|
Yeah, I started coding without debuggers too.
The difference is my code.
In 1986 I was writing little, relatively simple applications. A checkbook balancer. Some stick figure animations. A few games. Stuff like that.
I didn't really need a debugger. My code and data typically had to fit in 64KB.
That's not the case now, even on embedded.
It's far more difficult to conjure a working mental model of my modern code at runtime, even if it is written better, and more properly organized. The reason is simple complexity. Getting good at building and then traipsing through my mental model of my modern code at runtime is what I'm getting at.
Check out my IoT graphics library here:
https://honeythecodewitch.com/gfx
And my IoT UI/User Experience library here:
https://honeythecodewitch.com/uix
|
|
|
|
|
I would hate this.
It would probably be good for me.
I lean heavy on the whole fast build and see if it goes and correct what doesn't. I'm sure some could watch a recording and think it spaghetti chucking.
Intellisense has gotten progressively worse with the verbosity of its descriptions because of the brigade against all code comments (maybe especially the XML ones). So you get method definitions from nugets where even if it's clear how you should call something, exactly what's going to happen when you do is a scientific endeavor of experimentation. Maybe it's exactly spaghetti chucking, but what other way is there to decode these black boxes?
|
|
|
|
|
I installed VB6 and got some old stuff running![^]
That's about three days in lost productivity, so I hope it will be worth it
Registering the COM Callable Wrapper was a pain and took most of the time.
I needed to run regasm.
The trick was in setting the /codebase parameter, which shows an error, but still does something that made it work
Also running it with the -tlb switch somehow works miracles.
For anyone who may have to do this sometime:
regasm -tlb C:\Windows\SysWOW64\MyCCW.dll
regasm C:\Windows\SysWOW64\MyDLL.dll /codebase /tlb:C:\Windows\SysWOW64\MyCCW.tlb The VB6 codebase has a total size of 1.63GB, plus VB6, which is another 3.77 GB, makes it 5.4 GB.
The VM I needed to run it was a staggering 203 GB, which takes quite a chunck out of my 1 TB drive
It now sits safe in some external storage (I don't dare delete it yet)
That alone should be worth it
|
|
|
|
|
A Tip/Trick in the works?
|
|
|
|
|
Congrats, Sander.
Now if only you could figure out how to get the original Minesweeper installed on Windows 10/11!
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
VM with a Windows 98
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Don't know if you're serious, but done that for my aunt that absolutely despises windows 10/11 ad ridden games.
If you are serious, look at win7games.com, it has an installer for the old games that works in win 10/11. The only caveat I found is that windows update sometimes deletes the games and it needs a reinstall
|
|
|
|
|
Sander Rossel wrote: regasm
Wow, the memory of old tools that I have long since forgotten...
It's amazing how we can be intimately familiar with certain tech & then never think about it again, unless someone mentions it.
There are some things I'm glad to forget too.
|
|
|
|
|
I feel for you! Around half of my company's codebase 1.7M LOC (100+ apps) is in VB6. The difference is, I didn't inherit it, I created it. Migration efforts have been very slow as new projects take precedence and there really is no payoff (besides technical debt) when the legacy apps continue to work on the latest MS OS.
The biggest hurdle you are likely to face (if you are actually trying to get those projects running in VB6/debug) is older third-party components without an installer. Good luck and have fun!
"Go forth into the source" - Neal Morse
"Hope is contagious"
|
|
|
|
|
Wordle 1,062 3/6
🟩🟩🟩🟩⬜
🟩🟩🟩🟩⬜
🟩🟩🟩🟩🟩
so close...
|
|
|
|
|
Wordle 1,062 3/6
🟩🟨🟩🟨⬜
🟩🟩🟩🟩⬜
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,062 4/6*
🟨⬜⬜🟨⬜
🟨🟨⬜🟩🟨
🟩🟩🟩🟩⬜
🟩🟩🟩🟩🟩
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
Wordle 1,062 5/6
🟨⬜⬜⬜⬜
⬜🟨🟨⬜⬜
🟩🟩🟩⬜⬜
🟩🟩🟩⬜⬜
🟩🟩🟩🟩🟩
|
|
|
|
|
⬜⬜🟩⬜⬜
⬜⬜⬜⬜🟨
⬜⬜🟩🟨⬜
🟩⬜🟩⬜⬜
🟩🟩🟩⬜⬜
🟩🟩🟩🟩🟩
In a closed society where everybody's guilty, the only crime is getting caught. In a world of thieves, the only final sin is stupidity. - Hunter S Thompson - RIP
|
|
|
|
|
Wordle 1,062 4/6*
🟨🟨⬜⬜🟨
🟨🟨🟨⬜⬜
⬜⬜🟨🟨🟩
🟩🟩🟩🟩🟩
Happiness will never come to those who fail to appreciate what they already have. -Anon
And those who were seen dancing were thought to be insane by those who could not hear the music. -Frederick Nietzsche
|
|
|
|
|
Wordle 1,062 5/6
⬜⬜⬜⬜🟨
⬜⬜⬜⬜⬜
⬜🟨🟩⬜⬜
🟩⬜🟩🟩⬜
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,062 4/6
🟨🟨⬛⬛⬛
⬛🟨🟨🟨⬛
🟩🟩⬛🟩🟩
🟩🟩🟩🟩🟩
Ok, I have had my coffee, so you can all come out now!
|
|
|
|
|
Wordle 1,062 5/6*
🟨🟩⬛⬛⬛
🟩🟩🟩⬛⬛
🟩🟩🟩⬛⬛
🟩🟩🟩⬛⬛
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,062 3/6
⬛⬛🟩⬛🟨
🟩🟩🟩⬛⬛
🟩🟩🟩🟩🟩
Jeremy Falcon
|
|
|
|
|
Did you know that MS Edge has a built-in VPN?
It automatically applies VPN when you are connected to a public wifi.
Here are some more details[^] which I'm reading now.
I work out of a coffee shop once a week so this is important to me.
I'm trying to figure out :
1. how to know I'm actually protected
2. how "much" i'm protected by this VPN.
It is very interesting that MS is doing this though becuase it seems like the obvious thing to do that no other browser seems to do. Others you have to pay for separate VPN.
|
|
|
|
|
Quote: ... stop third parties and bad actors from accessing your sensitive information, so you can make purchases online, fill out forms, and keep your browsing activity away from prying eyes.
Yeah, because it's still 2010, and every site on the net is still using HTTP rather than HTTPS, right?!
Whilst there are still reasons for using a VPN[^], the MS page you linked to seems like it was written by a gibbering idiot marketing executive who doesn't understand the first thing they're talking about.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
I've wondered about that. So if I'm on an HTTPS site, then the moment I hit SUBMIT the data is encrypted locally (using the public key of the target site) and then transfered so even a person on same wifi can't see it right?
The one thing I'm looking to be protected from which I know is a current issue is token grabbing.
Here's what I mean. You are already signed into your Google account on your laptop. When you go to a site like stackoverflow or CP that you use your google credentials and you're on the public wifi then the nefarious actor can grab your token and use it to sign into your account.
I'm hoping / guessing that the VPN would protect me from that. But I'm wondering how I could prove that it does that??
|
|
|
|
|
raddevus wrote: even a person on same wifi can't see it
Correct.
If they had enough control of the network, they could see your DNS request(s) and know what site(s) you were connecting to, unless you use DNS over HTTPS[^].
They could see the IP address of the server you were connecting to. They could potentially the SNI[^] header indicating which site, unless the server uses ESNI[^].
But they would not be able to see or modify any of the request or response data, including the URLs, query strings, headers, and request bodies.
(Unless of course they had installed malware on your machine, or installed a malicious root certificate allowing them to MitM any site. But if they've done that, you've got bigger problems, and a VPN won't help you.)
raddevus wrote: You are already signed into your Google account on your laptop. When you go to a site like stackoverflow or CP that you use your google credentials and you're on the public wifi then the nefarious actor can grab your token and use it to sign into your account.
Again, assuming all the sites involved are using HTTPS, then nobody else can see the cookie / token to grab it. It would be part of the data that was encrypted.
And I doubt Google would allow any site not served over HTTPS to use their OAuth service to sign users in.
raddevus wrote: I'm hoping / guessing that the VPN would protect me from that.
If you're accessing sites which are not using HTTPS, then a VPN would prevent users on the local network from seeing or messing with your traffic. But it would not protect you if someone was inside the VPN provider's network and monitoring the traffic! All you've done is moved the point of trust from the people running your local network to the people providing the VPN.
There is also the potential of attacks against the VPN itself - for example:
Novel attack against virtually all VPN apps neuters their entire purpose | Ars Technica[^]
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Fantastic information (and links). I really appreciate you taking your time to explain these things to me.
|
|
|
|
|
The solution to the token interception is to not use Google or Facebook for federated logins. Why would you want to let these two advertising companies know where else you go on the internet?
|
|
|
|