself in the conversation, especially when you just have a bunch of stupid incorrect shit to say.
>>
>>61221156
You've misunderstood everything then
you can use a hash as a key, and use that in encryption, and decryption from formerly mentioned encryption.

you cannot encrypt or decrypt by hashing something, and you can never decrypt a hash
>>
>>61221156
No, you can't. You can decrypt the output of an encryption function that uses a hash function, but you can't decrypt the output of a hash function.
>>
>>61221156
Are you pretending to be me anon? If so you are doing a very bad job out of it and you only manage show your ignorance on the topic. I never claimed that you can decrypt the output of a hash function.

>>61221168
>>>61221153
>im assuming youre this retard
>>>61220999(You)
Nope, not me.
Also, calling someone a retard is easy, disproving them needs you to be informed about the topic.
>>
>>61221168
>who i was arguing with in the first place. if you didn't want a response then you shouldnt have inserted yourself in the conversation, especially when you just have a bunch of stupid incorrect shit to say.

>>61220808
>>61220843 (You)

>>thinks typos make an argument wrong

>yeah you're a retard, back to community college kiddo

You mentioned me, yet i am not the other guy
>>
>>61221183
>the output of an encryption function that uses a hash function
Or some mode or operation that uses a hash function as its encryption algorithm.
>>
>>61221195
he's already been disproved several times

>>61221201

neither of these are me
>>61220808
>>61220843
>>
>>61221195
He's doing a better job of explaining your position than you are.
>>
>>61221217
>as its encryption algorithm
I think you mean IN its encryption algorithm.
A hash function alone is not an encryption algorithm.
And if it is, it's no longer a hash function.
>>
imagine thinking hashing and encryption are the same thing
>>
>>61221251
imagine using a language that doesn't support multicore
>>
>>61221259
imagine not using actionscript3
>>
>>61221234
Maybe? I don't know, I have not read that thread chain. If he indeed does then I am glad that he helps spread the truth.

>>61221243
No, I do not mean IN.
Or are you claiming that AES in CBC mode is not an encryption algorithm?
>>
imagine shitposting the same shit so much you sound like a bot
>>
>>61221259
imagine using a language that doesn't support nightcore
>>
>>61221251

You would turn into a dumb weeb.
>>61218655
>>61220999
>>
>>61221251
Things that nobody believes?
>>
>>61221271
What is an ``a bot''?
>>
>>61221267
AES in CBC mode is not a hash function.
>>
>>61221271
>you sound like a bot
>>>/v/
>>>/b/
>>>/r/ibbit
>>
>>61221292
It is an encryption algorithm, therefore it is a hash function, see >>61219946
>>
File: images (3).jpg (3KB, 225x225px) Image search: [Google]
images (3).jpg
3KB, 225x225px
>>61221309
> >
> >>>/
> >>>/
> >>>/
>>>/trash/
>>
File: 1479130558308.jpg (154KB, 1920x1080px) Image search: [Google]
1479130558308.jpg
154KB, 1920x1080px
>>61221279
But anon, I do not think that hashing and encryption are the same thing

>>61221292
I never said that it is.

>>61221314
Stop pretending to be me please. I said nothing like that in my post.
You only show your ignorance that way.
>>
>>61221314
Hash functions are always one way.
AES in CBC mode is not one way.
Therefore, AES in CBC mode is not a hash function.
>>
>>61221326
>paranoid, thinks his own ignorance in other posts is other people pretending to be him
>>
>>61221326
>I never said that it is.
You did, you said using a hash function as an encryption algorithm.
>>
File: HoneyView3_2017-07-04_17-39-16.png (926KB, 652x652px) Image search: [Google]
HoneyView3_2017-07-04_17-39-16.png
926KB, 652x652px
this crystal language seems interesting https://github.com/crystal-lang/crystal

"We love Ruby's efficiency for writing code.
We love C's efficiency for running code.
We want the best of both worlds.

We want the compiler to understand what we mean without having to specify types everywhere.

We want full OOP.

Oh, and we don't want to write C code to make the code run faster."
>>
what do we think about webassembly
>>
>>61221334
>Hash functions are always one way.
They are one way but you can use them as encryption.
>>
>>61221353
It still gets executed by a Javascript interpreter
>>
>>61221351
>We want full OOP.
Why? OOP is garbage.

Also, Ruby is not efficient for writing code. Scheme and Haskell are efficient for writing code.
>>
>we want POO & dynamic types
Crystal, more like shit
>>
>>61221334
meme
>>61221351
meme
>>61221353
meme
>>
I thought /g/ was supposed to be a high IQ board, how do you manage to consistently fall for the most obvious and blatant trolls?
>>
>>61221348
I will insist that I never said that AES in CBC mode is a hash function.

