duncesplayed

joined 1 year ago
[–] duncesplayed@lemmy.one 12 points 1 year ago

This one incident has had so many variations and urban legend-ish twists. This article itself even incorrectly lists the date as 1945 in one place, which is a common twist on the story, but incorrect. (This computer didn't even come into existence until 1947, so the bug couldn't have been found in 1945). For any know-it-alls who like to one-up people with the correct facts, here's the truth behind the story, best I can figure out:

  • This is indeed a real log entry book from September 9, 1947 (not 1945, as is sometimes reported)
  • Grace Hopper did not write the log entry book
  • Grace Hopper did not find the bug. She wasn't even there that day
  • Grace Hopper did make the story famous, though. Even though she wasn't personally involved, she found it funny, and liked to tell it, which is how she got associated with the story
  • This was not the first usage of the word "bug" (obviously, since "First actual case of bug being found" wouldn't have been funny). The earliest recorded usage of "bug" (in an engineering context) was Thomas Edison in 1878, but it surely predated him, as well. It was in common usage among engineers in the early 20th century
  • It was not the first usage of the word "debug", as is often attributed. We have a record of the word "debug" being used in 1945. (Maybe this is why some versions of the Mark II story are sometimes given as 1945). "Debugging" was used in the aviation industry before the software industry
  • The earliest recorded usage of the word "debug" in the context of software is 1952, but again, it probably predates its first record. Who knows if the word was already in use in 1947!
[–] duncesplayed@lemmy.one 1 points 1 year ago (1 children)

Yeah this part of it isn't getting enough attention. Take down his videos? Totally normal. Make him pay for some damages? Sure, I guess. Put him in prison? What the fuck?

[–] duncesplayed@lemmy.one 1 points 1 year ago

If you stream or upload game footage ~~before it’s official release date~~, they have full rights to shut you down

The timing of it speaks to what kind of damages they might be seeking, but it doesn't change the overall principle of it. Streaming or uploading video footage makes a derivative work or a partial copy, and I think that's pretty well established by now, regardless of whether it's done before release, right after release, or 20 years later.

I know, people do it all the time, anyway. Well, there are "fair use" cases where copyright law can get a little more lenient (like if you're giving a tutorial, or the footage relates to some academic commentary), but most of the video game footage you see online isn't there because it's legal, but because nobody really cares about it (or is suffering any damage from it). In principle it's still not legal.

[–] duncesplayed@lemmy.one 1 points 1 year ago

Supposedly it works with unmodified i3wm config files, though I haven't tested that myself.

[–] duncesplayed@lemmy.one 5 points 1 year ago (2 children)

Honest question: what does i3wm that swaywm doesn't?

[–] duncesplayed@lemmy.one 1 points 1 year ago

Yes, which is literally what OP is asking about. They mention system calls, and are asking, if a userland program can do dangerous thing using system calls, why is there a divide between user and kernel. "Because the kernel can then check permissions of the system call" is a great answer, but "hopefully you can't harm your computer with userland programs" is completely wrong and misguided.

[–] duncesplayed@lemmy.one 4 points 1 year ago

I've heard Brother isn't what it used to be, but if it's even half of what it used to be, it's still in a league above any other printer.

[–] duncesplayed@lemmy.one 1 points 1 year ago (5 children)

dd if=/dev/zero of=/dev/sda is a userland program, which I would say causes harm.

[–] duncesplayed@lemmy.one 3 points 1 year ago

That would be a "technical merit", which the article author claims is irrelevant to the discussion.

[–] duncesplayed@lemmy.one 4 points 1 year ago (1 children)

It's come up in interesting cases. I can't remember which package it was, but there was one package that was distributed under the humourous "Don't Be Evil License", where you could "use this software for anything that's not evil" or something like that. This technically does not qualify as free software (freedom 0 must allow anyone to use it for evil), so Red Hat (I think it was?) had to get their lawyers to contact the developer and get him to give them an exemption to the licence, just in case one of their users used it for evil.

[–] duncesplayed@lemmy.one 44 points 1 year ago (2 children)

You mean Linux isn't going to have 200% market share one day? Shit, I'm starting to think my calculations may have not been totally serious.

[–] duncesplayed@lemmy.one 1 points 1 year ago* (last edited 1 year ago)

It's a website that's managed by a community of pirates. It's invite-only (meaning you have to be invited by an existing user) and you will have your membership revoked if you don't follow certain rules (mostly about seeding). The .torrent files you get from them are specific to that private tracker, so no one who's not also a member of the same site can see which files you're seeding.

view more: ‹ prev next ›