Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, and yes can become big, but you can scope it to certain processes, function calls, modules, pattern matches, etc, etc. So it's fine if you know what you're doing.

Legend has it that a major cell network was briefly taken offline due to a poorly thought out trace on a production system.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: