Hacker Timesnew | past | comments | ask | show | jobs | submit | 112233's commentslogin

> web proxy

do you know of a mitm proxy that "just works"? meaning, is able to spoof/intercept/modify running processes well enough that most stuff would run without manual modification?


What book covers in depth *throwing* from destructors? Even more sane thing — throwing from constructors and function arguments — is mentioned in passing ("unwind will take care of everything, don't think too hard about it") unless you are in a language lawyer mailing list. But exceptions *during destruction*? What book discusses that? That's like covering use of NaN values as map<> keys...

"Effective C++" ?

  Chapter 2: Constructors, Destructors, and Assignment Operators
      Item 5: Know what functions C++ silently writes and calls.
      Item 6: Explicitly disallow the use of compiler generated functions you do not want.
      Item 7: Declare destructors virtual in polymorphic base classes.
      Item 8: Prevent exceptions from leaving destructors.
      Item 9: Never call virtual functions during construction or destruction.
      Item 10: Have assignment operators return a reference to *this.
      Item 11: Handle assignment to self in operator=.
      Item 12: Copy all parts of an object.
This stuff is bread and butter of C++ (or at least it used to be; perhaps this is different in "modern" C++) and lots and lots of grist for people like Scott Meyers and Herb Sutter.

"Prevent exceptions from leaving destructors." — thank you for providing well known sources that support my point! Although sadly we all have to eat Sutter Meyers bread, at least it explicitly tells you to not worry about the way exceptions are handled during object destruction — by simply avoiding such exceptions.

No C++ "bread and butter" I have seen so far goes into depth on this subject.


yeah, but AI played crucial role in this fraud. It turbocharged and spearhedded. Thanks to AI, you can now fraud too!

If you noticed, the article did not actually tell you what happens when destructor throws. It was only about double-exception case and throwing in nothrow() function (both perfectly valid things to know when jobbing).

What state are members left in when destructor throws? If exception happens in virtual base? If member destructor throws, what other class members have they destructor executed? will delete[] be called?

The author possibly does not care to know themselves! As you say, totally irrelevant to any normal programming. Unless you are writing clang or gdb


this is always overlooked. AI stories sound like "with right attitude, you too can win 10M $ in lottery, like this man just did"

Running LLM on 1000 functions produces 10000 reports (these numbers are accurate because I just generated them) — of course only the lottery winners who pulled the actually correct report from the bag will write an article in Evening Post


> these numbers are accurate because I just generated them

Is it sarcasm, or you really did this? Claude Opus 4.6?



If lossy-compressed transcodes of ripped movies are not "transformative works" and can get people even jailed, then lossy-compressed text of ripped books and websites is neither.

There is a lot of knowhow going into a good divx rip too, you know.

And it enables so much novel uses such as popcorn time, with fluorishing business opportunities.

You wouldn't download a car. They did.


Nothing gives programmer bigger sense of future job security than trying vibe-coding with a "frontierest" model and looking at the code. Especially once it starts changing existing code. Ah. And the fake tests. And those grandiose coments. Oh. It is quite marvellous.

I just wonder if companies will just instantly fold and sink once their internal slop pressure causes hull breach, or will they call slopbusters.


But... what sort of storage device does not allow your computers to use all 256 byte values? Why is random access data stored on teletype?


> what sort of storage device does not allow your computers to use all 256 byte values

- clipboards

- logs

- terminal output

- alerts

- yaml configs

- JSON configs

- hacker news comments

- markdown documentation

- etc...

I assure you, this is not a solution looking for a problem. I started out with binary encodings first, but then realized it limits so many workflows.


Not to water down the snark, but isnt cause of situation described in the article the exact mentality you are mocking?


I believe that's the joke, yes.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: