Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Daily programming thread

Name: Anonymous 2013-07-08 11:19

Seeing as how mods don't care about this board since most of the top posts are just porn spam, what are you working on, /prog/?

At the very moment I'm at work, doing Android code and shit. Kinda boring.

Otherwise I'm currently writing a C++ abstraction library for the PIC32 family of microprocessors, with the goal to make them easier than they are now (instead of writing hardware registers) and harder than babby mode Arduino. I plan on publishing it for everyone once I'm done, since PIC32s are cheap (~$10), a shitload of pins, 80mhz CPU...all around more powerful than Arduino.

Name: Anonymous 2013-07-08 21:58

>>40
and nothing of value was lost

Name: Anonymous 2013-07-08 22:12

>>40
It's not just refu/g/ees.  We were always like this, but there are some among us who felt as if it was not worth attempting to post anything but shit.

*grabs dick*

Name: Anonymous 2013-07-08 22:41

I know!
let's invade /g/ and shitpost everywhere with our superior memes!
they be mad!!

Name: Anonymous 2013-07-08 22:56

>>43
Shut up and check my dubs.

Name: Anonymous 2013-07-08 23:02

>>43
We could do it, but it would take a dedicated team of at least 4 people with nothing else to do all day. And it would end when we get banned. Of course in our case we get banned from our own board. Oh, politics.

Name: Anonymous 2013-07-08 23:16

>>1
NICE. I am waiting on this thing to come out to make mini tablets and laptops:
http://www.minnowboard.org/

>>18
I'd make the camera a separate entity, but that that when the focus/player moves, the camera gains acceleration, as if it was being pulled by the focus/player with a string. Then when there is a sudden stop, the camera has enough momentum to span to the other direction, reach the end of the length it can pass, and recoil/bounce back to the center, just like a camera attached to a string. Obviously, the camera does not get 100% to the center, but enough for it to be near the proximity of the focus to be visible. It makes the camera nice and dynamic, a better experience than a static camera.

Name: Anonymous 2013-07-08 23:25

It seems a lot of you are new. On /prog/ it is customary to not post anything programming, mathematics, cryptography, or biology related unless it completely blows your mind. Please keep your work and hobby tasks to yourselves where I can readily find it on the daily programming thread in /g/. Thanks yous.

Name: Anonymous 2013-07-09 8:55

(null)

Name: Anonymouth 2013-07-09 12:33

>>47
thuck my anuth

Name: Anonymous 2013-07-09 12:49

>>47
Yeah, fuck off.  I'm not new and I like programming posts.

Name: Anonymous 2013-07-09 23:42

bump in appreciation of the /g/'s banished programmers.

Name: Anonymous 2013-07-09 23:47

>>51
no
we don't want the /g/ros here!
get out /g/ros and go be e/g/in elsewhere!

Name: Anonymous 2013-07-09 23:52

>>51,52
Come on, be serious.  Not even the /g/rodiest interloper would bump a thread started today.  In fact, I doubt the OP is nothing more than a dissatisfied regular displaying a well-played and most subtle mockery of our inbred cousin-board.  I would only be assured of my suspicions if the post were about writing a Ruby framework for programming RESTful webapps on a Rasberry Pi.

Name: Anonymous 2013-07-10 0:05

>>53
Yes I bought a Raspberry Pi! It was cheap and small and I needed a low-power computer to run my fucking mail server! I don't receive that much mail but that's the only social network I have!

Now what? Are you going to mock me all my life because I once bought the same device than hacker kikes and /g/ros?

Name: Anonymous 2013-07-10 0:05

>>52
but...where will the /g/ros be e/g/in?

Name: Anonymous 2013-07-10 0:27

>>54
No, I won't.  I did the same thing you did, except I bought a used Sheevaplug about a year before your device went on the market, and I use it for the same thing you do (and also as a nice persistent IRC connection). The difference between you and the ``hacker kikes and /g/ros'' (at least, I assume) is that you bought the damn thing for a purpose, instead of buying for the sake of owning and trying to tack a use on later.

Name: Anonymous 2013-07-10 0:34

>>54,56
enjoy your proprietary spywares, faggots, while I host dozens of hidden service websites and blogs and mail servers and IRC on my cubieboard

Name: 57 2013-07-10 0:42

ah fuck, sheevaplug doesn't have closed source bits. I hate being wrong, so fuck you.

Name: Anonymous 2013-07-10 0:42

>>57
First off, there is a board for this sort of discussion, and it is either /tech/ or /comp/, but certainly not /prog/. Secondly, I doubt you've vetted the machine code for the compiler you used for your stage 1 install with a trusted hex editor or other displayer, and thirdly, I doubt you've physically inspected your components (especially your SD card/reader combo) to ensure it has not been tampered with.

When all that is said and done, how much did you pay for however many last X miles of fiber you own?  Do you personally inspect it for tampering monthly, or more frequently than that?

