TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Things I learned after getting users

249 点作者 HermanMartinus大约 2 年前

18 条评论

dahwolf大约 2 年前
&quot;this is mostly because i relied on a SQL ORM which in short is a tool that makes writing SQL easier to pick up and faster to develop. the biggest downside is that it might execute 50 queries to your database to get a list of information, when it probably only needs 1, which will cause slowdown.&quot;<p>I appreciate this honesty. Listen to this old man&#x27;s advise: learn SQL properly. It&#x27;s not that hard. Focus on it for a few weeks intensely and you&#x27;ve mastered it for life. Then just write SQL directly.<p>I&#x27;ve had weekends ruined troubleshooting my &quot;highly productive ORM layer&quot; that nuked a production database. Whilst functionally speaking my ORM code was in no way incorrect. I&#x27;m talking differences of a thousand fold in query load depending on how one expresses the ORM calls.<p>You can then become proficient in trying to reason and predict about what your ORM calls do in the actual database, but when you&#x27;re several joins deep, this becomes near impossible. At which point you become the ORM, and might as well just write SQL.
评论 #35147582 未加载
评论 #35144335 未加载
评论 #35147452 未加载
评论 #35150853 未加载
评论 #35144193 未加载
评论 #35148226 未加载
评论 #35144348 未加载
评论 #35147055 未加载
评论 #35148663 未加载
评论 #35144516 未加载
评论 #35148254 未加载
评论 #35148486 未加载
评论 #35145939 未加载
评论 #35147867 未加载
评论 #35144374 未加载
评论 #35143592 未加载
评论 #35146466 未加载
econnors大约 2 年前
&gt; when the site first got a surge of users from hacker news, there was one poster in particular who came to the site, registered a bunch of offensive, racist usernames and proceeded to post and create threads that were just full of dumb slurs. this was definitely a learning experience because i had to act quickly, so i tried a bunch of different methods to get rid of him.<p>it&#x27;s sad that people like this exist in the world. what could possibly motivate someone to spend their time doing this?
评论 #35142241 未加载
评论 #35143164 未加载
评论 #35142760 未加载
评论 #35144474 未加载
评论 #35144962 未加载
评论 #35143765 未加载
评论 #35141801 未加载
评论 #35144262 未加载
评论 #35145093 未加载
评论 #35143376 未加载
评论 #35142600 未加载
评论 #35142178 未加载
评论 #35146147 未加载
评论 #35142254 未加载
评论 #35141927 未加载
评论 #35143163 未加载
cousin_it大约 2 年前
&gt; <i>some users have suggested pretty smart features that i&#x27;ve since implemented, like this back-to-top button to quickly get back to the top of the page</i><p>To me all position:fixed elements (headers, footers, this back-to-top button, etc) feel like a kind of annoying dirt on the screen. Their absence is a big part of why I love the web 1.0 aesthetic.
评论 #35143239 未加载
评论 #35152223 未加载
评论 #35142112 未加载
Joel_Mckay大约 2 年前
Yes, there are numerous automated and human-powered nuisance traffic streams.<p>1. CMS sites are constant maintenance, as most are an endless supply of issues. However, some have content caching to reduce the SQL workload.<p>2. Delayed registration with CAPTCHA and a brief explanation of why you are there. Quiet banning IP filter applied to list to boot pending users who enter emails that bonce or fail to authenticate.<p>3. Firewall blacklist areas of the world where you don&#x27;t do business (better yet, whitelist the ISPs in the regions you do business), blacklist proxy&#x2F;tor&#x2F;spam IP ranges, add port tripwires, and setup rate limited traffic per IP (see slow loris mitigation methods if you are not using nginx).<p>4. add peer site content blocker for forum spammers&#x2F;bots i.e. share exploit probes preemptively with the rest of the net.<p>5. add email filter for mention of bitcoin&#x2F;BTC, and black-hole the entire IP block if in an irrelevant region.<p>6. lookup same-origin enforcement for your web-server, add Subresource Integrity Hash to your core, and re-scale&#x2F;watermark&#x2F;scrub all media to protect users from themselves.<p>7. fail2ban rules for common site security scanners, known exploit attempts, and common email scams.<p>You owe nonpaying users nothing, so the collateral cost of blanket bans is $0 in hostile regions. Remote traffic monitoring is also recommended if you have a game engine running.<p>On day 2 we can look at how BTC tumblers&#x2F;launderers fund most of these issues, and whether it is OK to also preemptively blanket-ban most cloud&#x2F;hosting providers (costs under 7% of your users in most cases). Remember, adversaries will often pretend to be from wherever they wish to inflict harm, and time does not have an associated cost in the 3rd world.<p>Have a gloriously wonderful day =)
评论 #35151045 未加载
TulliusCicero大约 2 年前
