Thank you Lemmy, for making it so much easier to walk away from that dumpster fire!
Thank you Lemmy, for making it so much easier to walk away from that dumpster fire!
Could’ve been something Fedora-ish but based on the GitHub I don’t think that’s it. The most distinct thing I remember is that it appeared abandoned but the author just didn’t feel it needed any changes.
I use like four different devices to browse and some have multiple browsers so checking history has been rough.
Interesting but not what I was thinking of. I think in the GitHub also the author gave a specific example of an OS layered with the Steam client.
This is also going to make some devs (me) convulse when a PR is like, “small config change. updated 29 files”.
This was over 10 years ago, maybe 20. I wanted to pick up a new language and I seemed pretty driven, at the time, to hack a certain site. I think I gave up on it and as usual I enjoyed writing the code more than using the app.
It didn’t use webscraping or anything too sophisticated. I just applied a few dictionaries I found online and ran everything through a series of anonymous proxies. Very brute force.
Learned Python to try and hack into a porn site.
You can run pacman on Windows?
The only other way to combat deep fakes is something that people and companies constantly fuck up: cryptography.
I think this is a fair question. I haven’t seen anyone mention the benefits of using a non-web mail client (OP mentioned Yubikey but 2FA isn’t uncommon with web mail). I would actually consider using one if it gave me clean up options (e.g. haven’t opened an email in 3 days and the sender is not in my address book move to Junk/Spam). Main reason I rarely look at email is that it’s 90% stuff I have no desire to read and marking things as spam is a never ending cycle.
Agreed, OpenWRT is for something with limited resources like an OTS router.
I use IceWM on antiX. Seems to be a good mix of low resource usage and aesthetics.
I didn’t for the longest time but now I use Traefik for this. It can automatically add services (i.e. containers) to it’s routing list so the overhead is low and since I also run openwrt on my router I setup *. localhost to point to 127.0.0.1 so I don’t have to remember what ports I’m using for which service (e.g. jellyfin.localhost). You can also setup DNS entries using something like PiHole.
I put the sample template (https://yacht.sh/docs/Templates/Templates/) into a file named docker-compose.yml and Docker said the syntax was invalid. Are you saying I can give Yacht a compose file and it’s cool with it?
Used it for a bit but I didn’t like how you have to deploy things from templates which are basically compose files that don’t look like compose files.
Netflix has been profitable since 2003. This is greed.
This is the kind of AI stuff that really annoys me. Looking at one of the mutation examples I didn’t see anything that wouldn’t normally be tested by a typical mutation tool. You took a simple, idempotent process and you got an llm to do it slower, less accurately, and using more resources.
If you wanted to marry the two in a new and possibly useful fashion I would say use an llm to analyze the results of a standard mutation test and give guidance on what issues should be acted upon first. An off-by-one calculation could mean somebody loses a million dollars or it could mean a button is grayed out. Standard mutation tools don’t give you that context.
“Border Crisis” is code for “too many brown people that don’t speak English”.
That’s one way to basically ensure the US never imposes pay caps on executives.
Other than the low chance of you being targeted I would say only expose your services through something like Wireguard. Other than the port being open attackers won’t know what it’s for. Wireguard doesn’t respond if you don’t immediately authenticate.
Haven’t used it for such things lately but Bing used to be the search engine for porn. Like all engines I think they start out great but then start to tweak the results to basically only serve what they want you to see. Helping you find what you want to see becomes a distant in second.