Beefy Boxes and Bandwidth Generously Provided by pair Networks
Keep It Simple, Stupid

Perl Monks Discussion

( #1040=superdoc: print w/replies, xml ) Need Help??

This section is only for discussing issues pertaining to the PerlMonks web site. You can ask about how things work, or offer ideas on how the site could be improved, for example.

Unless the topic pertains to the PerlMonks web site, it does not belong in this section. If you're unsure, check out Where should I post X? and The Perl Monks Guide to the Monastery, or ask in the chatterbox.

PerlMonks Discussions
please stop reloading, you are reposting your thread constantly!
1 direct reply — Read more / Contribute
by Anonymous Monk
on Jul 27, 2018 at 22:24
RFC: Hide Very Bad Answers From Visitors
14 direct replies — Read more / Contribute
by jdporter
on Jul 24, 2018 at 17:10

    Following on from previous discussion on this topic...


    In the eye of the public (that is, not-logged-in visitors), the apparent quality of the site can be significantly dragged down by answers (or other replies) which are esteemed by the voting population to be notoriously poor.

    Proposed Solution:

    Within threaded views of discussions, hide from Anonymous Monk any replies with a sufficiently low negative reputation.


    In the threaded view of a post within a section such as SoPW, and within the threaded outlines displayed by RAT, any reply with a reputation below a given threshold will not be displayed. (This has the effect of hiding the entire sub-thread rooted at such reply as well.) This feature would only affect Anonymous Monk. Proposed threshold: -7.

    This would not affect any node being viewed "directly", only replies under it -- regardless of that node's type or reputation. It also would not affect root posts being shown in RAT.


    Q. I want to see every reply, even low-rep ones. Does this affect me?
    A. No, as long as you're logged in.
    Q. Ok, suppose I'm Anonymous Monk. Can I opt out of this "feature"?
    A. No, as long as you're not logged in.
    Q. Ok, then are these "very bad" replies completely inaccessible to me?
    A. No; you can still get to them via other normal means, such as Search and Super Search, and direct links.
    Q. What about in Newest Nodes? Will these "very bad" replies be hidden there as well?
    A. Not under the current plan. That's a more "raw" interface, and isn't particularly useful for visitors trying to get a view of a "question" along with its "answers".
    Q. I think a node would have to be much worse than -7 to merit this kind of treatment.
    A. That's not a question. Here's a question: What threshold value would you suggest?
    Q. This sounds like reaping but without the process. Why don't we just let the reaping process handle this problem?
    A. The criteria for reaping are fairly strict. Simply having abominable technical merit (for example) is not sufficient grounds for reaping. Yet these are not strangers to our land it may still be desirable to shield the eyes of innocent visitors from such content. That's all we're trying to do here. Once you've signed in at the front gate and picked up your meal chit, all content is laid bare, just as always, no matter how bad.

    Other thoughts on this idea? Alternative proposals?

    See my update below.

    I reckon we are the only monastery ever to have a dungeon stuffed with 16,000 zombies.
Planned Downtime on 2018-07-24 and 2018-07-25
2 direct replies — Read more / Contribute
by Co-Rion
on Jul 22, 2018 at 08:28

    Our host, , will be moving the machines from *BSD to Ubuntu. The move will happen in stages and should take only 20 minutes per machine.

    There will be at least a downtime of 20 minutes when the database machine will be offline. We don't foresee other downtimes, but as we move to a new environment, there might be some unforeseen interactions that take longer to resolve.

[SOLVED] Potential Caching issues when not logged in
1 direct reply — Read more / Contribute
by rminner
on Jun 27, 2018 at 17:46
This site is not secure continues
4 direct replies — Read more / Contribute
by Anonymous Monk
on Jun 27, 2018 at 10:59

    The barrier to entry at PerlMonks has risen too high for me to continue to spend time clicking to indicate I'm willing to ignore the security risks. I can live with the passwords being stored in clear text, and with all the other warts, but I am done with the certificate issue. Even with monk pictures turned off, as has been recommended in another thread as a user-initiated solution to the server's shortcoming, I get the message.