I&#x27;m surprised that they&#x27;re surprised about trolls. As someone who&#x27;s been doing PC gaming a long time, I always assume there&#x27;ll be people who just want to ruin things for everyone else. What they&#x27;re attracted to is popularity, so the better you do, the more you&#x27;ll have to deal with them (they tend to grow slightly superlinearly relative to overall user growth).<p>This is basically every game or internet forum that acquires even a little popularity: there will be some (few) people who just wanna ruin everything, and I&#x27;m always surprised by how many people are surprised by this even when they&#x27;re the technically literate sort.<p>For example, some Japanese fighting game devs <i>still</i> try to count disconnects during a match as different from losses for someone&#x27;s record. One guess as to what this encourages as far as player behavior goes.
dhosek大约 2 年前
Man, on the abuse front—it’s amazing the lengths that people will go through to put spam on the web. There are apparently canned solutions for pushing stuff to any Mediawiki site, although I found that a really stupid captcha¹ was enough to bring that down almost to zero, but early on with rejectionwiki, I had the same sort of chronic abuser things happening that are described in the article.<p>⸻<p>1. Basically a set of really obvious questions, like “Who wrote Hamlet?” and what’s “Shakespeare’s first name?” that any writer (for whom the site is targeted) should be able to answer.
评论 #35142699 未加载
评论 #35142973 未加载
评论 #35149104 未加载
评论 #35141580 未加载
hermitcrab大约 2 年前
&gt;listen to your users. they might have better ideas than you!<p>So true. My products have improved greatly from listening to (some!) user feedback.
评论 #35145900 未加载
评论 #35148537 未加载
评论 #35141829 未加载
partly_cloudy大约 2 年前
hey i&#x27;m the author of this site! going through comments now, but looks like i still need some work to do because all this traffic caused some slowdown :(. Looks like adding a caching layer is next.
diceduckmonk大约 2 年前
&gt; someone is going to abuse your site<p>Would gating access with Google Sign-in, or Facebook sign-in, etc, be sufficient for rate limiting bad actors?
评论 #35152325 未加载
mcstempel大约 2 年前
&gt; this worked for a little bit longer, but he proceeded to get on a VPN, and then another when i blocked that IP, then another when i blocked that IP, etc, etc.<p>Beyond VPNs, I&#x27;ve even seen attackers leverage residential IP networks which makes VPN detection ineffective as well [1]. If you ever need a more permanent identifier to ban users on, consider using a device&#x2F;browser fingerprinting tool [2]. It helps avoid the whack-a-mole issue of more sophisticated attackers churning IPs&#x2F;emails&#x2F;user agents&#x2F;etc.<p>[1] <a href="https:&#x2F;&#x2F;brightdata.com&#x2F;proxy-types&#x2F;residential-proxies" rel="nofollow">https:&#x2F;&#x2F;brightdata.com&#x2F;proxy-types&#x2F;residential-proxies</a> [2] <a href="https:&#x2F;&#x2F;stytch.com&#x2F;products&#x2F;device-fingerprinting" rel="nofollow">https:&#x2F;&#x2F;stytch.com&#x2F;products&#x2F;device-fingerprinting</a> (I&#x27;m admittedly biased towards our solution as I work at Stytch)
评论 #35203079 未加载
评论 #35149187 未加载
monroewalker大约 2 年前
Are you paying for Sentry? What type of monitoring does it provide? I&#x27;m working on a project I&#x27;d like to add some monitoring so I&#x27;m on the lookout for a good solution. Looking for something free though until there&#x27;s a need to have better insight than I can get without paying for it
评论 #35141901 未加载
评论 #35141624 未加载
评论 #35146876 未加载
评论 #35146501 未加载
gloosx大约 2 年前
The best way to deal with point one – ghosting. Feeling sorry to see 3 greatly ineffective, and 1 desperate method to get rid of the abusive spammer. I had experience with the community-driven portal, and trust me - the best way to exhaust the spammer - hide his posts from others - don&#x27;t give him a single clue you acted on him, just let him continue posting in a special vacuum prison crafted exactly for him.
Sujeto大约 2 年前
Currently I&#x27;m using a code method, where registration requires a &quot;code&quot;. I share this code lightly, and can change it at any time. Plus there&#x27;s a re-captcha in both register and login pages to annoy abusers a bit more.
scoofy大约 2 年前
I have a site that will likely need a denylist for usernames. Do you have any resources on implementing that? I mean, it sounds obvious how to do it, but if it&#x27;s already been done, I&#x27;d rather just have a list to work from.
评论 #35146493 未加载
mydriasis大约 2 年前
Hey hey! Been loving your forum so far. It&#x27;s been great chatting with folks. Hoping for many years to come.
beardog大约 2 年前
A good way to combat abuse is to not feed the trolls, don&#x27;t engage beyond a warning or two, simply delete and definitely don&#x27;t argue publicly.
flippinburgers大约 2 年前
AKA blacklists are useful.
hoseja大约 2 年前
Blacklist please.<p>Blocklist if you absolutely have to.<p>&quot;denylist&quot; is an abomination.<p>Oh I see, a goon.