I think they should only let you put it in the overhead if it’s over your seat. It’s full? Tough shit. Check it.
- 0 Posts
- 20 Comments
TheKMAP@lemmynsfw.comto
linuxmemes@lemmy.world•My experience with Discord on LinuxEnglish
2·10 months agoDiscord cares what OS you use?
TheKMAP@lemmynsfw.comto
linuxmemes@lemmy.world•Proprietary vs Open Source BackdoorsEnglish
1·10 months agoI’m not sure how you can provide evidence that one thing has fewer unknown unknowns than another thing.
TheKMAP@lemmynsfw.comto
Programmer Humor@programming.dev•They're trying to normalize calling vibe coding a "programming paradigm," don't let them.English
1·10 months agoDo you know what a memory stack and assembly are?
If you want code that does assembly operations A, B, and then C, you might be able to accomplish it by scanning loaded memory (or its corresponding binary) for bits that, when translated into assembly, do:
A
D
return
This set of three instructions is a gadget. In practice, it’s a location in memory.
And then you find another gadget.
B
C
return
Then, if you don’t care about D, or D does something irrelevant that won’t screw up what you’re trying to do, or won’t crash the program, you can replace the stack with the addresses of gadgets one and two. When gadget one returns, the stack is popped and then gadget two executes.
Since the computer did ADBC and D was irrelevant, the system executed your ABC malware and now you win.
Is finding gadgets that execute actual malware hard? Surprisingly not!
Does every single post related to cars have to turn into “don’t use cars lol”???
TheKMAP@lemmynsfw.comto
memes@lemmy.world•The Company Has Reported Strong Financial PerformanceEnglish
6·11 months agoYou may benefit from watching cgpgrey’s keys to power video. The people who you need to gain power are not the same as those needed to maintain it. So a dictator will seize power and kill off all the people who helped him, because money going to those people is money not going to the people who can overthrow you, which is loot that can be promised to them by rivals trying to take your job.
You outlived your usefulness. They have no interest in the long term growth of the company - their job was to get a return on their investment and that means inflating the value at a point in time so that they can cash out.
If there is a magical amount of money you want to receive so you don’t get pissed off at me, just make that the price.
Your opinion is a result of class warfare propaganda, to get working class people arguing with each other. Direct your anger to the employer.
TheKMAP@lemmynsfw.comto
Programmer Humor@programming.dev•Accurate programming movieEnglish
4·1 year agoSwordfish 2 plz
Does “doesn’t need it” mean “wouldn’t be improved by it”? Examples?
What’s wrong with containers?
TheKMAP@lemmynsfw.comto
Mildly Infuriating@lemmy.world•Salaries of Employees from "non-profit charity" I was going to donate tooEnglish
3·1 year agoTry interacting with offshore contractors who were hired to cut costs.
The board are fiduciaries. They have to do the math to prove hiring a more expensive CEO is ultimately better than not.
I don’t get it. A baby is going to throw darts at a tied-up dog?
We didn’t buy it, we couldn’t afford it
Y’all’d’ve’ff’ve taken that job I offered y’all.
It’s nice to be in a room with someone who knows their shit, and never actually talk about the shit they know about, and instead connect to them at a human level.
But that’s not useful for podcast listeners.
TheKMAP@lemmynsfw.comto
Programmer Humor@programming.dev•Junior dev VS FAANMG devEnglish
21·2 years agoFacebook is Meta, no one cares about Microsoft.
So the acronym is MANGA
Defragging is about… defragging: making the data contiguous (a continuous stream along one arc of the same radius) so it doesn’t have to jump around.
TheKMAP@lemmynsfw.comto
Programming@programming.dev•TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)English
2·2 years agoThe problem isn’t necessarily “stuff not sent over vpn isn’t encrypted”. Everyone uses TLS. It’s more that you are no longer NATed behind the VPN egress IP. When governments want to assassinate anyone who touches a destination IP, having the true source IP instead of a VPN source IP is pretty helpful. For this to be practical you first need a botnet of compromised home routers… which they already have.
In a corporate environment, traffic that is VPN’d typically also undergoes better logging and deep packet inspection.
TheKMAP@lemmynsfw.comto
Programming@programming.dev•Jenkins was invented b/c an engineer “got tired of incurring the wrath of his team every time his code broke the build.”English
21·2 years ago“yes, please keep using Jenkins” -every red team ever

The problem is underallocated overhead space. You give us maximum dimensions, and you know the number of seats. Fucking have sufficient overhead space.