    And... I get the message.

    I had hoped that this would get fixed by now. But nothing has changed in some time. So the message to me is that making the site usable so that people can continue to use it to contribute to the Perl community is not deemed a worthwhile effort. So my message is that I have understood this, and won't be contributing here going forward until the certificates are fixed.

"This site is not secure" warning message
10 direct replies — Read more / Contribute
by roho
on Jun 11, 2018 at 07:41
    How do I get rid of the "This site is not secure" warning when accessing PerlMonks?

    "It's not how hard you work, it's how much you get done."

End of HTTP?
8 direct replies — Read more / Contribute
by oiskuu
on Jun 08, 2018 at 16:35

    Dear Everyone,

    I checked the Tidings and there is nothing (yet) regarding the latest change. PerlMonks has apparently installed 302 redirects and therefore disabled access via unencrypted HTTP protocol.

    Has the domino chip fallen, is this the final decision?

    I joined PM with the understanding that this is a community firmly based on pursuit of enlightenment, sharing of knowledge, and furthering the open discourse and exchange of ideas in all matters related to programming, and perl in particular. All of my notes were published in the good faith, and with the implicit intent that they be distributed with no restrictions, freely, no strings attached, to the benefit of anyone seeking education.

    Lately, I've been more of a lurker but still contribute where I may. It saddens me to see yet another site fall... I shall be considering if it possible for me to contribute any longer. It seems the entire future of PM has become clouded on this very day.

    ps. I'm not advocating against https.

Clear text passwords
3 direct replies — Read more / Contribute
by Juerd
on Jun 04, 2018 at 20:27

    It's 2018 and this site still stores clear text passwords (truncated to 8 characters, apparently), sends those passwords via clear text email, and uses clear text HTTP by default.

    There has already been a breach, almost a decade ago, where passwords got stolen (including mine), and TLS certificates have been free through Let's Encrypt for 2 years now. I find the continued use of clear text HTTP and passwords very irresponsible and wonder what's keeping the dear admins from implementing modern security measures.


invalid SSL cert on
1 direct reply — Read more / Contribute
by bennetthaselton
on May 25, 2018 at 15:43
    As of now, is giving an error that it has an invalid SSL certificate, since the cert is for * So it's giving SSL certificate errors in every major browser, naturally.

    It was working for me a few days ago without the invalid certificate error so something must have changed since then.

    Hope this is helpful!
perlmonks code does not know evalbytes is a function
4 direct replies — Read more / Contribute
by afoken
on May 15, 2018 at 18:41
More or Less Active - where are we now?
1 direct reply — Read more / Contribute
by 5mi11er
on May 01, 2018 at 14:38
    I've been traveling down memory lane the past few days. Been a long time since I'd visited PM. Checked out various discussions voted some, then revisited some of my old posts, when I ran across this thread: Is PM more active or less active than X years ago?

    Four years later, and things are obviously MUCH slower around here. I'm happy to see it's still active, and that eyepopslikeamosquito is still keeping track of some site stats here: Re: Selected best nodes - nothing recent, why?

    Ah, memories of waiting for a question you could give a meaningful answer to. Good stuff.


Monastery login over http
3 direct replies — Read more / Contribute
by bliako
on Apr 24, 2018 at 13:32

    Hi Monks, again,

    I am on an insecure and nosy (not noisy, nosy) connection and have realised that my password was just POSTed cleartext over to the Monastery. Understandably (firefox warns about that). I changed it using the link. Though Jesus knows all the passwords. Obviously.

    However, I am wondering...

    I realise the increased computational burden of SSL on the Monastery's bit-pushing apparatus. And I am quite pragmatic as to what who gains my password can do with it ... Nothing really apart from flaggellating a fellow Monk or posting inefficient and buggy codes ...

    So, what's the norm?

