fix: Fix link log titles

This commit is contained in:
Robert Prehn 2024-04-29 09:27:22 -05:00
parent 933c60afe4
commit 4488ae83be
No known key found for this signature in database
3 changed files with 5 additions and 3 deletions

View file

@ -192,6 +192,7 @@ defmodule PreDotHn do
<% end %>
<meta name="author" content="Robert Prehn">
<link rel="alternate" type="application/rss+xml" title="Robert Prehn" href="https://pre.hn/feed.rss">
<link rel="alternate" type="application/rss+xml" title="Robert Prehn: Link Log" href="https://pre.hn/link-log/feed.rss">
<link
rel="icon"

View file

@ -64,7 +64,7 @@ defmodule PreDotHn.LinkLog do
<%= for link <- @links do %>
<div style="margin-bottom: 1rem">
<a class="text-ellipsis overflow-hidden inline-block" style="padding-left: 2rem;text-indent: -2rem;" href={link["url"]}>
🔗 <%= link["name"] %>
<%= link["emoji"] || "🔗"%> <%= link["name"] %>
</a>
<div class="link-log-body">
<%= {:safe, Markdown.render(link["summary"])} %>

View file

@ -1,8 +1,9 @@
- url: https://xeiaso.net/shitposts/no-way-to-prevent-this/CVE-2024-1086/
name: "\"No way to prevent this\" say users of only language where this regularly happens"
name: >
"No way to prevent this" say users of only language where this regularly happens
summary: |
> In the hours following the release of CVE-2024-1086 for the project The Linux kernel, site reliability workers and systems administrators scrambled to desperately rebuild and patch all their systems to fix a vulnerability that allows an attacker with unprivileged command execution to gain read/write access to page tables. This is due to the affected components being written in C, the only programming language where these vulnerabilities regularly happen. "This was a terrible tragedy, but sometimes these things just happen and there's nothing anyone can do to stop them," said programmer King Bud Hodkiewicz, echoing statements expressed by hundreds of thousands of programmers who use the only language where 90% of the world's memory safety vulnerabilities have occurred in the last 50 years, and whose projects are 20 times more likely to have security vulnerabilities.
- url:https://amycastor.com/2023/09/12/pivot-to-ai-pay-no-attention-to-the-man-behind-the-curtain/
- url: https://amycastor.com/2023/09/12/pivot-to-ai-pay-no-attention-to-the-man-behind-the-curtain/
name: "Pivot to AI: Pay no attention to the man behind the curtain -- by Amy Castor and David Gerard"
summary: |
> The magical claim of machine learning is that if you give the computer data, the computer will work out the relations in the data all by itself. Amazing!