Re prev toots, hypothetically, if I were to write a library called libextextglob that would grovel over an array of strings (like, say, #argv) and do horrible things to it if it sees globby characters that the shell didn't expand, would you think it was ...

(updated to allow multiple choices, because the best crimes are in B♭ minor)

#shell #unix #programming #bash

the right kind of mad
66.7%
the wrong kind of mad
0%
a crime against humanity and the Unix way
33.3%
in B♭ minor
0%
Poll ended at .
Netzgemeinde/Hubzilla

ParĂĄmetros LĂ­nea de Comandos. Rust

{ROOR} Revista On-line Occam's Razor
ParĂĄmetros LĂ­nea de Comandos. Java

{ROOR} Revista On-line Occam's Razor
ParĂĄmetros LĂ­nea de Comandos. TCL

{ROOR} Revista On-line Occam's Razor
ParĂĄmetros LĂ­nea de Comandos. Bash

{ROOR} Revista On-line Occam's Razor
ParĂĄmetros LĂ­nea de Comandos. Ruby

{ROOR} Revista On-line Occam's Razor
ParĂĄmetros LĂ­nea de Comandos. Perl

{ROOR} Revista On-line Occam's Razor
Why bother with argv[0]?

The first argument of a program’s command line, typically reflecting the program’s name/path and often referred to as argv[0], can in most cases be set to an arbitrary value without affecting the process’ flow. Making the case against argv[0], this post demonstrates how it can be used to deceive security analysts, bypass detections and break defensive software, across all main operating systems.

Why bother with argv[0]?

The first argument of a program’s command line, typically reflecting the program’s name/path and often referred to as argv[0], can in most cases be set to an arbitrary value without affecting the process’ flow. Making the case against argv[0], this post demonstrates how it can be used to deceive security analysts, bypass detections and break defensive software, across all main operating systems.