Hacker Newsnew | past | comments | ask | show | jobs | submit | brinox's commentslogin

I was just wondering if pg_parquet could be combined with pg_azure_storage to write Parquet files to Azure Storage.

I had problems with pg_azure_storage in the past, because the roles pg_read_server_files and pg_write_server_files are unassignable on Azure PostgreSQL databases which makes the use of `COPY {FROM,TO}` impossible.


Azure is not supported as a backend in pg_parquet right now, but shouldn't be hard to add (contributions welcome!)

https://github.com/CrunchyData/pg_parquet

It would not be safe to let any user access object storage. Therefore, pg_parquet has two roles called parquet_object_store_read and parquet_object_store_write that give permission to COPY FROM/TO object storage (but not local file system).

In pg_azure_storage there is a comparable azure_storage_admin role that needs to be granted to users that need Azure Blob Storage permission.


Running signed binaries neither is as long as the corresponding keys leak all the time [1].

Anyone can just get their malware signed by just throwing some dollars at it.

[1] https://bugs.chromium.org/p/apvi/issues/detail?id=100


`docker-compose` is the old style of doing it.

Newer versions of Docker have Compose available as a CLI plugin, so the command `docker compose` with space is correct.


Mastodon.


Classic HN, where their grandmas and the rest of non-tech family members all successfully switch to Mastadon en masse.


Do you also audit / control web browsers the clients are using?


> Do you also audit / control web browsers the clients are using?

Certain places do, actually. That's why lots of enterprise software was stuck having to support IE just a few years back (and probably still in some places that haven't caught up).

I've seen demands towards certain features working on Edge/Chrome in particular even if it would break something in Firefox, which might be preference of the end users but also corporate policy towards using known software in certain places.

I'm sure that you're still likely to run into plenty of environments where something like Edge might be the only allowed browser.


>lots of enterprise software was stuck having to support IE just a few years back

Yep, and talking about Jira, they only ended that support in March 2020.

And wow, according to Wikipedia, Microsoft still supports Internet Explorer on some non-consumer Windows flavors. Today. I find that actually pretty stunning, must be a huge liability to be running web-apps that breaks on non-IE, because that can't then be the only aspect at which it's still stuck in the stone ages.


They will have a leg up there because the on machines this LTSC version of Windows is made for, you shouldn’t be browsing the web much in the first place - intended applications are ‘ medical systems (such as those used for MRI and CAT scans), industrial process controllers, and air traffic control devices’


Let's say there's a higher chance that you'll be able to sign a contract with Google or Microsoft that allows you to sue the $$$ out of them if something happens, than hoping to get anything from ankitpokhrel on GitHub whose bio says "I have no idea what I do".

(Nothing against ankitpokhrel and this great tool, just making a point in a slightly sarcastic way)


It's open source. If you want to use the functionality but don't trust a random internet user named ankitpokhrel, you can literally gut the project, copy-paste the code you understand, get basic functionality to work, and you can be pretty much certain that there is nothing nefarious going on.

I have done that multiple times. It's not very time demanding, because the working code is there, and all you're doing is essentially deleting code you either don't understand, or don't need. At the same time, you're reading the code you do use.


Which the IT guy won’t want to do and will tell you to just use the web interface


And imagine yourself in the IT guys shoes. Some rando expects you to audit something that at most one or two people use and probably contains a hundred vulns which would very likely never be fixed anyways. Why would you bother with such a request


We do that frequently. "I wrote this code" -> audit while I use my code -> "OK/please fix this or that".

I am the customer of our IT, I don't know why it should be any other way. It's noteworthy though that I don't work in a tightly regulated sector.


The premise is that you don't want to audit the source. It's extremely costly and you end up doing it for every update.


I would bet it's easier to do it with a 1 man company, the megacorps are famous for firewalling themselves from liability with very good contract lawyers.

You may also be able to get 3rd party insurance for this.


The 1 man company doesn't have deep enough pockets to actually repay damages and can easily declare bankruptcy.


From my experiences of Jira at scale, yes.


Yes - I can install Chrome and Firefox via a remote install system because the client's laptop is locked down so tight I can't do it any other way.

All software, including open source, technically needs to get approved by a security team.


Not OP, but the company I work for certainly does. They are required to by various business and government contracts.

They only enforce it if you run windows, though.


Congrats, you've just discovered referential transparency :-)

Such a nice feature of functional programming languages, like excel formulae.


It helps a lot that you gave me the name for the method. In the future, I can use that as a reference to explain what I'm doing or teach others, perhaps without needing to go into the details as I did here.


> You Still Need Third-Party Antivirus With Windows 11

At that point I stopped reading.

> PCMag security expert Neil Rubenking states that you still need third-party antivirus software.

Please stop suggesting snake oil software to the folks out there calling yourself an "expert".


I read Neil J. Rubenking's PC Magazine columns (on dead trees) in the 1980s. Your quote marks around expert are an insult.


Good, one fewer snake oil product on the market.


It's very convenient, yes.

If your Bitwarden vault is compromised however, you only have a single factor, because both the password and the TOTP secret are stored in the same place.


It would be really nice to always spell out the abbreviation once, put in in brackets and then use it afterwards. That would save so many people precious time.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: