Hacker Newsnew | past | comments | ask | show | jobs | submit | H4sh3's commentslogin

If you get a never before seen problem to solve, going trough the taught process and communicating the steps of solving it might display the skill of problem solving. Which should be what interviewers are looking for. The solution will probably not be the most efficient one, but can be refined later.


public static main([java/lang/String)V {

is this open square brackets a typo?


Nope, that’s the syntax for a one-dimensional array of strings. I wanted to keep the syntax as close to JVM internal type names as possible.


Eat healthy food with high protein, keeps you full for longer time. Go for a walk couple times a week and/or do fitness regular.


I'm testing it now.. gotta work the timer is running ;)


Oh no haha, it's not quite production ready yet! :) I still need to add the alarm mechanism (and have actually received a PR for it that I will likely merge when I get back to working on this later today). Thanks so much for trying it out!


Just FYI, the alarm functionality is live now. I think that in the future, I'll enable customization so that one can choose what sound (if any) they'd like to use.


Can you even do this if the client hasn't installed your cert?


No, only works if there's a way to install custom certificates on the device you are monitoring. Otherwise that would defeat the whole purpose of https (If there are no bugs in the implementation or other security issues of course).

For mitmproxy that would be achieved like this: https://docs.mitmproxy.org/stable/concepts-certificates/


Thought so i played around with this and my phone, self hacking ;)

It's also very nice to intercept app traffic. Some use cert pinning, so the custom certificate won't work.


In most cases you can get away with simply connecting to the application with `objection` (mentioned in a sibling post) and running `android sslpinning disable`.

This will fail in some cases when the application is obfuscated or uses a non-standard pinning mechanism. In this case you can decompile the application to determine the methods used to accomplish the pinning and use frida (https://frida.re) directly in order to manually override them.


Think there are a few tools for getting around the certificate pinning, projects like sensepost/objection


It depends on how the client will treat an untrusted cert.


Very cool!


This is Conway's Game of Life in javascript using the p5js library.


Hello, i did this project to visualize how a q-table gets updated. When i got into this topic i couldn't find something like this, hope it helps people that are new in this topic.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: