|
Vei posted:alright, newbie, *tucks icon away*, in order to truly be welcomed to this forum in which i am definitely an OG in, you must do my work for me Would it be okay if I showed you how to do this without jQuery? It's very simple. |
# ¿ Feb 14, 2021 03:00 |
|
|
# ¿ May 10, 2024 14:49 |
|
Vei posted:! most definitely would be appreciated Here you go, fellow nerd https://jsfiddle.net/36x9aonw/ I think of promises of sort of like how callbacks were used: when the thing is done, it executes the ".then()". "async" makes it really easy to follow the flow of stuff, so you don't need ".then()" all over the place and your code isn't all ugly. Let me know if you have questions! |
# ¿ Feb 14, 2021 03:49 |
|
Vei posted:holy poo poo thank you, gonna give this a shot! i haven't used "await" either before but this definitely looks like good stuff Yeah, async/await are neato. I don't use them all the time because they're a bit more limited, but in a lot of cases they're just fine and make your code a lot easier to follow. Here's two ways to do the same thing: JavaScript code:
JavaScript code:
cruft fucked around with this message at 23:25 on Feb 14, 2021 |
# ¿ Feb 14, 2021 18:55 |
|
Plant MONSTER. posted:this nerd stuff is making me MAD *sigh* okay, here's the lunch money I bring specifically to give you when you're mad, and I'll meet you behind the gym after school for another beating. |
# ¿ Feb 14, 2021 22:43 |
|
Plant MONSTER. posted:Oh thank you. I'll go get us some lunch. Is everyone okay with paninis? Paninis sound awesome! |
# ¿ Feb 14, 2021 23:19 |
|
hbag posted:the script goes well Good lord, when you log in it just issues you a cookie with your username and password? I thought it was bad enough that we didn't have HTTPS until like 2 years ago. Have you looked into using pandoc to convert from HTML into Markdown? Looks like a fun project. |
# ¿ Feb 18, 2021 23:37 |
|
hbag posted:oh thank christ it is a hash Yeah, so, sending a hash of the password as the authorization token is Rookie Authentication Mistake #1, on account of you can replay the hash. Like, all the hash is doing for you is turning this conversation: quote:I would like web page 58, and the password is sexy123 into this conversation: quote:I would like web page 58, and the password is sexy123 You see how in either case, was able to grab the authentication token and use it to gain access as . In the first case the token was the password. In the second case, the token was the hash of the password. They're both replayable. Pretty much the only thing that passing around hashes does is if a person uses the same password on every site, then getting their authentication token doesn't reveal their password. This wound up not being something any attacker exploited, other than the "vengeful ex-spouse" attack scenario, which honestly wasn't going to be obtaining the password from unencrypted plaintext HTTP in the first place. |
# ¿ Feb 19, 2021 03:17 |
|
hbag posted:will begin work on the fart button once the main script is complete If you're running PulseAudio locally, you can have it listen for TCP connections and then set up a reverse tunnel when you ssh out. It all depends on how much effort you're willing to put into a text mode fart button. |
# ¿ Feb 19, 2021 22:39 |
|
|
# ¿ May 10, 2024 14:49 |
|
Here, OP, I made a fart button so you can focus on your kiboze script. https://jsfiddle.net/zg5bqptx/ |
# ¿ Feb 19, 2021 22:39 |