>>61221347
>his own ignorance in other posts
You are claiming things which I do not believe in, thus I do not think that this is "my own ignorance", instead I believe that it is your inability to understand my points.
>>
>>61221360
Not without making them not one way and therefore not hash functions.
>>
>>61221386
Nice backpedaling
>>
>>61221398
>I will insist that I never said that AES in CBC mode is a hash function.
You did, you said using a hash function as an encryption algorithm.
>>
>>61221386
>I thought /g/ was supposed to be a high IQ board
You were wrong, people here don't even know that hashes act like CSPRNGs and that thus they can be used for encryption. Instead of talking about things that they know about they decide to reply to things that they have absolutely no idea about.
>>
>>61221412
MEME
>>
File: 1402950410384.jpg (138KB, 500x506px) Image search: [Google]
1402950410384.jpg
138KB, 500x506px
>>61220899
>only gay furries who masturbate to clop use well-founded arguments
>>
File: osgxu7vnVK1txli52o1_raw.png (457KB, 606x890px) Image search: [Google]
osgxu7vnVK1txli52o1_raw.png
457KB, 606x890px
>>61221378
but it isn't. Readability and maintenance is really important for me.
>>
File: IMG_7124.png (2MB, 2560x1440px) Image search: [Google]
IMG_7124.png
2MB, 2560x1440px
C and Java is a nice combo. What else is good to add to the mix.
>>
>>61221447
OOP is unreadable and unmaintainable.
>>
>>61221417
Yes, I did say that it is possible to use a hash function to encrypt shit, I never once claimed however that AES in CBC mode is a hash function.
That being said AES can be used to construct a hash function, see https://en.wikipedia.org/wiki/Whirlpool_(cryptography)
>>
Since there's no /wdg/ I'll just ask here. Sorry that it's in the wrong place.

Is there a simple way of basically doing #include "component.html", as in split a component like my nav bar out into a different file and include it in other html files? Without having to use 7 meme frameworks and learning 2 new markup languages?

I guess I could include it dynamically with javascript but the code for that is ugly as sin.
>>
>>61221432
>CSPRNGs
meme
>>61221445
>gay furries who masturbate to clop
meme
>>61221447
>Readability and maintenance
meme
>>61221449
>C and Java
meme
>>
>>61221467
Is something which uses a meme a meme?
>>
New thread:

>>61221493
>>61221493
>>61221493
>>
>>61221459
maybe something like gulp will help for simple purposes? there should be gulp concat plugin iirc
>>
>>61221507
I found a jquery way of doing it, and I already have jquery included so I'll go with that. Trying to make something relatively bloat-less (as far as web things go...).
>>
>>61221456
>I did say that it is possible to use a hash function to encrypt shit,
No, you said it's possible to use a hash function as (AS) an encryption algorithm.
It's not.
You can use a hash function IN an encryption algorithm, as a CSPRNG, as you say.
You can even use a hash function IN an encryption algorithm that does nothing but hash sufficiently small chunks of the key that there are at least as many possible resulting hashes as there are possible keys of that size.
Or you can modify a hash function to have a dynamic possible number of results that depends on the key size. But then it's no longer a hash function.
In either case, you cannot use a hash function AS an encryption algorithm.
>>
>>61221539
jquery is a dynamic way I guess, so script includes your things on the client side whereas gulp will just shit out static html, it's a build tool
>>
>>61221559
>You can use a hash function IN an encryption algorithm, as a CSPRNG, as you say.
Are you claiming that AES is not an encryption algorithm as far as connecting to 4chan is concerned?
>>
Vacation recently started and I've got some free time on my hands. I wanna learn python (already started a bit, doing the CheckPoint cyber challenge and learning as I go.) My goal is just gaining knowledge, something cool I guess.
What can/should I do?
>>
>>61221467
Stop shitposting
>>
I have some green text for ya boys.
>working in small company
>programing atmel/pic stuff
>mostly c/c++ and little bit of others
>my last project was big success
>custom vending machine with IoT shit in it for other company
>company making on ths thousands of euros every month
>yesterday boss came to me and said
>"We got this new project where we have to use raspberry pis and you are working on this along with some pajeets" Also he gave my contract about it
>I was like, yeah let me see
>It said that every piece of RasPi must be checked by the other company and also source code must be written in Python and send to them.
Well I have never really used python before. Actually I kinda disliked it back at University.
>I said that I don't have enough experience with python and pajeets knows only Java and C. So he should find someone better.
>He said "You have month to get some progress. If you gave me nothing. You are no longer working here."
I discussed with my friends about this and they said to leave company.
Did something like this happened to you guys?
Thread posts: 325
Thread images: 28


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.