Name: Anonymous 2013-07-10 0:59

I'm new and I'm going to do everything in my power to piss you off and shit up this stupid fucking place.

eat my little dick

Name: Anonymous 2013-07-10 1:02

wait the /g/ daily programming thread is alive and well. Was this a ruse?

https://boards.4chan.org/g/res/35179419

Name: Anonymous 2013-07-10 1:03

>>59
I actually have done all those things (and more), so suck my anus you little cunt. It's thanks to people like me who actually waste their time checking their software that people like you can just get away with just "trusting". Finally, making sure that the computer you are using is actually obeying you and not foreign interests sounds like something that is quite /prog/-relevant since programming is all about control and abstract bullshite you'll never understand.

Name: Anonymous 2013-07-10 1:04

>>60
You aren't the first. They always move on after a month or two.

Name: Anonymous 2013-07-10 1:05

>>59
https://images.4chan.org/g/src/1373432529751.jpg

Are you being serious?  The air we breath,  the water we drink.  Will it ever stop?

Name: Anonymous 2013-07-10 1:05

>>63
That's what you said about Nikita and look what happened.

Name: Anonymous 2013-07-10 1:05

>>62
Then would you mind answering my original question?  Furthermore, on what machine did you evaluate the source of your compiler?  It seems to my small and untutored mind that it is impossible to trust any inspection performed on an untrusted platform, could you provide an example to the contrary, since you claim to have done so?

Name: Anonymous 2013-07-10 1:09

>>64
You seem to have accidentally pasted a url into your post.  I'm not on a machine with a display server installed, so I can't tell if it's relevant to the discussion or not, but I can almost guarantee that by the time I am at a machine capable of displaying such an image, it will have expired.  Could you describe the image in detail so that I can respond to it appropriately?  Perhaps it will explain your otherwise nonsensical text, to which the respective answers are `Always' and `Define `it' first'.

Name: Anonymous 2013-07-10 1:09

>>66
LLLLLLLEEEEEEEEEELLLLLLLLLLL
LE FAGSHIT XDDDDDDDDDDDDD

Name: Anonymous 2013-07-10 1:11

>>63
Actually I've been around here since January 2013 and hang out here every day.

you'll know by the fact that i don't bow down to your stupid manners and not sage every fucking thread i post in, nerd

Name: Anonymous 2013-07-10 1:14

>>67
It's a photography of a cat dressed in high-school uniform. The cat doesn't look amused. i don't think it's relevant to anything.

Name: Anonymous 2013-07-10 1:16

>>69
LLLLLLLLLLLELLLLLLLLLLLLL
LE PROG RESISTANCE FACE
LE VELVET UNDER/G/ROUND
FUCKING NERDS XXXXXXXXXDDDDDDDDDDDDDDDDDDDDDDDDDD

Name: Anonymous 2013-07-10 1:17

>>69
Did we talk on IRC?

Name: Anonymous 2013-07-10 1:18

>>70
Very puzzling.  I wish posters would take a bit more time to make sure what they write is coherent.

Name: Anonymous 2013-07-10 1:21

>>66
I did it using a MS-DOS 286 shitbox a few years ago (on a very very old machine that didn't even have an ethernet port). I kept the binaries and source around ever since. Sure, it's possible that the jews/NSA/goyim/judean-liberation-front had infiltrated even the software back then (i.e. tampered with the installation floppy of MS-DOS from 20 years ago) and made it look kosher so I wouldn't suspect anything, but making a spyware that would remain backwards compatible for twenty years and that would magically recognize tcc's source and binary (a program that didn't exist back then) sounds pretty damn unlikely. I bet you never thought anyone would call a MS-DOS computer "trusted" in any context, would you?

Also, here's a trusted machine that is quite unlikely to have been targeted by the magical omnipresent virus: http://bellard.org/jslinux/

Name: Anonymous 2013-07-10 1:35

>>74
Do you believe your own stories, French moron?

Name: Anonymous 2013-07-10 2:26

>>74
Write your own minimal C compiler in assembly for the purpose of building TCC. Use TCC to build a larger, feature compiler. Your compiler chain is now trustworthy.

Name: Anonymous 2013-07-10 3:03

>>76
Or start with an unoptimized C compiler binary that is less than 1KB, and review the correspondence between the commented assembly and the binary file.

Name: >>77 2013-07-10 3:12

The operating system might not be trusted though. You would need to have the verified compiler run as a boot CD. That's nice because you can verify the compiler on the cd, and it'll be read only so no computer could mess with it. You still have the bios to worry about though.

Name: Anonymous 2013-07-10 3:43

>>78
What can the BIOS do? Store information about the user to be recovered later by an agent of conspiracy?

Name: Anonymous 2013-07-10 4:15

>>79
It's supposed to pass control to an operating system. I don't know enough about it to verify this, but I can't prove that it wouldn't be possible to have the bios run the operating system in an emulator and keep control of the processor. So if it could keep control after the process has booted, it could log execution to some region of a mass storage device it doesn't let the operating system know about, or maybe leak data over your ethernet connection. I mean, if you have something running above your operating system, you are compromised. The only question is, is there enough resources in BIOS to encode all of that.

These are fun. I miss windows 9x
https://en.wikipedia.org/wiki/BIOS#Virus_attacks

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List