    Personally, I would be comfortable with a middle way where the login form is send over SSL and then once successfully logged in it downgrades back to http. After that all sessions, posts etc are over http. Now what good that be? They can steal your cookie (I read in a past node). Yes sure, but still they do not have the password (**which one may share across many sites** - always pragmatically speaking) and the computational burden on the Monastery servers is kept low.

    Please notice that downgrading back to http (after logging in via https) has to be done manually (as far as I can see), i.e. change browser's url to http a mano. So it is an incovenience on the digital fastlane.

    So, question is: should I use https over all my transactions after I log in and forget about manual changing https to http? Or log in via https and then manually go to http for reading/posting (accepting the risks associated with it but who cares)? However, logging in via http is not going to happen for me anymore. I hate gloating script kids.

    Edit: what about changing perlmonks' login form's names for username and password to something like a and b. And the login url to something less revealing? Just a thought.

erasing cookies halfway writing a comment
2 direct replies — Read more / Contribute
by Anonymous Monk
on Apr 17, 2018 at 08:13

    Hi Monks,

    I have just observed that my reply to a comment has appeared twice: the first time with my username and then second time as "Anonymous Monk" (the node is Override printing to STDOUT/ERR).

    What I suspect I did was

    1) login
    2) write the comment
    3) preview comment
    4) clear cookies (via browser clear history, not logout)
    5) clicked create.

    Most likely this is a false alarm and I am trying to reproduce it here. It could well be that I have posted while cookies were valid, then cleared the cookies and then reloaded the page and somehow posted exactly the same as anon.

Maximal title length (123456789 123456789 123456789 123456789 123456789 123456789 ....)
4 direct replies — Read more / Contribute
by LanX
on Apr 02, 2018 at 07:56
    Is there a reason why we don't limit the title's length?

    IMHO 80 chars should be enough ...

    Cheers Rolf
    (addicted to the Perl Programming Language and ☆☆☆☆ :)
    Wikisyntax for the Monastery


    Shortened title to ~80 chars for illustration.

Brave BAT
No replies — Read more | Post response
by drose2211
on Mar 15, 2018 at 13:05

    Have the maintainers of Perlmonks ever considered becoming a verified publisher for Brave browser? Its my primary web browser and allows donations through BAT. Probably wouldn't be much, but I know some of my monthly BAT would go to the site. Just a suggestion.

Discussion Item
Give us your input:
Use:  <p> text here (a paragraph) </p>
and:  <code> code here </code>
to format your post; it's "PerlMonks-approved HTML":

  • Posts are HTML formatted. Put <p> </p> tags around your paragraphs. Put <code> </code> tags around your code and data!
  • Titles consisting of a single word are discouraged, and in most cases are disallowed outright.
  • Read Where should I post X? if you're not absolutely sure you're posting in the right place.
  • Please read these before you post! —
  • Posts may use any of the Perl Monks Approved HTML tags:
    a, abbr, b, big, blockquote, br, caption, center, col, colgroup, dd, del, div, dl, dt, em, font, h1, h2, h3, h4, h5, h6, hr, i, ins, li, ol, p, pre, readmore, small, span, spoiler, strike, strong, sub, sup, table, tbody, td, tfoot, th, thead, tr, tt, u, ul, wbr
  • You may need to use entities for some characters, as follows. (Exception: Within code tags, you can put the characters literally.)
            For:     Use:
    & &amp;
    < &lt;
    > &gt;
    [ &#91;
    ] &#93;
  • Link using PerlMonks shortcuts! What shortcuts can I use for linking?
  • See Writeup Formatting Tips and other pages linked from there for more info.
  • Log In?

    What's my password?
    Create A New User
    and the web crawler heard nothing...

    How do I use this? | Other CB clients
    Other Users?
    Others about the Monastery: (5)
    As of 2019-03-22 06:54 GMT
    Find Nodes?
      Voting Booth?
      How do you Carpe diem?

      Results (110 votes). Check out past polls.