Perl 6 - the future is here, just unevenly distributed

IRC log for #crimsonfu, 2017-01-26

crimsonfu - sysadmins who code

| Channels | #crimsonfu index | Today | | Search | Google Search | Plain-Text | summary

All times shown according to UTC.

Time Nick Message
00:08 hydrajump can't remember who it was that was working on integrating ZAP into their CI/CD workflow but here's a blog from Mozilla on how they do it https://blog.mozilla.org/security/2017/01/25/setting-a-baseline-for-web-security-controls/
00:08 hydrajump ^^ maybe it was dotplus
02:48 ilbot3 joined #crimsonfu
02:48 Topic for #crimsonfu is now http://crimsonfu.github.com - ConfiguRatIon Management of Systems Or Network kung FU | logs at http://irclog.perlgeek.de/crimsonfu/today
03:39 codex_ joined #crimsonfu
03:45 hydrajump https://www.reddit.com/r/webdev/comments/5pzpck/look_before_you_paste_a_code_snippet_from_a/
04:11 larsks hydrajump: that one is nifty, isn't it?
07:00 dotplus yeah it was me. Thanks for the link. I wrote an Ansible role for this, gave it to the security folks asking them for feedback, RFEs, whatever. Nothing yet.
11:51 pdurbin huh, that is nifty
16:30 hydrajump larsks: yeah
16:31 hydrajump I wonder how one can publish terminal commands on a site in such a way that the visitor copying them can feel reassured nothing malicious is hidden in the html source
16:32 hydrajump of course the lesson is to **not** copy and paste, but people will still do it just as they click on phishing links
16:32 hydrajump the alternative is to post images of the commands but that seems silly
16:33 dotplus reputation
23:29 pdurbin I sort of forgot there's a #bash on freenode: https://botbot.me/freenode/positivepython/msg/80006550/
23:41 hydrajump what shell do you use, e.g bash, zsh?

| Channels | #crimsonfu index | Today | | Search | Google Search | Plain-Text | summary

crimsonfu - sysadmins who code